On Sun, 03.04.11 18:01, Albert Strasheim (full...@gmail.com) wrote:

> 
> Hello all
> 
> On Sun, Apr 3, 2011 at 4:59 PM, Albert Strasheim <full...@gmail.com> wrote:
> > pam_loginuid(sshd:session): set_loginuid failed
> 
> This one is caused by:
> 
> 32    open("/proc/self/loginuid", O_WRONLY|O_TRUNC|O_NOFOLLOW) = 4
> 32    write(4, "0", 1)                  = -1 EPERM (Operation not permitted)
> 
> This happens regardless of whether systemd-nspawn is run with sudo or
> directly as root.

This fails due to the missing auditing capabilities I'd guess.
> 
> > pam_systemd(sshd:session): Failed to get user data.
> 
> This is caused by my user ID not being present in the passwd file in
> the container.

Ah, interesting problem. pam_systemd uses the loginuid, but
that's the one from the container, and hence things go bad.

Hmm, not sure how to fix this in a nice way in pam_systemd: if we are in
a container we should not use the loginuid. Only way I see is by
explicitly checking for PID namespaces...

Lennart

-- 
Lennart Poettering - Red Hat, Inc.
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to