]> git.ipfire.org Git - pakfire.git/commitdiff
jail: Run setuid/gid mapping even when we are running in /
authorMichael Tremer <michael.tremer@ipfire.org>
Sun, 16 Feb 2025 16:30:17 +0000 (16:30 +0000)
committerMichael Tremer <michael.tremer@ipfire.org>
Sun, 16 Feb 2025 16:30:17 +0000 (16:30 +0000)
Since we always create a new namespace, we need to always run this, too.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
src/pakfire/jail.c

index 49696ed8bc2342e1d7d1e30c22801b9308584615..9761ee8a4ae684347fd2080ec165a3e5a1f09bd0 100644 (file)
@@ -776,10 +776,6 @@ static int pakfire_jail_setup_uid_mapping(struct pakfire_jail* jail, pid_t pid)
        char path[PATH_MAX];
        int r;
 
-       // Skip mapping anything when running on /
-       if (pakfire_on_root(jail->pakfire))
-               return 0;
-
        // Make path
        r = pakfire_string_format(path, "/proc/%d/uid_map", pid);
        if (r)
@@ -820,10 +816,6 @@ static int pakfire_jail_setup_gid_mapping(struct pakfire_jail* jail, pid_t pid)
        char path[PATH_MAX];
        int r;
 
-       // Skip mapping anything when running on /
-       if (pakfire_on_root(jail->pakfire))
-               return 0;
-
        // Fetch GID
        const gid_t gid = pakfire_gid(jail->pakfire);