From debbugs-submit-bounces@debbugs.gnu.org Thu May 09 18:02:10 2019 Received: (at submit) by debbugs.gnu.org; 9 May 2019 22:02:10 +0000 Received: from localhost ([127.0.0.1]:36637 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hOr7C-0002hL-G1 for submit@debbugs.gnu.org; Thu, 09 May 2019 18:02:10 -0400 Received: from eggs.gnu.org ([209.51.188.92]:42957) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hOr7A-0002h7-8h for submit@debbugs.gnu.org; Thu, 09 May 2019 18:02:09 -0400 Received: from lists.gnu.org ([209.51.188.17]:32879) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hOr74-0001t1-UU for submit@debbugs.gnu.org; Thu, 09 May 2019 18:02:02 -0400 Received: from eggs.gnu.org ([209.51.188.92]:57335) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hOr73-0001K9-Bj for bug-guix@gnu.org; Thu, 09 May 2019 18:02:02 -0400 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org X-Spam-Level: X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_50,URIBL_BLOCKED autolearn=disabled version=3.3.2 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hOr72-0001pd-3V for bug-guix@gnu.org; Thu, 09 May 2019 18:02:01 -0400 Received: from pelzflorian.de ([5.45.111.108]:34238 helo=mail.pelzflorian.de) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hOr71-0001lR-HO for bug-guix@gnu.org; Thu, 09 May 2019 18:02:00 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id 86B96360038 for ; Fri, 10 May 2019 00:01:36 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557439296; bh=0opX5HL3UwtrhEoCvxTIzMdQiK9Z9mHC4WY4ivcVOqw=; h=Date:From:To:Subject; b=O5Aq2jM3hnhPNfUPAzUqtQ1KeRtpRnzJkjo4s4ODirAMxxnpK3+CRFlmO6sA4ebvz hcyLpBIMjq+Y8bbQOruq9yijkclBaoYtvsuMuR3tkssIal4dBA2hYWJew/K6RzFeqW ozBJfvC08MbtjAsdD8iPbdm2l21fVzTrIwiLsoIM= Date: Fri, 10 May 2019 00:01:36 +0200 From: "pelzflorian (Florian Pelz)" To: bug-guix@gnu.org Subject: Really relocatable binaries crash with Permission denied Message-ID: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline User-Agent: NeoMutt/20180716 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 5.45.111.108 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6.x X-Spam-Score: -1.4 (-) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -2.4 (--) The manual gives the following example of guix pack -RR: guix pack -RR -S /mybin=3Dbin bash tar xf pack.tar.gz ./mybin/sh This fails on my university=E2=80=99s server for students which uses Linu= x container =E2=80=9CVMs=E2=80=9D with Ubuntu and has no user namespace sup= port and Guix is not installed. This single line is all output: $ ./mybin/sh sh: run.c:162: bind_mount: Unexpected error: Permission denied. Note that PROOT_NO_SECCOMP=3D1 ~/gnu/store/iyd2ikxadcp89j5919pwja6swnx00493-proot-s= tatic-5.1.0/bin/proot -w $(pwd | sed 's/${HOME}//') -r ${HOME} -b /proc /= mybin/sh works just fine (inspired by ). For testing purposes, I compile the wrapper gnu/packages/aux-files/run-in-namespace.c: sed -i 's|@STORE_DIRECTORY@|/gnu/store|g' run-in-namespace.c sed -i 's|@WRAPPED_PROGRAM@|/mybin/sh|g' run-in-namespace.c gcc -std=3Dgnu99 -static -O0 -g -Wall run-in-namespace.c scp run-in-namespace.c a.out =E2=80=A6 # upload it to the university serv= er ssh =E2=80=A6 gdb a.out [=E2=80=A6] (gdb) break main Breakpoint 1 at 0x401ea1: file run-in-namespace.c, line 260. (gdb) run Starting program: /home/f_pelz12/a.out=20 Breakpoint 1, main (argc=3D1, argv=3D0x7fffffffe818) at run-in-namespace.= c:260 260 size =3D readlink ("/proc/self/exe", self, sizeof self - 1); (gdb) next 261 assert (size > 0); (gdb)=20 265 size_t index =3D strlen (self) (gdb)=20 268 char *store =3D strdup (self); (gdb)=20 269 store[index] =3D '\0'; (gdb)=20 277 if (strcmp (store, "/gnu/store") !=3D 0 (gdb)=20 278 && lstat ("/mybin/sh", &statbuf) !=3D 0) (gdb)=20 283 char *new_root =3D mkdtemp (strdup ("/tmp/guix-exec-XXXXXX")); (gdb)=20 284 char *new_store =3D concat (new_root, "/gnu/store"); (gdb)=20 285 char *cwd =3D get_current_dir_name (); (gdb)=20 292 pid_t child =3D syscall (SYS_clone, SIGCHLD | CLONE_NEWNS | CLO= NE_NEWUSER, (gdb)=20 [Detaching after fork from child process 12748] 294 switch (child) (gdb) a.out: run-in-namespace.c:162: bind_mount: Unexpected error: Permis= sion denied. 337 disallow_setgroups (child); (gdb)=20 a.out: run-in-namespace.c:205: disallow_setgroups: Unexpected error: Perm= ission denied. Program received signal SIGABRT, Aborted. 0x000000000040796f in raise () I do not know how to break into the detached child=E2=80=99s bind_mount c= all, so I am unable to give details on this bind_mount error (I do not know if the bind_mount really is the cause of the crash; it is futile anyway and the binary should just try proot after all and not crash before). A breakpoint from `break bind_mount` is ignored. Can I get more information out of this somehow? For completeness: $ uname -a Linux tux6 4.15.18-14-pve #1 SMP PVE 4.15.18-38 (Tue, 30 Apr 2019 10:51:3= 3 +0200) x86_64 x86_64 x86_64 GNU/Linux Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Fri May 10 01:55:06 2019 Received: (at 35662) by debbugs.gnu.org; 10 May 2019 05:55:06 +0000 Received: from localhost ([127.0.0.1]:36936 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hOyUs-0005ln-2Y for submit@debbugs.gnu.org; Fri, 10 May 2019 01:55:06 -0400 Received: from pelzflorian.de ([5.45.111.108]:48740 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hOyUp-0005le-WD for 35662@debbugs.gnu.org; Fri, 10 May 2019 01:55:05 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id 8D998360038 for <35662@debbugs.gnu.org>; Fri, 10 May 2019 07:54:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557467681; bh=Ro2alnUoS0LYmVMkUnBuzxfG2SDqueUzoSixC+Q4oF0=; h=Date:From:To:Subject:References:In-Reply-To; b=MuON2tbtwPgTLxE9LHAfj+VDl+hrgu02+6/l8u83Kyx1trEI/sYDzjNOvP0NMKD4b N1aJCDJxsIQUe+y+eTMH+HgI3E7cUvp/PPt5ELQxUWM3FzRkZ9+p8PQC8IVWoHIPfm 2juZYgRvJm1xLaR7QN3bl7Si8SueMw57B2ua1lDE= Date: Fri, 10 May 2019 07:54:41 +0200 From: "pelzflorian (Florian Pelz)" To: 35662@debbugs.gnu.org Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190510055441.whvcyxs4grbrnpys@pelzflorian.localdomain> References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Fri, May 10, 2019 at 12:01:36AM +0200, pelzflorian (Florian Pelz) wrote: > sed -i 's|@STORE_DIRECTORY@|/gnu/store|g' run-in-namespace.c > sed -i 's|@WRAPPED_PROGRAM@|/mybin/sh|g' run-in-namespace.c > gcc -std=gnu99 -static -O0 -g -Wall run-in-namespace.c I think it should have been sed -i 's|@STORE_DIRECTORY@|/gnu/store|g' run-in-namespace.c sed -i 's|@WRAPPED_PROGRAM@|/gnu/store/qn1ax1fkj16x280m1rv7mcimfmn9l2pf-bash-4.4.23/bin/sh|g' run-in-namespace.c echo '#define PROOT_PROGRAM "iyd2ikxadcp89j5919pwja6swnx00493-proot-static-5.1.0/bin/proot"' > new cat run-in-namespace.c >> new mv new run-in-namespace.c gcc -std=gnu99 -static -O0 -g -Wall run-in-namespace.c but it does not make a difference to the gdb output except the line > 278 && lstat ("/mybin/sh", &statbuf) != 0) Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Fri May 10 17:50:30 2019 Received: (at 35662) by debbugs.gnu.org; 10 May 2019 21:50:30 +0000 Received: from localhost ([127.0.0.1]:39332 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hPDPS-0005nZ-AO for submit@debbugs.gnu.org; Fri, 10 May 2019 17:50:30 -0400 Received: from eggs.gnu.org ([209.51.188.92]:37375) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hPDPQ-0005nM-4M for 35662@debbugs.gnu.org; Fri, 10 May 2019 17:50:28 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:56107) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hPDPK-0007Z8-Ak; Fri, 10 May 2019 17:50:22 -0400 Received: from [2a01:e0a:1d:7270:af76:b9b:ca24:c465] (port=39516 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hPDPJ-0007Ho-OW; Fri, 10 May 2019 17:50:22 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 21 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Fri, 10 May 2019 23:50:19 +0200 In-Reply-To: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Fri, 10 May 2019 00:01:36 +0200") Message-ID: <87o94ax9lw.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hello, "pelzflorian (Florian Pelz)" skribis: > The manual gives the following example of guix pack -RR: > > guix pack -RR -S /mybin=3Dbin bash > tar xf pack.tar.gz > ./mybin/sh > > This fails on my university=E2=80=99s server for students which uses Linux > container =E2=80=9CVMs=E2=80=9D with Ubuntu and has no user namespace sup= port and Guix > is not installed. This single line is all output: > > $ ./mybin/sh > sh: run.c:162: bind_mount: Unexpected error: Permission denied. That suggests the wrapper chose the user namespace method (not PRoot), but that didn=E2=80=99t quite work. Could you post the output of: strace ./mybin/sh ? TIA! Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Sat May 11 01:05:49 2019 Received: (at 35662) by debbugs.gnu.org; 11 May 2019 05:05:49 +0000 Received: from localhost ([127.0.0.1]:39688 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hPKCi-0000GU-S9 for submit@debbugs.gnu.org; Sat, 11 May 2019 01:05:49 -0400 Received: from pelzflorian.de ([5.45.111.108]:50046 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hPKCf-0000G4-Ju for 35662@debbugs.gnu.org; Sat, 11 May 2019 01:05:47 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id 1BDB6360038; Sat, 11 May 2019 07:05:19 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557551119; bh=CqzD/5BIru+eN+Yx877edqRbSXKR8U2uyJioY8y9F5s=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=KJTVL8LnM2M08yU/rfivJVrxayLmQ/5Uilyl6ro+oM2wy7VWxSWvYVCkYELKrD5Zl 80rRqbYVCAvS2l9SQ6laP7XTzWYr62+1rxjV9gdaZjN9Ff8buuo+Owp1Cms+DxWa1x 4PNQiJhps+7lklkU1EBkmj6P8WyRklIWTfKoRyfs= Date: Sat, 11 May 2019 07:05:18 +0200 From: "pelzflorian (Florian Pelz)" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <87o94ax9lw.fsf@gnu.org> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Fri, May 10, 2019 at 11:50:19PM +0200, Ludovic Courtès wrote: > That suggests the wrapper chose the user namespace method (not PRoot), > but that didn’t quite work. > > Could you post the output of: > > strace ./mybin/sh > > ? > [f_pelz12@tux6 ~]$ strace ./mybin/sh execve("./mybin/sh", ["./mybin/sh"], 0x7fffcdf87290 /* 39 vars */) = 0 brk(NULL) = 0x2301000 brk(0x23021c0) = 0x23021c0 arch_prctl(ARCH_SET_FS, 0x2301880) = 0 uname({sysname="Linux", nodename="tux6", ...}) = 0 readlink("/proc/self/exe", "/home/f_pelz12/gnu/store/wl2l59l"..., 4096) = 77 brk(0x23231c0) = 0x23231c0 brk(0x2324000) = 0x2324000 readlink("/proc/self/exe", "/home/f_pelz12/gnu/store/wl2l59l"..., 4095) = 77 lstat("/gnu/store/qn1ax1fkj16x280m1rv7mcimfmn9l2pf-bash-4.4.23/bin/sh", 0x7ffd9741c980) = -1 ENOENT (No such file or directory) gettimeofday({tv_sec=1557550876, tv_usec=116037}, NULL) = 0 getpid() = 28923 mkdir("/tmp/guix-exec-ABt7cT", 0700) = 0 stat(".", {st_mode=S_IFDIR|0700, st_size=113, ...}) = 0 stat("/home/f_pelz12", {st_mode=S_IFDIR|0700, st_size=113, ...}) = 0 clone(child_stack=NULL, flags=CLONE_NEWNS|CLONE_NEWUSER|SIGCHLD) = 28924 openat(AT_FDCWD, "/proc/28924/setgroups", O_WRONLY) = 3 write(3, "deny\0", 5) = 5 close(3) = 0 getuid() = 24038 openat(AT_FDCWD, "/proc/28924/uid_map", O_WRONLY) = 3 write(3, "24038 24038 1\n", 14) = 14 close(3) = 0 getgid() = 10004 openat(AT_FDCWD, "/proc/28924/gid_map", O_WRONLY) = 3 write(3, "10004 10004 1\n", 14) = 14 close(3) = 0 wait4(28924, sh: run.c:162: bind_mount: Unexpected error: Permission denied. [{WIFSIGNALED(s) && WTERMSIG(s) == SIGABRT}], 0, NULL) = 28924 --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_KILLED, si_pid=28924, si_uid=24038, si_status=SIGABRT, si_utime=0, si_stime=0} --- chdir("/") = 0 openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 fstat(3, {st_mode=S_IFDIR|0700, st_size=25, ...}) = 0 getdents64(3, /* 25 entries */, 131072) = 632 unlink("/tmp/guix-exec-ABt7cT/home") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/home", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 mmap(NULL, 135168, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f4e71c68000 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 munmap(0x7f4e71c68000, 135168) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/home") = 0 unlink("/tmp/guix-exec-ABt7cT/tmp") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/tmp", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 brk(0x2363000) = 0x2363000 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/tmp") = 0 unlink("/tmp/guix-exec-ABt7cT/mnt") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/mnt", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/mnt") = 0 unlink("/tmp/guix-exec-ABt7cT/sys") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/sys", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/sys") = 0 unlink("/tmp/guix-exec-ABt7cT/libx32") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/libx32", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/libx32") = 0 unlink("/tmp/guix-exec-ABt7cT/opt") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/opt", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/opt") = 0 unlink("/tmp/guix-exec-ABt7cT/srv") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/srv", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/srv") = 0 unlink("/tmp/guix-exec-ABt7cT/dev") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/dev", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/dev") = 0 unlink("/tmp/guix-exec-ABt7cT/var") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/var", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/var") = 0 unlink("/tmp/guix-exec-ABt7cT/sbin") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/sbin", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/sbin") = 0 unlink("/tmp/guix-exec-ABt7cT/lib64") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/lib64", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/lib64") = 0 unlink("/tmp/guix-exec-ABt7cT/lib32") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/lib32", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/lib32") = 0 unlink("/tmp/guix-exec-ABt7cT/media") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/media", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/media") = 0 unlink("/tmp/guix-exec-ABt7cT/usr") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/usr", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/usr") = 0 unlink("/tmp/guix-exec-ABt7cT/bin") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/bin", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/bin") = 0 unlink("/tmp/guix-exec-ABt7cT/boot") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/boot", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/boot") = 0 unlink("/tmp/guix-exec-ABt7cT/etc") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/etc", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/etc") = 0 unlink("/tmp/guix-exec-ABt7cT/run") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/run", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/run") = 0 unlink("/tmp/guix-exec-ABt7cT/core") = 0 unlink("/tmp/guix-exec-ABt7cT/snap") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/snap", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/snap") = 0 unlink("/tmp/guix-exec-ABt7cT/lib") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/lib", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/lib") = 0 unlink("/tmp/guix-exec-ABt7cT/proc") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/proc", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/proc") = 0 unlink("/tmp/guix-exec-ABt7cT/root") = -1 EISDIR (Is a directory) openat(AT_FDCWD, "/tmp/guix-exec-ABt7cT/root", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 getdents64(4, /* 2 entries */, 131072) = 48 getdents64(4, /* 0 entries */, 131072) = 0 close(4) = 0 rmdir("/tmp/guix-exec-ABt7cT/root") = 0 getdents64(3, /* 0 entries */, 131072) = 0 close(3) = 0 rmdir("/tmp/guix-exec-ABt7cT") = 0 exit_group(6) = ? +++ exited with 6 +++ Thank you for looking into it! Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Mon May 13 03:49:49 2019 Received: (at 35662) by debbugs.gnu.org; 13 May 2019 07:49:49 +0000 Received: from localhost ([127.0.0.1]:43983 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQ5iX-0001kg-3P for submit@debbugs.gnu.org; Mon, 13 May 2019 03:49:49 -0400 Received: from eggs.gnu.org ([209.51.188.92]:35515) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQ5iV-0001kU-9t for 35662@debbugs.gnu.org; Mon, 13 May 2019 03:49:47 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:40423) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQ5iP-0004K5-VR; Mon, 13 May 2019 03:49:42 -0400 Received: from [2001:660:6102:320:e120:2c8f:8909:cdfe] (port=41806 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hQ5iP-0001v6-JP; Mon, 13 May 2019 03:49:41 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 24 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Mon, 13 May 2019 09:49:40 +0200 In-Reply-To: <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Sat, 11 May 2019 07:05:18 +0200") Message-ID: <87ftpivlnv.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi Florian, "pelzflorian (Florian Pelz)" skribis: > On Fri, May 10, 2019 at 11:50:19PM +0200, Ludovic Court=C3=A8s wrote: >> That suggests the wrapper chose the user namespace method (not PRoot), >> but that didn=E2=80=99t quite work. >>=20 >> Could you post the output of: >>=20 >> strace ./mybin/sh >>=20 >> ? My bad, this should be: strace -f -o log ./mybin/sh and then post the =E2=80=98log=E2=80=99 file (we need =E2=80=98-f=E2=80=99 = because the problem happens in the child process.) Thanks in advance, Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Mon May 13 06:35:16 2019 Received: (at 35662) by debbugs.gnu.org; 13 May 2019 10:35:16 +0000 Received: from localhost ([127.0.0.1]:44220 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQ8Id-0002Is-90 for submit@debbugs.gnu.org; Mon, 13 May 2019 06:35:16 -0400 Received: from pelzflorian.de ([5.45.111.108]:53182 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQ8IZ-0002If-Gy for 35662@debbugs.gnu.org; Mon, 13 May 2019 06:35:13 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id 554BA360038; Mon, 13 May 2019 12:34:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557743681; bh=And9KIzgcpNaAgWnwTINb36tUVLJZCEyufhOXa/PF2o=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=ww0QkEF3pMR2vbD3LvLxNEsOnqLUl3GAb3TZU5AAd/MPEvWpLLUPkuA06UX/LolOS 18DycOmSEzrk+NRYrocY9O5w5Jva9fM/NWz1S4WKSnCUdRsMssDI+8hzu90QoI0xVz J0i+1O1NLVNBTbCj1w1vByhaf2vLh0zSkvebM53s= Date: Mon, 13 May 2019 12:34:40 +0200 From: "pelzflorian (Florian Pelz)" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="fw5hcwquyteywgtg" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <87ftpivlnv.fsf@gnu.org> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) --fw5hcwquyteywgtg Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit On Mon, May 13, 2019 at 09:49:40AM +0200, Ludovic Courtès wrote: > Hi Florian, > > "pelzflorian (Florian Pelz)" skribis: > > > On Fri, May 10, 2019 at 11:50:19PM +0200, Ludovic Courtès wrote: > >> That suggests the wrapper chose the user namespace method (not PRoot), > >> but that didn’t quite work. > >> > >> Could you post the output of: > >> > >> strace ./mybin/sh > >> > >> ? > > My bad, this should be: > > strace -f -o log ./mybin/sh > > and then post the ‘log’ file (we need ‘-f’ because the problem happens > in the child process.) > > Thanks in advance, > Ludo’. Oh I did not know there is -f. [f_pelz12@tux6 ~]$ strace -f -o log ./mybin/sh sh: run.c:162: bind_mount: Unexpected error: Permission denied. The log file is attached. When I do not use -o log, the unexpected error is here: [pid 36622] mount("//sys", "/tmp/guix-exec-85li6j/sys", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) [pid 36622] openat(AT_FDCWD, "/tmp/guix-exec-85li6j/core", O_WRONLY|O_CREAT, 056306) = 4 [pid 36622] close(4) = 0 [pid 36622] mount("//core", "/tmp/guix-exec-85li6j/core", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) [pid 36622] write(2, "sh: run.c:162: bind_mount: Unexp"..., 64sh: run.c:162: bind_mount: Unexpected error: Permission denied. ) = 64 [pid 36622] mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f4b024f4000 [pid 36622] rt_sigprocmask(SIG_UNBLOCK, [ABRT], NULL, 8) = 0 [pid 36622] rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [], 8) = 0 [pid 36622] getpid() = 36622 [pid 36622] gettid() = 36622 [pid 36622] tgkill(36622, 36622, SIGABRT) = 0 [pid 36622] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 [pid 36622] --- SIGABRT {si_signo=SIGABRT, si_code=SI_TKILL, si_pid=36622, si_uid=24038} --- [pid 36622] +++ killed by SIGABRT +++ Regards, Florian --fw5hcwquyteywgtg Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename=log 32476 execve("./mybin/sh", ["./mybin/sh"], 0x7ffddaa0d868 /* 39 vars */) = 0 32476 brk(NULL) = 0x2220000 32476 brk(0x22211c0) = 0x22211c0 32476 arch_prctl(ARCH_SET_FS, 0x2220880) = 0 32476 uname({sysname="Linux", nodename="tux6", ...}) = 0 32476 readlink("/proc/self/exe", "/home/f_pelz12/gnu/store/wl2l59l"..., 4096) = 77 32476 brk(0x22421c0) = 0x22421c0 32476 brk(0x2243000) = 0x2243000 32476 readlink("/proc/self/exe", "/home/f_pelz12/gnu/store/wl2l59l"..., 4095) = 77 32476 lstat("/gnu/store/qn1ax1fkj16x280m1rv7mcimfmn9l2pf-bash-4.4.23/bin/sh", 0x7ffd70f35830) = -1 ENOENT (No such file or directory) 32476 gettimeofday({tv_sec=1557741656, tv_usec=607561}, NULL) = 0 32476 getpid() = 32476 32476 mkdir("/tmp/guix-exec-eqHoYA", 0700) = 0 32476 stat(".", {st_mode=S_IFDIR|0700, st_size=114, ...}) = 0 32476 stat("/home/f_pelz12", {st_mode=S_IFDIR|0700, st_size=114, ...}) = 0 32476 clone(child_stack=NULL, flags=CLONE_NEWNS|CLONE_NEWUSER|SIGCHLD) = 32477 32476 openat(AT_FDCWD, "/proc/32477/setgroups", O_WRONLY) = 3 32477 openat(AT_FDCWD, "/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY 32476 write(3, "deny\0", 5 32477 <... openat resumed> ) = 3 32476 <... write resumed> ) = 5 32477 fstat(3, 32476 close(3) = 0 32477 <... fstat resumed> {st_mode=S_IFDIR|0755, st_size=25, ...