public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: Benedikt Niedermayr <benbrenson89@googlemail.com>
To: Claudius Heine <claudius.heine.ext@siemens.com>,
	Alexander Smirnov <asmirnov@ilbers.de>,
	isar-users <isar-users@googlegroups.com>
Subject: Re: PRoot experiments
Date: Thu, 19 Oct 2017 12:44:15 +0200	[thread overview]
Message-ID: <d5ffecd6-b9b3-43d5-4ca4-1e8bfde61d4b@googlemail.com> (raw)
In-Reply-To: <0314d700-be53-e319-3248-b6b44f567b2a@siemens.com>

Am 19.10.2017 um 12:39 schrieb Claudius Heine:
> Hi
>
> On 10/19/2017 12:14 PM, Alexander Smirnov wrote:
>> Hi,
>>
>> On 10/19/2017 01:07 PM, 'Ben Brenson' via isar-users wrote:
>>> Am Mittwoch, 18. Oktober 2017 14:29:45 UTC+2 schrieb Alexander Smirnov:
>>>
>>>     Hi all,
>>>
>>>     I've performed several experiments with PRoot:
>>>
>>>     1. Generate multistrap filesystem:
>>>
>>>     As reference I've used the following resource:
>>> https://github.com/josch/polystrap/blob/master/polystrap.sh
>>> <https://github.com/josch/polystrap/blob/master/polystrap.sh>
>>>
>>>     So, I was able to run the following command without root 
>>> permissions:
>>>
>>>     $ PROOT_NO_SECCOMP=1 proot -0 /usr/sbin/multistrap -f
>>>     multistrap.conf -d
>>>     test
>>>
>>>     After this command execution I have 'test' folder which looks quite
>>>     similar to one, generated with sudo (at least 'du -sm' is the 
>>> same).
>>>
>>>     2. Run commands in PRoot chroot:
>>>
>>>     I'm successfully able to run PRoot chroot for various 
>>> architectures:
>>>
>>>     $ PROOT_NO_SECCOMP=1 proot -0 -r ./test /bin/bash
>>>
>>>     Also I was able to run: 'dpkg --configure -a' in these chroots.
>>>
>>>     3. Mount of various work folders:
>>>
>>>     Mount forlder using PRoot seems also works good:
>>>
>>>     $ PROOT_NO_SECCOMP=1 proot -0 -b /proc -b /dev -r ./test /bin/bash
>>>
>>>     And in this chroot I have /proc and /dev mounted.
>>>
>>>
>>>     So, my brief conclusion is: PRoot could be a good option for 
>>> Isar. It
>>>     seems that it's designed to support exact features that are 
>>> required
>>>     for
>>>     Isar. :-)
>>>
>>>     I'd like to try to implement simple PoC to test if *.deb package 
>>> could
>>>     be generated in Isar without 'sudo'.
>>>
>>>     BTW: PRoot is a part of standard Debian, so it could be 
>>> installed via
>>>     'apt-get', no custom repos required.
>>>
>>>     --     With best regards,
>>>     Alexander Smirnov
>>>
>>>
>>>
>>>
>>> Sounds nice...
>>>
>>> What is the PROOT_NO_SECCOMP=1 for?
>>
>> Don't remember exactly, I derived this as workaround from issues in 
>> PRoot guthub (will analyze it in details later). As I got it, there 
>> was some change related to ptrace systemcall in recent kernel and 
>> this option helps old PRoot to workaround this change. I use jessie 
>> on my host so my proot is quite old, probably in stretch this issue 
>> is already fixed.
>
> PROOT_NO_SECCOMP=1 should not be necessary if you are using the 
> kas-isar container with '--security-opt=seccomp:unconfined'.
>
> I would also advice to used at least version 5.* (I use 5.1.0) because 
> with the version 4.* I had bad experiences previously.
>
> Claudius
>
>

So I tried to do similiar steps as Alexander,
mkdir -r proot_tests/test
cd proot_tests
PROOT_NO_SECCOMP=1 proot -0 /usr/sbin/multistrap -a amd64 -d test -f 
multistrap.conf

But after a while the following error appears:

chroot: cannot change root directory to 
'/home/brenson/Schreibtisch/mixed_mode/siemens/proot_tests/test/': 
Operation not permitted

Regards,
Benedikt

  reply	other threads:[~2017-10-19 10:44 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-10-18 12:29 Alexander Smirnov
2017-10-19  8:59 ` Henning Schild
2017-10-19 10:10 ` Ben Brenson
     [not found] ` <b0082bee-94d7-48c6-8582-93efc4171b59@googlegroups.com>
2017-10-19 10:14   ` Alexander Smirnov
2017-10-19 10:39     ` Claudius Heine
2017-10-19 10:44       ` Benedikt Niedermayr [this message]
2017-10-19 11:08         ` Claudius Heine
2017-10-19 11:15           ` Benedikt Niedermayr
2017-10-19 11:37             ` Alexander Smirnov
2017-10-19 11:36           ` Benedikt Niedermayr
2017-10-19 11:40             ` Alexander Smirnov
2017-10-19 13:37               ` Ben Brenson
2017-10-20  8:18               ` Ben Brenson
2017-10-20  8:52                 ` Claudius Heine
2017-10-20  9:21                   ` Ben Brenson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=d5ffecd6-b9b3-43d5-4ca4-1e8bfde61d4b@googlemail.com \
    --to=benbrenson89@googlemail.com \
    --cc=asmirnov@ilbers.de \
    --cc=claudius.heine.ext@siemens.com \
    --cc=isar-users@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox