public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Henning Schild <henning.schild@siemens.com>
Cc: Alexander Smirnov <asmirnov@ilbers.de>, isar-users@googlegroups.com
Subject: Re: [PATCH] isar: Clean mount point on bitbake exit
Date: Fri, 9 Feb 2018 14:19:26 +0100	[thread overview]
Message-ID: <fd9b1db1-daec-419b-8f01-d77a702cb5a8@siemens.com> (raw)
In-Reply-To: <20180209141446.3d82eafa@mmd1pvb1c.ad001.siemens.net>

On 2018-02-09 14:14, Henning Schild wrote:
> Am Fri, 9 Feb 2018 13:41:23 +0100
> schrieb Jan Kiszka <jan.kiszka@siemens.com>:
> 
>> On 2018-02-09 13:40, Henning Schild wrote:
>>> Am Fri, 9 Feb 2018 13:35:15 +0100
>>> schrieb Jan Kiszka <jan.kiszka@siemens.com>:
>>>   
>>>> On 2018-02-09 13:33, [ext] Henning Schild wrote:  
>>>>> Hi,
>>>>>
>>>>> this patch is causing problems when building in a docker
>>>>> container, because sysfs can only be mounted ro. (Subject:
>>>>> current next bash in buildchroot problem)
>>>>> Now we could discuss whether we should relax the security of our
>>>>> containers even more, or whether Isar should care about that
>>>>> use-case.
>>>>>
>>>>> But this patch actually does several things at a time, it changes
>>>>> the way we mount and adds three new mounts. I would suggest to
>>>>> split it up so we can discuss the issues with dev and sys while
>>>>> already merging the rest.    
>>>>
>>>> I think (didn't check if there was an update of next this morning)
>>>> it works for me - in Docker. How are you starting the container?  
>>>
>>> docker run -e USER_ID=$(id -u) --rm -t -i --cap-add=SYS_ADMIN
>>> --cap-add=MKNOD --device $(/sbin/losetup -f) -e ... proxy stuff ...
>>>   
>>
>> Try adding --privileged - that's needed for binfmt anyway.
> 
> Mhh i could, But. I am doing an amd64 build on an amd64 host, so i do
> not use binfmt. And i did build arm images with binfmt and without
> privileged before.

That was working by chance, because you had the right settings already
applied on the host system (binfmt is not container-ready, is not
working per-namespace).

> So i would like to understand what has changed before dropping all
> defense-lines in docker ... that where ok before.

The answer to isolation remains "us a VM" for now (can also be "use the
container insider a VM"). Docker itself is no sufficient isolation
technology for us at this point.

Jan

  reply	other threads:[~2018-02-09 13:19 UTC|newest]

Thread overview: 19+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-02-06 19:55 Alexander Smirnov
2018-02-06 20:31 ` Jan Kiszka
2018-02-06 20:45   ` Alexander Smirnov
2018-02-06 20:56     ` Jan Kiszka
2018-02-06 21:10       ` Alexander Smirnov
2018-02-09  9:56 ` Alexander Smirnov
2018-02-09 12:33 ` Henning Schild
2018-02-09 12:35   ` Jan Kiszka
2018-02-09 12:40     ` Henning Schild
2018-02-09 12:41       ` Jan Kiszka
2018-02-09 13:08         ` Alexander Smirnov
2018-02-09 13:14           ` Jan Kiszka
2018-02-09 13:39             ` Alexander Smirnov
2018-02-09 13:19           ` Henning Schild
2018-02-09 15:04             ` Henning Schild
2018-02-09 15:29               ` Alexander Smirnov
2018-02-09 13:14         ` Henning Schild
2018-02-09 13:19           ` Jan Kiszka [this message]
2018-02-09 13:29             ` Henning Schild

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=fd9b1db1-daec-419b-8f01-d77a702cb5a8@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=asmirnov@ilbers.de \
    --cc=henning.schild@siemens.com \
    --cc=isar-users@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox