Rework priveleged mode and host-path volumes for modular libvirt

Bug #1970756 reported by Bogdan Dobrelya
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tripleo
New
High
Unassigned

Bug Description

Some of modular libvirt containers do not require privileged execution mode. Also some may be omitted redundant /dev bind-mounts. Finlally, some may be just removed - e.g. nova does not use libvirt storage pools.

NOTE: The mixed-versions spec https://review.opendev.org/c/openstack/tripleo-specs/+/834076 is related to this. RHEL doesn't support privileged containers, if the container OS does not match the host OS major version.
The host/container match requirement is just because the assumption is that privileged containers are likely to be using privileged kernel features.
We could w/a that by listing required capabilities instead of using the --privileged flag. Even if that would mean retaining the full list of CAPs, like if it were privileged...

Tags: tech-debt
Changed in tripleo:
importance: Undecided → Medium
tags: added: tech-debt
Changed in tripleo:
importance: Medium → High
description: updated
Revision history for this message
Bogdan Dobrelya (bogdando) wrote :

virtqemud, which CAPs it needs?
https://www.spinics.net/linux/fedora/libvir/msg220303.html
# Needed when writting to the PCI config space
CAP_SYS_PACCT ??

https://listman.redhat.com/archives/libvir-list/2021-June/220345.html
# Needed for vfio
 capability sys_resource

more to come:
https://listman.redhat.com/archives/libvir-list/2021-June/220299.html
+ capability kill,
+ capability net_admin,
+ capability net_raw,
+ capability setgid,
+ capability sys_admin,
+ capability sys_module,
+ capability sys_ptrace,
+ capability sys_pacct,
+ capability sys_nice,
+ capability sys_chroot,
+ capability setuid,
+ capability dac_override,
+ capability dac_read_search,
+ capability fowner,
+ capability chown,
+ capability setpcap,
+ capability mknod,
+ capability fsetid,
+ capability audit_write,
+ capability ipc_lock,
+ capability sys_rawio,
+ capability bpf,
+ capability perfmon,

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.