diff options
author | Adam Joseph <adam@westernsemico.com> | 2022-07-17 01:23:27 -0700 |
---|---|---|
committer | Adam Joseph <adam@westernsemico.com> | 2022-07-17 01:23:32 -0700 |
commit | 6fc56318bf32f715de8634c199c0fb812f813a8c (patch) | |
tree | 1d944329abace1924b00b98733e1b56da4676afa /src/libstore/build/local-derivation-goal.cc | |
parent | 8d35f387dcfa61c59f898de88ef45f3f97817267 (diff) |
local-derivation-goal.cc: add comment re: CLONE_NEWUSER
local-derivation-goal.cc contains a comment stating that "Some distros
patch Linux to not allow unprivileged user namespaces." Let's give a
pointer to a common version of this patch for those who want more
details about this failure mode.
Diffstat (limited to 'src/libstore/build/local-derivation-goal.cc')
-rw-r--r-- | src/libstore/build/local-derivation-goal.cc | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/libstore/build/local-derivation-goal.cc b/src/libstore/build/local-derivation-goal.cc index 3aa85e264..1c7618045 100644 --- a/src/libstore/build/local-derivation-goal.cc +++ b/src/libstore/build/local-derivation-goal.cc @@ -845,6 +845,7 @@ void LocalDerivationGoal::startBuilder() /* Some distros patch Linux to not allow unprivileged * user namespaces. If we get EPERM or EINVAL, try * without CLONE_NEWUSER and see if that works. + * Details: https://salsa.debian.org/kernel-team/linux/-/commit/d98e00eda6bea437e39b9e80444eee84a32438a6 */ usingUserNamespace = false; flags &= ~CLONE_NEWUSER; |