}) = 0 32476 getuid() = 24038 32477 getdents64(3 32476 openat(AT_FDCWD, "/proc/32477/uid_map", O_WRONLY) = 3 32476 write(3, "24038 24038 1\n", 14) = 14 32477 <... getdents64 resumed> , /* 25 entries */, 32768) = 632 32476 close(3) = 0 32477 mkdir("/tmp/guix-exec-eqHoYA/lib", 0700 32476 getgid() = 10004 32476 openat(AT_FDCWD, "/proc/32477/gid_map", O_WRONLY) = 3 32476 write(3, "10004 10004 1\n", 14) = 14 32476 close(3) = 0 32476 wait4(32477, 32477 <... mkdir resumed> ) = 0 32477 mount("//lib", "/tmp/guix-exec-eqHoYA/lib", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/home", 0700) = 0 32477 mount("//home", "/tmp/guix-exec-eqHoYA/home", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/libx32", 0700) = 0 32477 mount("//libx32", "/tmp/guix-exec-eqHoYA/libx32", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/etc", 0700) = 0 32477 mount("//etc", "/tmp/guix-exec-eqHoYA/etc", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/run", 0700) = 0 32477 mount("//run", "/tmp/guix-exec-eqHoYA/run", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/sbin", 0700) = 0 32477 mount("//sbin", "/tmp/guix-exec-eqHoYA/sbin", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/media", 0700) = 0 32477 mount("//media", "/tmp/guix-exec-eqHoYA/media", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/lib32", 0700) = 0 32477 mount("//lib32", "/tmp/guix-exec-eqHoYA/lib32", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/lib64", 0700) = 0 32477 mount("//lib64", "/tmp/guix-exec-eqHoYA/lib64", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/bin", 0700) = 0 32477 mount("//bin", "/tmp/guix-exec-eqHoYA/bin", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/usr", 0700) = 0 32477 mount("//usr", "/tmp/guix-exec-eqHoYA/usr", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/boot", 0700) = 0 32477 mount("//boot", "/tmp/guix-exec-eqHoYA/boot", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/dev", 0700) = 0 32477 mount("//dev", "/tmp/guix-exec-eqHoYA/dev", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/var", 0700) = 0 32477 mount("//var", "/tmp/guix-exec-eqHoYA/var", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/root", 0700) = 0 32477 mount("//root", "/tmp/guix-exec-eqHoYA/root", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/proc", 0700) = 0 32477 mount("//proc", "/tmp/guix-exec-eqHoYA/proc", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/opt", 0700) = 0 32477 mount("//opt", "/tmp/guix-exec-eqHoYA/opt", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/srv", 0700) = 0 32477 mount("//srv", "/tmp/guix-exec-eqHoYA/srv", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/snap", 0700) = 0 32477 mount("//snap", "/tmp/guix-exec-eqHoYA/snap", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/mnt", 0700) = 0 32477 mount("//mnt", "/tmp/guix-exec-eqHoYA/mnt", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/tmp", 0700) = 0 32477 mount("//tmp", "/tmp/guix-exec-eqHoYA/tmp", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 mkdir("/tmp/guix-exec-eqHoYA/sys", 0700) = 0 32477 mount("//sys", "/tmp/guix-exec-eqHoYA/sys", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/core", O_WRONLY|O_CREAT, 0116306) = 4 32477 close(4) = 0 32477 mount("//core", "/tmp/guix-exec-eqHoYA/core", 0x47e0c5, MS_RDONLY|MS_BIND|MS_REC, NULL) = -1 EACCES (Permission denied) 32477 write(2, "sh: run.c:162: bind_mount: Unexp"..., 64) = 64 32477 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7ff846f5e000 32477 rt_sigprocmask(SIG_UNBLOCK, [ABRT], NULL, 8) = 0 32477 rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [], 8) = 0 32477 getpid() = 32477 32477 gettid() = 32477 32477 tgkill(32477, 32477, SIGABRT) = 0 32477 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 32477 --- SIGABRT {si_signo=SIGABRT, si_code=SI_TKILL, si_pid=32477, si_uid=24038} --- 32477 +++ killed by SIGABRT +++ 32476 <... wait4 resumed> [{WIFSIGNALED(s) && WTERMSIG(s) == SIGABRT}], 0, NULL) = 32477 32476 --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_KILLED, si_pid=32477, si_uid=24038, si_status=SIGABRT, si_utime=0, si_stime=0} --- 32476 chdir("/") = 0 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 32476 fstat(3, {st_mode=S_IFDIR|0700, st_size=25, ...}) = 0 32476 getdents64(3, /* 25 entries */, 131072) = 632 32476 unlink("/tmp/guix-exec-eqHoYA/lib32") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/lib32", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 mmap(NULL, 135168, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7ff846f3e000 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 munmap(0x7ff846f3e000, 135168) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/lib32") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/media") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/media", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 brk(0x2282000) = 0x2282000 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/media") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/etc") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/etc", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/etc") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/run") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/run", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/run") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/lib64") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/lib64", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/lib64") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/boot") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/boot", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/boot") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/bin") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/bin", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/bin") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/usr") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/usr", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/usr") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/lib") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/lib", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/lib") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/snap") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/snap", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/snap") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/core") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/proc") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/proc", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/proc") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/root") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/root", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/root") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/srv") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/srv", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/srv") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/home") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/home", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/home") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/opt") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/opt", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/opt") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/sys") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/sys", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/sys") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/tmp") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/tmp", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/tmp") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/mnt") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/mnt", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/mnt") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/sbin") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/sbin", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/sbin") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/libx32") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/libx32", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/libx32") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/var") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/var", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/var") = 0 32476 unlink("/tmp/guix-exec-eqHoYA/dev") = -1 EISDIR (Is a directory) 32476 openat(AT_FDCWD, "/tmp/guix-exec-eqHoYA/dev", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 32476 fstat(4, {st_mode=S_IFDIR|0700, st_size=2, ...}) = 0 32476 getdents64(4, /* 2 entries */, 131072) = 48 32476 getdents64(4, /* 0 entries */, 131072) = 0 32476 close(4) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA/dev") = 0 32476 getdents64(3, /* 0 entries */, 131072) = 0 32476 close(3) = 0 32476 rmdir("/tmp/guix-exec-eqHoYA") = 0 32476 exit_group(6) = ? 32476 +++ exited with 6 +++ --fw5hcwquyteywgtg-- From debbugs-submit-bounces@debbugs.gnu.org Mon May 13 09:54:21 2019 Received: (at 35662) by debbugs.gnu.org; 13 May 2019 13:54:21 +0000 Received: from localhost ([127.0.0.1]:44492 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQBPJ-0002Ny-9X for submit@debbugs.gnu.org; Mon, 13 May 2019 09:54:21 -0400 Received: from eggs.gnu.org ([209.51.188.92]:46716) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQBPH-0002Nj-FX for 35662@debbugs.gnu.org; Mon, 13 May 2019 09:54:19 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:44854) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQBPC-0000Vp-6k; Mon, 13 May 2019 09:54:14 -0400 Received: from [2001:660:6102:320:e120:2c8f:8909:cdfe] (port=43602 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hQBPB-0001Xm-Ei; Mon, 13 May 2019 09:54:13 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 24 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Mon, 13 May 2019 15:54:11 +0200 In-Reply-To: <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Mon, 13 May 2019 12:34:40 +0200") Message-ID: <87r292qx30.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi Florian, "pelzflorian (Florian Pelz)" skribis: > 32476 clone(child_stack=3DNULL, flags=3DCLONE_NEWNS|CLONE_NEWUSER|SIGCHLD= ) =3D 32477 [...] > 32477 mount("//lib", "/tmp/guix-exec-eqHoYA/lib", 0x47e0c5, MS_RDONLY|MS_= BIND|MS_REC, NULL) =3D -1 EACCES (Permission denied) > 32477 mkdir("/tmp/guix-exec-eqHoYA/home", 0700) =3D 0 > 32477 mount("//home", "/tmp/guix-exec-eqHoYA/home", 0x47e0c5, MS_RDONLY|M= S_BIND|MS_REC, NULL) =3D -1 EACCES (Permission denied) This is weird. On a machine without Guix and with =E2=80=9Cproper=E2=80=9D= user namespace support, I see: --8<---------------cut here---------------start------------->8--- 4519 clone(child_stack=3D0, flags=3DCLONE_NEWNS|CLONE_NEWUSER|SIGCHLD) =3D= 4520 [...] 4520 mkdir("/tmp/guix-exec-4lVNRO/tmp", 0700) =3D 0 4520 mount("//tmp", "/tmp/guix-exec-4lVNRO/tmp", 0x47e0cc, MS_RDONLY|MS_BI= ND|MS_REC, NULL) =3D 0 4520 mkdir("/tmp/guix-exec-4lVNRO/boot", 0700) =3D 0 4520 mount("//boot", "/tmp/guix-exec-4lVNRO/boot", 0x47e0cc, MS_RDONLY|MS_= BIND|MS_REC, NULL) =3D 0 --8<---------------cut here---------------end--------------->8--- That is, all bind-mount operations in the child process, which lives in a separate namespace, succeed. Can you show the mount options of you root file system? mount | grep 'on / ' What=E2=80=99s the exit code of this command: guile -c '((@@ (guix scripts environment) assert-container-features))' ? Thanks for helping out! Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Mon May 13 11:18:10 2019 Received: (at 35662) by debbugs.gnu.org; 13 May 2019 15:18:10 +0000 Received: from localhost ([127.0.0.1]:45954 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQCiQ-00070y-8k for submit@debbugs.gnu.org; Mon, 13 May 2019 11:18:10 -0400 Received: from pelzflorian.de ([5.45.111.108]:53452 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQCiN-00070m-OM for 35662@debbugs.gnu.org; Mon, 13 May 2019 11:18:08 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id D872E360038; Mon, 13 May 2019 17:17:36 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557760656; bh=0IMlwDm9+8iPdazIKw/CTa/QLNOSg2VHYNW7B5Vq5V0=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=nVKOdy5VMgGxrHgTAII1WSMaBjs/ajgrz2dQYux8o/VaTROmeMWkCY1bAYTHdsUDR knSVpXpF/Gyxw5KXeN+WC1EwSrv3RB6H5MXJFFX8tMDWaDicU156OtNUiuPMJ0myRZ TpCnk+xRx27xv6XZQ43P/d3GHqY+yNOTp1pjyKbk= Date: Mon, 13 May 2019 17:17:36 +0200 From: "pelzflorian (Florian Pelz)" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <87r292qx30.fsf@gnu.org> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Mon, May 13, 2019 at 03:54:11PM +0200, Ludovic Courtès wrote: > Can you show the mount options of you root file system? > > mount | grep 'on / ' > [f_pelz12@tux6 ~]$ mount | grep 'on / ' rpool/data/subvol-161199-disk-0 on / type zfs (rw,noatime,xattr,posixacl) > What’s the exit code of this command: > > guile -c '((@@ (guix scripts environment) assert-container-features))' > > ? > Guix is not installed. Using a Guix git repository in ~/guix: [f_pelz12@tux6 guix]$ guile -c '((@@ (guix scripts environment) assert-container-features))' […] ;;; In procedure scm_lreadr: guix/packages.scm:534:11: Unknown # object: #\~ ERROR: In procedure primitive-load-path: In procedure scm_lreadr: guix/packages.scm:534:11: Unknown # object: #\~ The line in question is: #~(begin (use-modules (ice-9 ftw) I do not see how to make it recognize gexps. If I wanted to compile Guix myself, the configure script reports various missing dependencies (guile-gnutls is among them). I could ask the admin tomorrow if they could set up guix on a test “virtual machine”/container. I will instead now try this from gnu/build/linux-container.scm: scheme@(guile-user)> (define (user-namespace-supported?) "Return #t if user namespaces are supported on this system." (file-exists? "/proc/self/ns/user")) (define (unprivileged-user-namespace-supported?) "Return #t if user namespaces can be created by unprivileged users." (let ((userns-file "/proc/sys/kernel/unprivileged_userns_clone")) (if (file-exists? userns-file) (eqv? #\1 (call-with-input-file userns-file read-char)) #t))) (define (setgroups-supported?) "Return #t if the setgroups proc file, introduced in Linux-libre 3.19, exists." (file-exists? "/proc/self/setgroups")) scheme@(guile-user)> (user-namespace-supported?) $1 = #t scheme@(guile-user)> (unprivileged-user-namespace-supported?) $2 = #t scheme@(guile-user)> (setgroups-supported?) $3 = #t Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Mon May 13 16:39:33 2019 Received: (at 35662) by debbugs.gnu.org; 13 May 2019 20:39:33 +0000 Received: from localhost ([127.0.0.1]:46442 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQHjR-0006ka-3u for submit@debbugs.gnu.org; Mon, 13 May 2019 16:39:33 -0400 Received: from eggs.gnu.org ([209.51.188.92]:58261) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQHjN-0006kM-Dq for 35662@debbugs.gnu.org; Mon, 13 May 2019 16:39:29 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:51154) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQHjI-0005Sw-5j; Mon, 13 May 2019 16:39:24 -0400 Received: from [2a01:e0a:1d:7270:af76:b9b:ca24:c465] (port=33650 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hQHjH-000159-Ot; Mon, 13 May 2019 16:39:23 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 24 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Mon, 13 May 2019 22:39:21 +0200 In-Reply-To: <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Mon, 13 May 2019 17:17:36 +0200") Message-ID: <87tvdyozra.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) "pelzflorian (Florian Pelz)" skribis: > On Mon, May 13, 2019 at 03:54:11PM +0200, Ludovic Court=C3=A8s wrote: >> Can you show the mount options of you root file system? >>=20 >> mount | grep 'on / ' >>=20 > > [f_pelz12@tux6 ~]$ mount | grep 'on / ' > rpool/data/subvol-161199-disk-0 on / type zfs (rw,noatime,xattr,posixacl) I suspect ZFS-on-Linux (right?) is doing something unusual here: mount(2) specifies the following reasons for EACCESS, and I don=E2=80=99t s= ee anything that would apply: --8<---------------cut here---------------start------------->8--- EACCES A component of a path was not searchable. (See also path_resolution= (7).) EACCES Mounting a read-only filesystem was attempted without giving the MS_RDONLY flag. The file system may be read-only for various reasons, including: it resides on a read-only optical disk; it is resides on a device with a physical switch that has been set to mark the device read- only; the filesystem implementation was compiled with read-only support; or errors were detected when initially mounting the filesystem, so that it was marked read-only and can't be remounted as read-write (until the errors are fixed). Some filesystems instead return the error EROFS on an attempt to mount a read-only filesystem. EACCES The block device source is located on a filesystem mounted with the MS_NODEV option. --8<---------------cut here---------------end--------------->8--- What do the following commands do on this system? --8<---------------cut here---------------start------------->8--- $ mkdir -p /tmp/test/lib $ unshare -mrf mount /lib /tmp/test/lib -o bind,readonly --8<---------------cut here---------------end--------------->8--- Thanks, Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Mon May 13 16:45:58 2019 Received: (at 35662) by debbugs.gnu.org; 13 May 2019 20:45:58 +0000 Received: from localhost ([127.0.0.1]:46462 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQHpe-0007q3-Hc for submit@debbugs.gnu.org; Mon, 13 May 2019 16:45:58 -0400 Received: from pelzflorian.de ([5.45.111.108]:53778 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQHpc-0007n5-CP for 35662@debbugs.gnu.org; Mon, 13 May 2019 16:45:57 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id 22780360038; Mon, 13 May 2019 22:45:25 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557780325; bh=SoMhkxzz67/xDmSP/XPTSAIyY1rF3hJs1PIJ0fhgOGI=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=GTDRW7Rurvzw5E/KjIA91b/bdoQlnBR50XysDvVHrMXpcKlmcXnU/eSj0KN8J0VrL 47K/s4irrYKR4TrZ7pC99+2RvdxP7c25Ps/asMIlmwQI7csquWOiw8WZYTVrR1KSbz eIGDlEu/rVIYGNXcwAyJkJ+hlfz7ORDpqmO5TGfI= Date: Mon, 13 May 2019 22:45:24 +0200 From: "pelzflorian (Florian Pelz)" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <87tvdyozra.fsf@gnu.org> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Mon, May 13, 2019 at 10:39:21PM +0200, Ludovic Courts wrote: > I suspect ZFS-on-Linux (right?) is doing something unusual here: I suppose it is ZFS on Linux; it is Linux, I can ask the admins if it could be something else. > What do the following commands do on this system? > > --8<---------------cut here---------------start------------->8--- > $ mkdir -p /tmp/test/lib > $ unshare -mrf mount /lib /tmp/test/lib -o bind,readonly > --8<---------------cut here---------------end--------------->8--- > [f_pelz12@tux6 ~]$ mkdir -p /tmp/test/lib [f_pelz12@tux6 ~]$ unshare -mrf mount /lib /tmp/test/lib -o bind,readonly unshare: cannot change root filesystem propagation: Permission denied Thank *you*, Ludo! A working guix pack would be helpful for me. Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Tue May 14 04:06:01 2019 Received: (at 35662) by debbugs.gnu.org; 14 May 2019 08:06:01 +0000 Received: from localhost ([127.0.0.1]:47162 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQSRl-0008Us-AG for submit@debbugs.gnu.org; Tue, 14 May 2019 04:06:01 -0400 Received: from pelzflorian.de ([5.45.111.108]:54374 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQSRh-0008Uf-GG for 35662@debbugs.gnu.org; Tue, 14 May 2019 04:06:00 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id A4722360038; Tue, 14 May 2019 10:05:25 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557821125; bh=AVUbPOD/KV+aocGt0H+5900mEnPkaBuGkKT1rI8jGrw=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=SeweJGgTJHQO718xBWxy3ukLiwnSihgX3UjDQ0GJDK85ywVH/LyuzizVzObzeTAhA tslWfU1U3gYbknzpC/t9/qh2lFb4D1JSRyIai13Eq4tWtXzSh6kD0C7MIAOiH6vENn LgfdJhXAbJ4i/tIvYvCQLV8OV8s8M6MS2fvNjZ3Y= Date: Tue, 14 May 2019 10:05:25 +0200 From: "pelzflorian (Florian Pelz)" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Mon, May 13, 2019 at 10:45:24PM +0200, pelzflorian (Florian Pelz) wrote: > On Mon, May 13, 2019 at 10:39:21PM +0200, Ludovic Courtès wrote: > > I suspect ZFS-on-Linux (right?) is doing something unusual here: > > I suppose it is ZFS on Linux; it is Linux, I can ask the admins if it > could be something else. > The admins have confirmed that they use “Proxmox on ZFS” (judging from it is ZFS on Linux) and they have confirmed that they have disabled user namespaces in their Proxmox settings. Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Tue May 14 16:44:09 2019 Received: (at 35662) by debbugs.gnu.org; 14 May 2019 20:44:09 +0000 Received: from localhost ([127.0.0.1]:49991 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQeHR-0004tt-1D for submit@debbugs.gnu.org; Tue, 14 May 2019 16:44:09 -0400 Received: from eggs.gnu.org ([209.51.188.92]:50942) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQeHP-0004tV-Fv for 35662@debbugs.gnu.org; Tue, 14 May 2019 16:44:08 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:42343) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQeHJ-00065I-4B; Tue, 14 May 2019 16:44:01 -0400 Received: from [2a01:e0a:1d:7270:af76:b9b:ca24:c465] (port=37308 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hQeHI-0000Ou-LO; Tue, 14 May 2019 16:44:00 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 25 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Tue, 14 May 2019 22:43:56 +0200 In-Reply-To: <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Tue, 14 May 2019 10:05:25 +0200") Message-ID: <87h89wydf7.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) "pelzflorian (Florian Pelz)" skribis: > On Mon, May 13, 2019 at 10:45:24PM +0200, pelzflorian (Florian Pelz) wrot= e: >> On Mon, May 13, 2019 at 10:39:21PM +0200, Ludovic Court=C3=A8s wrote: >> > I suspect ZFS-on-Linux (right?) is doing something unusual here: >>=20 >> I suppose it is ZFS on Linux; it is Linux, I can ask the admins if it >> could be something else. >>=20 > > The admins have confirmed that they use =E2=80=9CProxmox on ZFS=E2=80=9D = (judging from > it is ZFS on Linux) and > they have confirmed that they have disabled user namespaces in their > Proxmox settings. User namespaces are orthogonal to file systems, but anyway it looks like ZFS is refusing to let us do these things. I don=E2=80=99t have any great option to offer. You could perhaps modify run-in-namespace.c so that it doesn=E2=80=99t even try user namespaces and instead goes directly to the PRoot option? However working around this behavior of ZFS it not completely trivial and I=E2=80=99m not sure we should put much energy to paper over non-standa= rd file system behavior. Thoughts? Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Tue May 14 17:05:28 2019 Received: (at 35662) by debbugs.gnu.org; 14 May 2019 21:05:28 +0000 Received: from localhost ([127.0.0.1]:50045 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQec4-0005Uu-D9 for submit@debbugs.gnu.org; Tue, 14 May 2019 17:05:28 -0400 Received: from pelzflorian.de ([5.45.111.108]:55132 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQec2-0005Uk-Ll for 35662@debbugs.gnu.org; Tue, 14 May 2019 17:05:27 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id E6F0E360038; Tue, 14 May 2019 23:04:53 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1557867894; bh=KkFJL/+eq3F4NN2owT/JAjTSu6Z2eM8TsRhKagXuvvQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=ZkecO/VlLGLGPfAljBuGo764KTgpPDvlVz8/QwrXd6I/f90EKtW264RzDFLKu0Was proRcxJMYJRff3Whnawy3ifB6vvV9bAyAhY7xqPHKtFpaGLB/hSdbdDpnmPzD/kRsD S4WJ1RyZFicow9FqHDsB5jW/3d9Uus9F0BPThgzk= Date: Tue, 14 May 2019 23:04:53 +0200 From: "pelzflorian (Florian Pelz)" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190514210453.2p7x3ibpgohwaxot@pelzflorian.localdomain> References: <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> <87h89wydf7.fsf@gnu.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <87h89wydf7.fsf@gnu.org> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Tue, May 14, 2019 at 10:43:56PM +0200, Ludovic Courtès wrote: > "pelzflorian (Florian Pelz)" skribis: > > > On Mon, May 13, 2019 at 10:45:24PM +0200, pelzflorian (Florian Pelz) wrote: > >> On Mon, May 13, 2019 at 10:39:21PM +0200, Ludovic Courtès wrote: > >> > I suspect ZFS-on-Linux (right?) is doing something unusual here: > >> > >> I suppose it is ZFS on Linux; it is Linux, I can ask the admins if it > >> could be something else. > >> > > > > The admins have confirmed that they use “Proxmox on ZFS” (judging from > > it is ZFS on Linux) and > > they have confirmed that they have disabled user namespaces in their > > Proxmox settings. > > User namespaces are orthogonal to file systems, but anyway it looks like > ZFS is refusing to let us do these things. > Do I understand correctly that user namespaces are not really disabled (?) but fail on ZFS? This seems strange, but a Web search for “zfs user namespaces” shows other people having trouble with this combination. The admins told me they had to disable user namespaces because it caused some kind of trouble. > I don’t have any great option to offer. You could perhaps modify > run-in-namespace.c so that it doesn’t even try user namespaces and > instead goes directly to the PRoot option? > > However working around this behavior of ZFS it not completely trivial > and I’m not sure we should put much energy to paper over non-standard > file system behavior. > > Thoughts? > If ZFS makes user namespaces fail, then could run-un-namespace.c fall back to PRoot when detecting ZFS, somehow? Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Wed May 15 11:20:42 2019 Received: (at 35662) by debbugs.gnu.org; 15 May 2019 15:20:42 +0000 Received: from localhost ([127.0.0.1]:53188 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQvhx-0007jZ-MT for submit@debbugs.gnu.org; Wed, 15 May 2019 11:20:42 -0400 Received: from ns13.heimat.it ([46.4.214.66]:58128) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQvht-0007jE-Fq for 35662@debbugs.gnu.org; Wed, 15 May 2019 11:20:38 -0400 Received: from localhost (ip6-localhost [127.0.0.1]) by ns13.heimat.it (Postfix) with ESMTP id B56333021A1; Wed, 15 May 2019 15:20:31 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at ns13.heimat.it Received: from ns13.heimat.it ([127.0.0.1]) by localhost (ns13.heimat.it [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iXyRVJMH42Yn; Wed, 15 May 2019 15:20:30 +0000 (UTC) Received: from bourrache.mug.xelera.it (unknown [93.56.161.211]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by ns13.heimat.it (Postfix) with ESMTPSA id D29273021A0; Wed, 15 May 2019 15:20:29 +0000 (UTC) Received: from roquette.mug.biscuolo.net (roquette.mug.biscuolo.net [10.38.2.14]) by bourrache.mug.xelera.it (Postfix) with SMTP id D4471300A04; Wed, 15 May 2019 17:20:28 +0200 (CEST) Received: (nullmailer pid 3340 invoked by uid 1000); Wed, 15 May 2019 15:20:27 -0000 From: Giovanni Biscuolo To: Ludovic =?utf-8?Q?Court=C3=A8s?= , "pelzflorian (Florian Pelz)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied In-Reply-To: <87h89wydf7.fsf@gnu.org> Organization: Xelera.eu References: <20190509220136.tli7um2heocifrpq@pelzflorian.localdomain> <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> <87h89wydf7.fsf@gnu.org> Date: Wed, 15 May 2019 17:20:25 +0200 Message-ID: <87pnojd9s6.fsf@roquette.mug.biscuolo.net> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hello Ludovic and Florian, I cannot help here, just some thoughts as you probably already know, Florian, ZFS is not supported in Linux for various reasons, above all for a controversial licensing problem [1] so using zfsonlinux (the ZFS Linux unofficial kernel module) is basically calling for problems Ludovic Court=C3=A8s writes: > "pelzflorian (Florian Pelz)" skribis: [...] >> The admins have confirmed that they use =E2=80=9CProxmox on ZFS=E2=80=9D= (judging from >> it is ZFS on Linux) it's not clearly stated there, I guess it's https://github.com/zfsonlinux/zfs >> and >> they have confirmed that they have disabled user namespaces in their >> Proxmox settings. I do not understand what this means: if namespaces are disabled **in kernel** that whould be detected and guix relocatable binaries should use PRoot by default: am I wrong? If "disabled user namespace in Promox settings" means it have something to do with ZFS filesystem settings, well: it's unorthodox at least :-) > User namespaces are orthogonal to file systems, but anyway it looks like > ZFS is refusing to let us do these things. I don't know if this have something to do with this bug, but: ZFS is confused by user namespaces (uid/gid mapping) when used with acltype= =3Dposixacl https://github.com/zfsonlinux/zfs/issues/4177 Florian: it should be solved but AFAIU it depends on the kernel/zfsonlinux combination > I don=E2=80=99t have any great option to offer. You could perhaps modify > run-in-namespace.c so that it doesn=E2=80=99t even try user namespaces and > instead goes directly to the PRoot option? Ludovic (and others): is it possible to add an option to "guix pack -RR" (-RRF?!?) to force the use of PRoot for resulting relocated binaries? > However working around this behavior of ZFS it not completely trivial > and I=E2=80=99m not sure we should put much energy to paper over non-stan= dard > file system behavior. I agree, this seems a zfsonlinux bug: Florian please can you report it upstream to zfsonlinux? [...] HTH! Gio' [1] https://www.fsf.org/licensing/zfs-and-linux https://sfconservancy.org/blog/2016/feb/25/zfs-and-linux/ =2D-=20 Giovanni Biscuolo Xelera IT Infrastructures --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEERcxjuFJYydVfNLI5030Op87MORIFAlzcLjsACgkQ030Op87M ORKDGQ//R7qR24I2QNzA3ZTusVarDD1+SXrMOaUIFynFqEx+c+PVEAs+YtMGbgsY hgGaNQu8SgboRIV5F/oMv3d5hauwYTPCSJx9vigoG+xTxzXtbggzFRKMOStHqVTf 9tMc4GoWzoEOzH/6GoPbvpwgkkViCqjO/yvWf2mh+eyGPHxzpAWfy2l6Ql+PP5Iz l5vsLkBTk1QvfwxJ6y0EVfEzdk0d/yJuAQnHlGYvBVYxhbF2oRXMqAEhMeXOG3FU pONsRzMB8/gn/HbQaxQWu56nrnz2Ps7lSOOrDaipJTXiRbe+aJcPAvgQV90t6hEM dbuQ2P+B1jO4UjMFdyOU8lsqi9d4DvPFD5iS9b59K2DpLZRlZLFLp1DieubVh3e6 WSXcTPz4f3cy09SjXOu99gWchBJsc37XttPMFEicbHToSzU8nN4Alr1CWyCE+E00 9CV/VFRBA2YrsMFw0cV/1CkIJigl+ijfhKoJjasfzxhSNF/xi42v4Sx9EO0kzY6d ilkjgDPm7ZUb0KoqjGqgOf9BgfKXol78CqNrhV0xNzxNXEYrvLXwAch7ZLp98riW g83Eciok2tE57yNpgggqQonb074mOiGuZD3CWpZF9aviiux7oBFUY+Sc9UmftrL0 KLvvdlQf2h8B5xwI5osJ3C3Uf3wra0teAECZJquLzW0Tp1dYv0E= =4A1m -----END PGP SIGNATURE----- --=-=-=-- From debbugs-submit-bounces@debbugs.gnu.org Wed May 15 12:15:31 2019 Received: (at 35662) by debbugs.gnu.org; 15 May 2019 16:15:31 +0000 Received: from localhost ([127.0.0.1]:53239 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQwZ0-0002kq-Vs for submit@debbugs.gnu.org; Wed, 15 May 2019 12:15:31 -0400 Received: from eggs.gnu.org ([209.51.188.92]:41456) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hQwYz-0002kb-0O for 35662@debbugs.gnu.org; Wed, 15 May 2019 12:15:29 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:59732) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQwYt-0000Kj-DI; Wed, 15 May 2019 12:15:23 -0400 Received: from [2a01:e0a:1d:7270:af76:b9b:ca24:c465] (port=42148 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hQwYs-0006fQ-Mf; Wed, 15 May 2019 12:15:23 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <87o94ax9lw.fsf@gnu.org> <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> <87h89wydf7.fsf@gnu.org> <20190514210453.2p7x3ibpgohwaxot@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 26 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Wed, 15 May 2019 18:15:19 +0200 In-Reply-To: <20190514210453.2p7x3ibpgohwaxot@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Tue, 14 May 2019 23:04:53 +0200") Message-ID: <87d0kju220.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi, "pelzflorian (Florian Pelz)" skribis: > Do I understand correctly that user namespaces are not really disabled > (?) but fail on ZFS? Correct. Specifically, read-only bind mounts of (and to?) files that reside on ZFS fail with EACCESS, which is normally =E2=80=9Cimpossible.=E2= =80=9D It would be great if you could ask the admins specifically what they did in relation to user namespaces. >> I don=E2=80=99t have any great option to offer. You could perhaps modify >> run-in-namespace.c so that it doesn=E2=80=99t even try user namespaces a= nd >> instead goes directly to the PRoot option? >> >> However working around this behavior of ZFS it not completely trivial >> and I=E2=80=99m not sure we should put much energy to paper over non-sta= ndard >> file system behavior. >>=20 >> Thoughts? >> > > If ZFS makes user namespaces fail, then could run-un-namespace.c fall > back to PRoot when detecting ZFS, somehow? It=E2=80=99s code, so everything is possible :-), but like I wrote it=E2=80= =99s a bit of work, and it=E2=80=99s something that cannot happen (AFAIK) with file syste= ms that are part of Linux. Thanks, Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Thu May 16 07:03:37 2019 Received: (at 35662) by debbugs.gnu.org; 16 May 2019 11:03:37 +0000 Received: from localhost ([127.0.0.1]:54420 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hREAj-00013R-Jp for submit@debbugs.gnu.org; Thu, 16 May 2019 07:03:37 -0400 Received: from pelzflorian.de ([5.45.111.108]:57284 helo=mail.pelzflorian.de) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hREAh-00013H-2i for 35662@debbugs.gnu.org; Thu, 16 May 2019 07:03:36 -0400 Received: from pelzflorian.localdomain (unknown [5.45.111.108]) by mail.pelzflorian.de (Postfix) with ESMTPSA id 80CA0360038; Thu, 16 May 2019 13:02:57 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pelzflorian.de; s=mail; t=1558004577; bh=9sAJvqw5Xvr4bo82SvYLMv8adIPJBDyRLxe387Hny1A=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=ZSGXBem9P4BSBL9Ctm7DaCaVLiWYtZ6zoetdzyaO1sGgc7hinGXoGpb3RU+flxwD7 k+x/qMzbSv62/5nH3f4AtOiDvDaTNc9T6BQw0DdT69GxcSGVEYgpTbhPK2l5+D5FhS kFFH0vt9odSbE3JV/GNruUCNMFDiQutrPJrCZ6NU= Date: Thu, 16 May 2019 13:02:57 +0200 From: "pelzflorian (Florian Pelz)" To: Giovanni Biscuolo Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied Message-ID: <20190516110257.f3ftexzyk2c5akw5@pelzflorian.localdomain> References: <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> <87h89wydf7.fsf@gnu.org> <87pnojd9s6.fsf@roquette.mug.biscuolo.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87pnojd9s6.fsf@roquette.mug.biscuolo.net> User-Agent: NeoMutt/20180716 X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 35662 Cc: Ludovic =?utf-8?Q?Court=C3=A8s?= , 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) On Wed, May 15, 2019 at 05:20:25PM +0200, Giovanni Biscuolo wrote: > Hello Ludovic and Florian, > > I cannot help here, just some thoughts > > as you probably already know, Florian, ZFS is not supported in Linux for > various reasons, above all for a controversial licensing problem [1] > I had forgotten. I remember now that I heard about this. >From a Guix point of view, I believe this maybe should be a WONT-FIX/NOT-OUR-BUG. I will try and set up current ZFS 0.7.13 and test if guix pack -RR works there in a week. Feel free to skip this unless you are interested: I asked the admins again. They are using Proxmox 5.4. They say they have disabled user namespaces by commenting the corresponding line in the Proxmox config file (but I am unsure if this just disables Linux Container use of user namespaces or something). They use the ZFS from Proxmox. I looked and found confirmation that this Proxmox uses current ZFS 0.7.13 at: https://pve.proxmox.com/wiki/Roadmap http://download.proxmox.com/debian/pve/dists/stretch/pve-no-subscription/binary-amd64/ > I agree, this seems a zfsonlinux bug: Florian please can you report it > upstream to zfsonlinux? > I will try to reproduce on a private PC in a week, then I can report. Regards, Florian From debbugs-submit-bounces@debbugs.gnu.org Thu May 16 07:10:38 2019 Received: (at 35662) by debbugs.gnu.org; 16 May 2019 11:10:38 +0000 Received: from localhost ([127.0.0.1]:54431 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hREHW-0001D5-Cc for submit@debbugs.gnu.org; Thu, 16 May 2019 07:10:38 -0400 Received: from eggs.gnu.org ([209.51.188.92]:45064) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hREHP-0001Ch-FB for 35662@debbugs.gnu.org; Thu, 16 May 2019 07:10:34 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:47744) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hREHJ-0007gx-12; Thu, 16 May 2019 07:10:25 -0400 Received: from [2001:660:6102:320:e120:2c8f:8909:cdfe] (port=40962 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hREHI-00007E-Dm; Thu, 16 May 2019 07:10:24 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: "pelzflorian \(Florian Pelz\)" Subject: Re: bug#35662: Really relocatable binaries crash with Permission denied References: <20190511050518.ozmvhsov6meg6g5f@pelzflorian.localdomain> <87ftpivlnv.fsf@gnu.org> <20190513103440.xkri3uk2oxtk4rn6@pelzflorian.localdomain> <87r292qx30.fsf@gnu.org> <20190513151736.ffbuofr3vmyqaoov@pelzflorian.localdomain> <87tvdyozra.fsf@gnu.org> <20190513204524.ozcnp6faamrbfkcv@pelzflorian.localdomain> <20190514080525.xspgsob6payn2ioa@pelzflorian.localdomain> <87h89wydf7.fsf@gnu.org> <87pnojd9s6.fsf@roquette.mug.biscuolo.net> <20190516110257.f3ftexzyk2c5akw5@pelzflorian.localdomain> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 27 =?utf-8?Q?Flor=C3=A9al?= an 227 de la =?utf-8?Q?R?= =?utf-8?Q?=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Thu, 16 May 2019 13:10:19 +0200 In-Reply-To: <20190516110257.f3ftexzyk2c5akw5@pelzflorian.localdomain> (pelzflorian@pelzflorian.de's message of "Thu, 16 May 2019 13:02:57 +0200") Message-ID: <875zqairj8.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 35662 Cc: Giovanni Biscuolo , 35662@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hello, "pelzflorian (Florian Pelz)" skribis: > From a Guix point of view, I believe this maybe should be a > WONT-FIX/NOT-OUR-BUG. Sounds good to me. :-) Thanks, Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Thu May 16 07:11:08 2019 Received: (at control) by debbugs.gnu.org; 16 May 2019 11:11:08 +0000 Received: from localhost ([127.0.0.1]:54437 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hREHz-0001EF-R7 for submit@debbugs.gnu.org; Thu, 16 May 2019 07:11:08 -0400 Received: from eggs.gnu.org ([209.51.188.92]:45151) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1hREHu-0001Db-CU for control@debbugs.gnu.org; Thu, 16 May 2019 07:11:06 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:47749) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hREHp-000889-Aa for control@debbugs.gnu.org; Thu, 16 May 2019 07:10:57 -0400 Received: from [2001:660:6102:320:e120:2c8f:8909:cdfe] (port=40968 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1hREHo-0002J0-II for control@debbugs.gnu.org; Thu, 16 May 2019 07:10:56 -0400 Date: Thu, 16 May 2019 13:10:55 +0200 Message-Id: <874l5uiri8.fsf@gnu.org> To: control@debbugs.gnu.org From: =?utf-8?Q?Ludovic_Court=C3=A8s?= Subject: control message for bug #35662 MIME-version: 1.0 Content-type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: control X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) tags 35662 wontfix close 35662 From unknown Mon Aug 18 04:09:50 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Thu, 13 Jun 2019 11:24:05 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator