Skip to content

container workloads with /proc/sys ro mount are problematic #372

@cyphar

Description

@cyphar

Our /proc/sys/fs/protected_symlinks emulation logic with the O_PATH resolver errors out if you are in a container with /proc/sys overmounted as RO. I think there are two steps to fixing this:

  1. As a hotfix, if getting the sysctl value errors out we err on the conservative side and assume it is enabled.
  2. Figure out a way to permit overmounts if they are of the same path (and possibly only permit certain mount flags to be set). We can probably do this with statmount on newer (6.8) kernels? On old kernels we will need to parse mountinfo. Not sure if it's worth it. :/

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't workingresolver/opathRelated to the userspace openat(2)-based resolver.resolver/procfsRelated to the procfs-specific resolver.securityA security issue or hardening problem.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions