-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nosuid problem in foreign architecture builds #47
Comments
I don't think it will add much to be honest, but what do you see if you add
`DABUILD_DEBUG=true` to the environment?
…On Sat, 28 Dec 2019, 09:41 Luca Weiss, ***@***.***> wrote:
(continued from #46
<#46>)
Running env DABUILD_ARCH=aarch64 dabuild -r on an x86_64 machine results
in sudo: effective uid is not 0, is /usr/bin/sudo on a file system with
the 'nosuid' option set or an NFS file system without root privileges?
being printed (tested with aarch64 & armv7)
alpinelinux/docker-abuild edge-aarch64 1470e8631406 9 days ago 195MB
$ docker run --entrypoint /bin/sh --rm -it alpinelinux/docker-abuild:edge-aarch64
~ $ sudo ls
sudo: effective uid is not 0, is /usr/bin/sudo on a file system with the 'nosuid' option set or an NFS file system without root privileges?
On the host:
$ mount | grep docker
/dev/mapper/docker-8:1-20185132-fc7eb3aa34775e1dc50251a64cf4b6320077e1d03f1bce5c269907e2b5b2a7bc on /mnt/hdd/docker/devicemapper/mnt/fc7eb3aa34775e1dc50251a64cf4b6320077e1d03f1bce5c269907e2b5b2a7bc type xfs (rw,relatime,nouuid,attr2,inode64,logbufs=8,logbsize=64k,sunit=128,swidth=128,noquota)
nsfs on /run/docker/netns/d72959cccaf9 type nsfs (rw)
In the container:
~ $ mount
/dev/mapper/docker-8:1-20185132-b4824e4ae8418b6c7d99c2d628b3d8def114a44359cd13bd9bc8b83253483ca2 on / type xfs (rw,relatime,nouuid,attr2,inode64,logbufs=8,logbsize=64k,sunit=128,swidth=128,noquota)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev type tmpfs (rw,nosuid,size=65536k,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=666)
sysfs on /sys type sysfs (ro,nosuid,nodev,noexec,relatime)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,relatime,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (ro,nosuid,nodev,noexec,relatime,xattr,name=systemd)
cgroup on /sys/fs/cgroup/memory type cgroup (ro,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/perf_event type cgroup (ro,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/cpuset type cgroup (ro,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (ro,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/pids type cgroup (ro,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/freezer type cgroup (ro,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/rdma type cgroup (ro,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/devices type cgroup (ro,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (ro,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (ro,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/blkio type cgroup (ro,nosuid,nodev,noexec,relatime,blkio)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
shm on /dev/shm type tmpfs (rw,nosuid,nodev,noexec,relatime,size=65536k)
/dev/sda1 on /etc/resolv.conf type ext4 (rw,relatime,stripe=32738)
/dev/sda1 on /etc/hostname type ext4 (rw,relatime,stripe=32738)
/dev/sda1 on /etc/hosts type ext4 (rw,relatime,stripe=32738)
devpts on /dev/console type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=666)
proc on /proc/bus type proc (ro,relatime)
proc on /proc/fs type proc (ro,relatime)
proc on /proc/irq type proc (ro,relatime)
proc on /proc/sys type proc (ro,relatime)
proc on /proc/sysrq-trigger type proc (ro,relatime)
tmpfs on /proc/asound type tmpfs (ro,relatime)
tmpfs on /proc/acpi type tmpfs (ro,relatime)
tmpfs on /proc/kcore type tmpfs (rw,nosuid,size=65536k,mode=755)
tmpfs on /proc/keys type tmpfs (rw,nosuid,size=65536k,mode=755)
tmpfs on /proc/latency_stats type tmpfs (rw,nosuid,size=65536k,mode=755)
tmpfs on /proc/timer_list type tmpfs (rw,nosuid,size=65536k,mode=755)
tmpfs on /proc/sched_debug type tmpfs (rw,nosuid,size=65536k,mode=755)
tmpfs on /proc/scsi type tmpfs (ro,relatime)
tmpfs on /sys/firmware type tmpfs (ro,relatime)
So as far as I can tell, the rootfs inside the container is not nosuid and
I also don't have anything mounted specially (except ~/.cache and
/root/.cache but those shouldn't matter)
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#47?email_source=notifications&email_token=AABI7YFHXSA77QTJ44K4ECTQ24GKHA5CNFSM4KAJIH42YY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4IC7AHXQ>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AABI7YGM5QGCS2H4UWD3S2DQ24GKHANCNFSM4KAJIH4Q>
.
|
|
Hm. Is your |
No^^ |
Hm. Do you have any filesystems mounted |
Unfortunately that's not the case either..
|
Trying on another PC (also Arch Linux but very standard setup):
Installing Do you know if Docker for mac does any special setup with binfmt maybe? |
I think this is related how binfmt_misc is registered for that arch. |
Ah found the issue now thanks to multiarch/qemu-user-static#17 and https://bbs.archlinux.org/viewtopic.php?id=242708 Basically changing the binfmt flag from |
Ah- yes quite possibly.
https://bbs.archlinux.org/viewtopic.php?id=242708 looks relevant
…On Sun, 29 Dec 2019, 13:11 Carlo Landmeter, ***@***.***> wrote:
I think this is related how binfmt_misc is registered for that arch.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#47?email_source=notifications&email_token=AABI7YERBXV44A3FSMRCUDDQ3CHVVA5CNFSM4KAJIH42YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEHY57ZY#issuecomment-569499623>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AABI7YGT3CGOJ3DW4IBI5E3Q3CHVVANCNFSM4KAJIH4Q>
.
|
Emails crossed in flight :) glad it's fixed, thanks @clandmeter!
…On Sun, 29 Dec 2019, 13:16 Richard Mortier, ***@***.***> wrote:
Ah- yes quite possibly.
https://bbs.archlinux.org/viewtopic.php?id=242708 looks relevant
On Sun, 29 Dec 2019, 13:11 Carlo Landmeter, ***@***.***>
wrote:
> I think this is related how binfmt_misc is registered for that arch.
>
> —
> You are receiving this because you commented.
> Reply to this email directly, view it on GitHub
> <#47?email_source=notifications&email_token=AABI7YERBXV44A3FSMRCUDDQ3CHVVA5CNFSM4KAJIH42YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEHY57ZY#issuecomment-569499623>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/AABI7YGT3CGOJ3DW4IBI5E3Q3CHVVANCNFSM4KAJIH4Q>
> .
>
|
(continued from #46)
Running
env DABUILD_ARCH=aarch64 dabuild -r
on an x86_64 machine results insudo: effective uid is not 0, is /usr/bin/sudo on a file system with the 'nosuid' option set or an NFS file system without root privileges?
being printed (tested with aarch64 & armv7)On the host:
In the container:
So as far as I can tell, the rootfs inside the container is not nosuid and I also don't have anything mounted specially (except
~/.cache
and/root/.cache
but those shouldn't matter)The text was updated successfully, but these errors were encountered: