Systems Programming | 301 Members | |
| Kernel, stdenv, low-level hacking, patchelf, … | 75 Servers |
| Sender | Message | Time |
|---|---|---|
| 10 Jul 2022 | ||
| good work figuring that out anyways | 17:06:34 | |
| So I hope someone does it before I get some more spare brain power | 17:06:55 | |
| 12 Jul 2022 | ||
| 21:32:14 | ||
| 20 Jul 2022 | ||
| 16:08:10 | ||
| 26 Jul 2022 | ||
| 14:40:37 | ||
| 15:43:23 | ||
| 30 Jul 2022 | ||
| 22:34:32 | ||
| 31 Jul 2022 | ||
| 10:11:34 | ||
| 1 Aug 2022 | ||
| 09:11:11 | ||
| 09:11:25 | ||
| 3 Aug 2022 | ||
| 12:55:05 | ||
| Is there a tool that will tell me why the kernel is denying me something or do I have to learn ftrace. | 22:55:55 | |
| 4 Aug 2022 | ||
| Normally ls -la on the file in question is enough | 09:37:17 | |
| pie_: it depends on what it's denying you | 10:18:30 | |
| When I run ip link add "w0" type wireguard in a systemd service that has cap_net_admin (afaict) in a privileged container, I get RTNETLINK answers: Operation not permitted | 15:24:22 | |
| (Same thing I posted in the systemd channel) | 15:24:29 | |
| * When I run ip link add dev w0 type wireguard in a systemd service that has cap_net_admin (afaict) in a privileged container, I get RTNETLINK answers: Operation not permitted | 15:25:19 | |
| I don't think you're allowed to create Wireguard interfaces without being actually root | 15:28:56 | |
| Actually maybe you can do it in a netns? | 15:31:39 | |
| the service is running as root in the cotainer | 15:32:44 | |
| * the service is running as root in the container | 15:32:46 | |
| also I dont know if nixos-container root-login is a real container shell but I can do the ip link add just fine there | 15:33:09 | |
| 5 Aug 2022 | ||
| apparently I dont actually have the capabilities systemd show says I have:
Well, it is called "bounding" set?:
| 00:44:40 | |
| more clearly:
| 00:48:40 | |
In reply to @jcie74:matrix.orgre: something could have told me "lol bro you dont actually have the cap" xP | 00:53:16 | |
| If you actually know what you're doing, well yeah, you chck capsh | 00:53:31 | |
| * If you actually know what you're doing, well yeah, you check capsh | 00:53:36 | |
| when a constant is memorable so you google it https://www.google.com/search?q=capbnd+00000000fdecafff -> http://k.japko.eu/systemd-nspawn-ping-debug.html | 03:02:17 | |
| The problem ended up being that contrary to my expectations, nspawn screws with capabilities even if you dont set any flags. --capabilities=all fixed it | 05:00:08 | |
| 6 Aug 2022 | ||
| working on a stats library for linux: https://github.com/YellowOnion/bcachefs/commit/2438d6a0ba6fca4e459b08df472e6cd16fd50e17 :-) | 03:39:35 | |