Hi,
I found that Flatpak applications cannot run properly inside Droidspaces containers. After some initial troubleshooting, the root cause appears to be that bwrap (bubblewrap) fails to work due to permission issues.
To pinpoint the problem, I ran some comparative tests using the unshare command:
PID Namespace works fine:
unshare --pid --fork echo "✅ PID Namespace is supported!"
The above command executes successfully.
User Namespace fails to create:
unshare --user echo "✅ User Namespace is supported!"
The above command fails, unable to create a user namespace.
Additional Context:
My device's kernel has CONFIG_USER_NS=y enabled. Furthermore, the exact same unshare --user test command works perfectly fine in Termux.
Question:
I would like to ask if this is an intentional restriction designed by Droidspaces for security reasons (e.g., the default Seccomp profile blocking CLONE_NEWUSER), or is it a bug?
If it is an intentional security limitation, is there an option or workaround provided to override/modify the Seccomp rules or grant the necessary privileges, so that tools relying on User Namespaces (like Flatpak) can work properly?
Hi,
I found that Flatpak applications cannot run properly inside Droidspaces containers. After some initial troubleshooting, the root cause appears to be that bwrap (bubblewrap) fails to work due to permission issues.
To pinpoint the problem, I ran some comparative tests using the unshare command:
PID Namespace works fine:
unshare --pid --fork echo "✅ PID Namespace is supported!"The above command executes successfully.
User Namespace fails to create:
unshare --user echo "✅ User Namespace is supported!"The above command fails, unable to create a user namespace.
Additional Context:
My device's kernel has CONFIG_USER_NS=y enabled. Furthermore, the exact same unshare --user test command works perfectly fine in Termux.
Question:
I would like to ask if this is an intentional restriction designed by Droidspaces for security reasons (e.g., the default Seccomp profile blocking CLONE_NEWUSER), or is it a bug?
If it is an intentional security limitation, is there an option or workaround provided to override/modify the Seccomp rules or grant the necessary privileges, so that tools relying on User Namespaces (like Flatpak) can work properly?