Lix's seccomp rules still get applied when sandboxing is disabled #576
Labels
No labels
Affects/CppNix
Affects/Nightly
Affects/Only nightly
Affects/Stable
Area/build-packaging
Area/cli
Area/evaluator
Area/fetching
Area/flakes
Area/language
Area/lix ci
Area/nix-eval-jobs
Area/profiles
Area/protocol
Area/releng
Area/remote-builds
Area/repl
Area/repl/debugger
Area/store
bug
Context
contributors
Context
drive-by
Context
maintainers
Context
RFD
crash 💥
Cross Compilation
devx
docs
Downstream Dependents
E/easy
E/hard
E/help wanted
E/reproducible
E/requires rearchitecture
imported
Language/Bash
Language/C++
Language/NixLang
Language/Python
Language/Rust
Needs Langver
OS/Linux
OS/macOS
performance
regression
release-blocker
stability
Status
blocked
Status
invalid
Status
postponed
Status
wontfix
testing
testing/flakey
Topic/Large Scale Installations
ux
No milestone
No project
No assignees
3 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: lix-project/lix#576
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Describe the bug
When under a platform without user namespacing enabled it is necessary to disable the sandbox. This may itself be a bug but regardless once this is disabled, you can still get an error to load the BPF seccomp program if you are running under WSL 1. WSL 1 is not an ideal environment to run Lix but I can confirm that it is functional if you build a Lix binary tarball without seccomp support and feed that to the Lix installer.
Steps To Reproduce
Expected behavior
Installation to complete and function successfully like it does with my alternatively built copy of Lix.
nix --version
outputThis is one hundred percent intentional. Whether it's a good idea is another question, but the security of the daemon depends on seccomp due to the setuid stuff. Maybe that security issue should be mitigated in different ways (though this is generally likely to be a "lack of dev time" issue) but I'm pretty sure you're not the first one to complain about the seccomp.
This is also documented in the 2.90 release notes: https://git.lix.systems/lix-project/lix/src/branch/main/doc/manual/src/release-notes/rl-2.90.md