Unfortunately the kernel overmounting security check won't let you do
so.

This security check is there in the event that /home/blah contains some
files which the /home/blah mount hides. Now allowing an unprivileged
user to bind-mount /home without /home/blah on top of it would un-hide
those files, causing a potential security issue.

The only workaround is to have a /home bind-mount setup by root at say
/mnt/home and then use /mnt/home as the source of the bind-mount for
your container.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1657437

Title:
  Unprivileged containers run by non-root fail to start if trying to
  bind-mount a directory that contains a mounted ecryptfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1657437/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to