-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Should become root in the namespace after joined user ns
fix: #4466, in containerd, the net and user ns has been created before start the container, and let runc join these two ns when starting the init process, it works for normal system, except the system with selinux enabling and has mount label configed. We can resolve it with two steps: 1. Join the user ns after joined all other namespaces; 2. If we have joined a user ns path, we should also become root in the namespace, like what we do in unsharing a new user ns. Signed-off-by: lifubang <[email protected]>
- Loading branch information
Showing
1 changed file
with
24 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters