Replies: 1 comment 1 reply
-
Uncomment the rlimit lines until it works. As root (CAP_SYS_RESOURCE) is required to raise the hard limit which you have as real root running with --priviliged but never with rooless podman. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I am trying to run Minijail a sandbox tool a kind of bubblewrap and Nsjail within rootless Podman.
On my bare metal system running Pop OS (Ubuntu 22.04) with Podman 3.4.4, and on an Ubuntu Server 24.04 VM with Podman 4.9.3, I get the following result:
Meanwhile, trying the same command under Fedora 40 Server (Podman 5.1.0) yields this result:
Here is my minijail config
I run the containers with seccomp, AppArmor, and/or SELinux disabled, and with additional cap_sys_admin and cap_sys_resource capabilities.
There is no problem when running Podman as priviliged root or using Docker (version 26.1.4, build 5650f9b).
Here is my containerfile if anyone wants to reproduce the issue.
Any ideas on how to debug this? Thanks
Beta Was this translation helpful? Give feedback.
All reactions