** Changed in: systemd (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1707901
Title:
systemd-journald-audit.socket atte
Ack thanks.
I think upstream actually has ConditionVirtualization=!private-users now
which can come in handy to do the uid_map check. ( I have just
discovered this myself).
W.r.t. not needed in containers at all, also makes sense. Thanks.
** Changed in: lxd (Ubuntu)
Status: New => Invalid
You can look at /proc/self/uid_map to see if uid 0 is mapped to a non-0
uid, which would mean that you're not getting real root.
Root in an unprivileged container does hold all the capabilities, but those are
tied to the user namespace so they're only useful if the resource you're trying
to acce
can e.g. systemd-detect-virt be extended to distinguish priviledged vs
unpriviledged lxc?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1707901
Title:
systemd-journald-au
4 matches
Mail list logo