From: Christian Brauner Date: Mon, 5 Feb 2018 17:32:00 +0000 (+0100) Subject: doc: add lxc.namespace.clone + lxc.namespace.keep X-Git-Tag: lxc-3.0.0.beta1~44^2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=46186acdb011208db4e34beeca513391eb00aa8b;p=thirdparty%2Flxc.git doc: add lxc.namespace.clone + lxc.namespace.keep Signed-off-by: Christian Brauner --- diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in index 506336dee..ccc6348c4 100644 --- a/doc/lxc.container.conf.sgml.in +++ b/doc/lxc.container.conf.sgml.in @@ -1426,11 +1426,70 @@ dev/null proc/kcore none bind,relative 0 0 - Namespace Inheritance + Namespaces - A namespace can be inherited from another container or process. + A namespace can be cloned (), + kept () or shared + (). + + + + + + + Specify namespaces which the container is supposed to be created + with. The namespaces to create are specified as a space separated + list. Each namespace must correspond to one of the standard + namespace identifiers as seen in the + /proc/PID/ns directory. + When is not explicitly set all + namespaces supported by the kernel and the current configuration + will be used. + + + + To create a new mount, net and ipc namespace set + . + + + + + + + + + + + Specify namespaces which the container is supposed to inherit from + the process that created it. The namespaces to keep are specified as + a space separated list. Each namespace must correspond to one of the + standard namespace identifiers as seen in the + /proc/PID/ns directory. + The is a + blacklist option, i.e. it is useful when enforcing that containers + must keep a specific set of namespaces. + + + + To keep the network, user and ipc namespace set + . + + + + Note that sharing pid namespaces will likely not work with most init + systems. + + + + Note that if the container requests a new user namespace and the + container wants to inherit the network namespace it needs to inherit + the user namespace as well. + + + + diff --git a/src/lxc/start.c b/src/lxc/start.c index cd7e221c2..6d43c92b2 100644 --- a/src/lxc/start.c +++ b/src/lxc/start.c @@ -1555,7 +1555,7 @@ static int lxc_spawn(struct lxc_handler *handler) */ if (wants_to_map_ids) { if (!handler->conf->ns_share[LXC_NS_USER] || - (handler->conf->ns_keep & CLONE_NEWUSER) > 0) { + (handler->conf->ns_keep & CLONE_NEWUSER) == 0) { ret = lxc_map_ids(id_map, handler->pid); if (ret < 0) { ERROR("Failed to set up id mapping.");