spec: mask /sys/kernel when bind mounting /sys

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
This commit is contained in:
Giuseppe Scrivano
2019-04-11 15:54:35 +02:00
parent 42eb9eaf29
commit 2c9c40dc82

View File

@ -132,6 +132,9 @@ func CreateConfigToOCISpec(config *CreateConfig) (*spec.Spec, error) { //nolint
Options: []string{"rprivate", "nosuid", "noexec", "nodev", r, "rbind"}, Options: []string{"rprivate", "nosuid", "noexec", "nodev", r, "rbind"},
} }
g.AddMount(sysMnt) g.AddMount(sysMnt)
if !config.Privileged && isRootless {
g.AddLinuxMaskedPaths("/sys/kernel")
}
} }
if isRootless { if isRootless {
nGids, err := getAvailableGids() nGids, err := getAvailableGids()
@ -500,7 +503,6 @@ func blockAccessToKernelFilesystems(config *CreateConfig, g *generate.Generator)
"/proc/scsi", "/proc/scsi",
"/sys/firmware", "/sys/firmware",
"/sys/fs/selinux", "/sys/fs/selinux",
"/sys/kernel",
} { } {
g.AddLinuxMaskedPaths(mp) g.AddLinuxMaskedPaths(mp)
} }