Unfortunately the kernel overmounting security check won't let you do so. This security check is there in the event that /home/blah contains some files which the /home/blah mount hides. Now allowing an unprivileged user to bind-mount /home without /home/blah on top of it would un-hide those files, causing a potential security issue.
The only workaround is to have a /home bind-mount setup by root at say /mnt/home and then use /mnt/home as the source of the bind-mount for your container. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1657437 Title: Unprivileged containers run by non-root fail to start if trying to bind-mount a directory that contains a mounted ecryptfs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1657437/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
