|
|
Subscribe / Log in / New account

Unprivileged chroot()

Unprivileged chroot()

Posted Mar 19, 2021 18:32 UTC (Fri) by l0kod (subscriber, #111864)
In reply to: Unprivileged chroot() by kentonv
Parent article: Unprivileged chroot()

This is the reason of the unprivileged chroot limitations. It is only allowed to chroot one time: https://lore.kernel.org/lkml/20210316203633.424794-2-mic@...


to post comments

Unprivileged chroot()

Posted Mar 19, 2021 21:56 UTC (Fri) by kentonv (subscriber, #92073) [Link] (1 responses)

Ahhhhh I see.

That seems like a disappointing limitation though... any program that uses this feature will mysteriously break when run in a chroot.

Unprivileged chroot()

Posted Mar 21, 2021 10:50 UTC (Sun) by smurf (subscriber, #17840) [Link]

Running in a plain chroot isn't a good idea anyway; as soon as you do anything nontrivial things tend to break. The new unprivileged-chroot sycall is just one more example of many.

Much better to use systemd-nspawn or some other tool that sets up a "real" file system namespace. The unprivileged chroot(2) will work there.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds