-
Notifications
You must be signed in to change notification settings - Fork 199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Running without a uid 0 : write to /proc/sys/net/ipv4/ping_group_range
: Invalid argument
#1802
Comments
YOu can modify containers.conf to not set it. |
Ack like #345 |
Yes except set it to default systctls to [] |
@giuseppe PTAL |
you can also override it with |
also keep in mind that running without root is not generally supported, there is some code in crun to allow it, but for example it fails with runc:
|
Just clarifying "Can we just ignore this?" I meant treat a |
the OCI runtime sets it, so it is out of our control. We'd need to extend the OCI runtime specs to support "optional" sysctls. It would be easier to teach Podman not to set it if there is no root user mapped, or even better, to support some templating mechanism like --sysctl="net.ipv4.ping_group_range=$FIRST_UID $NUMBER_UIDS". However, this seems a bit overkill for something that only affects ping_group_range when running without root in the user namespace. |
You can tall Podman to not set sysctls in this situation or modify containers.conf to not set it. This sysctl is just allowing the root procesess within the container to ping without requiring CAP_NET_RAW. |
From strace:
Can we just ignore this?
The text was updated successfully, but these errors were encountered: