-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't work for rootless if no read permission to runc binary #4449
Comments
I don't know whether this is a bug or not, maybe I asked many years ago, but I can't find that issue now, open a new one to record it. |
How to repro this? |
chmod -rw+x /usr/sbin/runc
|
Yeah, this is because we need to read The one upside is that for rootless containers you can always just download a runc binary and run it from your home directory (assuming your home directory isn't |
Yes, this is kind of weird but not a deal breaker as adding a read permission for itself should not be an issue. We can enhance the error message to point this out, but to me it's clear enough as it is. |
Actually, we can make the overlayfs approach work in rootless containers for Linux >= 5.11 and AFAICS that would remove the need to be able to read the binary. It would require some ugly fork+CGo so maybe we can do this later (I'm not sure it's worth the effort tbh). |
Yeap... I'm not sure why would we want to support a runc binary that you can't read? Also, as @kolyshkin said, you can download your own binary for rootless too. Is this configuration common on any established setup? |
For rootless container, if the runc binary has a
111
permission, runc can't work for this case.The error message:
error msg="runc run failed: unable to create new parent process: unable to create safe /proc/self/exe clone for runc init: opening current binary: open /proc/self/exe: permission denied"
The text was updated successfully, but these errors were encountered: