From: Ivan Zakharyaschev <imz@altlinux.org> To: ALT Linux Sisyphus discussions <sisyphus@lists.altlinux.org> Subject: Re: [sisyphus] electron v 5.0 and user namespaces feature Date: Thu, 24 Oct 2019 01:06:37 +0300 (MSK) Message-ID: <alpine.LFD.2.20.1910240102540.28829@imap.altlinux.org> (raw) In-Reply-To: <CAN5SjAD4ysbb_TQ4FJGCOXUU8TmLzrYd4XNBUqvVncvXiWoNOg@mail.gmail.com> [-- Attachment #1: Type: text/plain, Size: 1691 bytes --] On Tue, 22 Oct 2019, Michael Bykov wrote: > Салют, Hello! > Тут у всех Линуксов все должно работать, но у нас (и в Arch) - опять ошибка > $ npm start > > The setuid sandbox is not running as root. Common causes: > * An unprivileged process using ptrace on it, like a debugger. > * A parent process set prctl(PR_SET_NO_NEW_PRIVS, ...) > Failed to move to new namespace: PID namespaces supported, Network > namespace supported, but failed: errno = Operation not permitted > > Отлично, говорят лечится > > https://github.com/electron/electron/issues/17972: > > $ sudo sysctl kernel.unprivileged_userns_clone=1 > > или https://github.com/jessfraz/dockerfiles/issues/65#issuecomment-266532289: > > $ echo 'kernel.unprivileged_userns_clone=1' > /etc/sysctl.d/00-local-userns.conf > $ service procps restart > > Но у нас такие штуки не проходят, естественно. > sysctl: cannot stat /proc/sys/kernel/unprivileged_userns_clone: No > such file or directory > > И как быть? > > Вот что они пишут: > ------------ > Here's an article I found describing the background of why it's not > enabled by default: Controlling access to user namespaces and here's > how to enable it (from Enable user namespaces in Debian kernel): > https://lwn.net/Articles/673597/ > http://superuser.com/questions/1094597/enable-user-namespaces-in-debian-kernel > ------------- https://unix.stackexchange.com/a/303214/4319 Володя Селёзнев дал этот конкретный ответ уже: sysctl -w kernel.userns_restrict=0 > У меня p8 + Сизиф: > > $ uname -a > (git)-[master] > Linux asus 4.9.133-std-def-alt0.M80P.1 #1 SMP Mon Oct 15 16:46:38 UTC > 2018 x86_64 GNU/Linux -- Best regards, Ivan
prev parent reply other threads:[~2019-10-23 22:06 UTC|newest] Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-10-21 22:30 Michael Bykov 2019-10-21 22:56 ` Vladimir D. Seleznev 2019-10-22 9:23 ` Michael Bykov 2019-10-23 22:06 ` Ivan Zakharyaschev [this message]
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=alpine.LFD.2.20.1910240102540.28829@imap.altlinux.org \ --to=imz@altlinux.org \ --cc=sisyphus@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Sisyphus discussions This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus/0 sisyphus/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus sisyphus/ http://lore.altlinux.org/sisyphus \ sisyphus@altlinux.ru sisyphus@altlinux.org sisyphus@lists.altlinux.org sisyphus@lists.altlinux.ru sisyphus@lists.altlinux.com sisyphus@linuxteam.iplabs.ru sisyphus@list.linux-os.ru public-inbox-index sisyphus Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus AGPL code for this site: git clone https://public-inbox.org/public-inbox.git