Hello, (Cc: Reepca.) keinflue writes: > It seems that the "chown to overflowgid" issue is somewhat > widespread. I also see the testsuite for go (bootstrap) failing in the > same way. I'd guess most implementations of "chown" system call > wrappers in various languages will have test cases like this that fail > to anticipate user namespaces. I will let my system build keep running > a bit longer and will then post the list of packages I found with log > excerpts here. I think it would be best to support chown-to-supplementary-group even with the unprivileged daemon (specifically for the case where guix-daemon runs as a dedicated user, and that this user has one supplementary group, kvm). The attached patch tries to do that, by calling out to ‘newuidmap’, and under the assumption that /etc/subgid allows mapping the ‘kvm’ group. It does the job (a build process can chown to ‘kvm’), but I couldn’t get the GID mapping preserved across the ‘unshare’ call (the call that is made to “lock” mounts), hence the “#if 0” there. The problem is that when we call ‘unshare’, the ‘newgidmap’ setuid binary is not longer accessible because we’re already in a chroot, so it seems that we cannot preserve the GID map. Thoughts? Ludo’.