Replies: 2 comments 3 replies
-
Seems like you need CAP_SYS_ADMIN |
Beta Was this translation helpful? Give feedback.
0 replies
-
There are multiple layers of security all you did is turn off seccomp, but you still need to deal with Linux Capabilties like CAP_SYS_ADMIN. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Issue Description
I tried running openwrt using
--security-opt seccomp=unconfined
, but it seems to have failed.Steps to reproduce the issue
Steps to reproduce the issue
Describe the results you received
Fri Feb 2 16:43:18 2024 user.err : jail: failed to clone/fork: Operation not permitted
Jail was unable to run properly, and it seems that procd also broke down as a result.
However, it seems that
--cap-add SYS_ADMIN
is effective, allowing the jail to operate normally.Describe the results you expected
I am able to run openwrt normally in podman.
podman info output
Podman in a container
No
Privileged Or Rootless
Privileged
Upstream Latest Release
No
Additional environment details
physics
Additional information
logread.log
https://gist.github.com/daiaji/cbb1832c309b15af05279df88043e469
https://lxr.openwrt.org/source/procd/jail/jail.c
lxc/lxc-ci#586
coolsnowwolf/lede#10534
Beta Was this translation helpful? Give feedback.
All reactions