!9IQChSjwSHXPPWTa:lix.systems

Lix

1105 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms295 Servers

Load older messages


SenderMessageTime
30 Nov 2025
@hexa:lossy.networkhexapossibly https://github.com/DavHau/nix-portable21:38:38
@jlamur:matrix.orgJules Lamuryeah sorry forgot about the important part: with the sandbox :)21:38:49
@jlamur:matrix.orgJules Lamur(ie. sandbox-fallback = false)21:39:03
@raitobezarius:matrix.orgraitobezariusAFAIK the podman rootless thing has a seccomp policy that prevents all unshare calls with any relevant arg21:39:13
@raitobezarius:matrix.orgraitobezariusIf you get rid of that and you have subuid delegation, you can run with sandbox21:39:30
@raitobezarius:matrix.orgraitobezariusOtherwise hexa gave you the 50% performance penalty solution by using syscall interception21:39:46
@jlamur:matrix.orgJules Lamur yep you're right, running with eg podman run --cap-add=SYS_ADMIN --security-opt unmask=/proc/* --rm -it works 21:39:53
@raitobezarius:matrix.orgraitobezarius
In reply to @jlamur:matrix.org
yep you're right, running with eg podman run --cap-add=SYS_ADMIN --security-opt unmask=/proc/* --rm -it works
I think you can get remove just the unshare blacklist
21:40:13
@raitobezarius:matrix.orgraitobezariusDon't need to unmask proc and cap add21:40:20
@raitobezarius:matrix.orgraitobezariusFor proc, you only need a partial view, not a full view anyway, but you need a proper procfs I suppose21:41:03
@jlamur:matrix.orgJules Lamur AFAIU, podman sets a policy that prevents any mount related syscall in /proc, so remounting a procfs should not work at all without the --security-opt flag above (again, if I understand correctly -- I only have a high level understanding of all that) 21:43:18
@raitobezarius:matrix.orgraitobezariusArgh, yeah, we need *a* procfs21:44:11
@raitobezarius:matrix.orgraitobezariusNot necessarily *the* procfs21:44:16
@jlamur:matrix.orgJules LamurI'm not sure that I understand what you're suggesting here21:44:51
@raitobezarius:matrix.orgraitobezarius
In reply to @jlamur:matrix.org
I'm not sure that I understand what you're suggesting here
--security-opt seccomp reduced-seccomp.json
21:45:29
@raitobezarius:matrix.orgraitobezariusThe JSON file is a fine grained control of which syscall is allowed21:46:23
@raitobezarius:matrix.orgraitobezariusAllowing unshare makes sense if you want the sandbox to work at all21:46:45
@raitobezarius:matrix.orgraitobezariusPerhaps, allowing the mount procfs is sufficiently risk free too21:46:56
@jlamur:matrix.orgJules Lamurwhat do you mean by allowing unshare? user namespaces are allowed by default in podman rootless containers so unshare should work out of the box21:48:43
@raitobezarius:matrix.orgraitobezariusI was pretty sure the default seccomp policy forbids the unshare syscall21:49:08
@jlamur:matrix.orgJules Lamur(that does not solve my problem though because of the procfs mask)21:49:13
@raitobezarius:matrix.orgraitobezariusSo maybe the question is: if you try to allow the mount syscall for procfs, does it work?21:49:35
@raitobezarius:matrix.orgraitobezariusWithout any cap or proc unmasking21:49:41
@jlamur:matrix.orgJules Lamur

If I try to run with only the unmask, then I get that:

$ podman run --security-opt unmask=/proc/* --rm -it foo unshare -r nix-build
error: changing ownership of path '/nix/store': Invalid argument
21:52:54
@jlamur:matrix.orgJules Lamur mhh I think that's because /nix/store is root:nogroup in the new user ns 21:55:10
@raitobezarius:matrix.orgraitobezariusThat's very weird to have EINVAL on chown? Do you have a clean mount namespace?21:55:12
@raitobezarius:matrix.orgraitobezarius
In reply to @jlamur:matrix.org
mhh I think that's because /nix/store is root:nogroup in the new user ns
So subuid delegation
21:55:24
@weethet:catgirl.cloudWeetHetWYM?21:56:57
@raitobezarius:matrix.orgraitobezarius
In reply to @weethet:catgirl.cloud
WYM?
The surface of API calls used for nix-doc is extremely low and trivial
21:57:48
@raitobezarius:matrix.orgraitobezariusIt's absolutely not representative of general purpose FFI for CLI alas21:58:05

Show newer messages


Back to Room ListRoom Version: 10