Skip to content

Do we want to (and will users accept) the Docker daemon changing permissions on an existing path for (root dir) access to work via a user namespaced process? #25847

@CRTX

Description

@CRTX

Just as Ubuntu 16.04 lxcfs bug got fixed, now with the new namespace feature we are not able to use namespaces together with the --graph parameter.

When using Docker 1.12.0 and lxcfs 2.0.3 with --userns-remap=Default and --graph /media/user/somedrive/docker throws the following error when doing any command such as docker run hello-world:

docker: Error response from daemon: oci runtime error: rootfs_linux.go:42: preparing rootfs caused "permission denied".

On my development machine I have a small SSD so I'm not able to use the default /var/lib/docker for long before I run out of space from having to work with many images. Being able to use the --graph feature would really help with the already awesome docker namespace feature.

Metadata

Metadata

Assignees

No one assigned

    Labels

    area/security/usernskind/bugBugs are bugs. The cause may or may not be known at triage time so debugging may be needed.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions