From: Michael Tremer Date: Sun, 16 Feb 2025 16:30:17 +0000 (+0000) Subject: jail: Run setuid/gid mapping even when we are running in / X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=e06db6aa620485d8f0fb0f414bd6c68b4f966211;p=pakfire.git jail: Run setuid/gid mapping even when we are running in / Since we always create a new namespace, we need to always run this, too. Signed-off-by: Michael Tremer --- diff --git a/src/pakfire/jail.c b/src/pakfire/jail.c index 49696ed8..9761ee8a 100644 --- a/src/pakfire/jail.c +++ b/src/pakfire/jail.c @@ -776,10 +776,6 @@ static int pakfire_jail_setup_uid_mapping(struct pakfire_jail* jail, pid_t pid) char path[PATH_MAX]; int r; - // Skip mapping anything when running on / - if (pakfire_on_root(jail->pakfire)) - return 0; - // Make path r = pakfire_string_format(path, "/proc/%d/uid_map", pid); if (r) @@ -820,10 +816,6 @@ static int pakfire_jail_setup_gid_mapping(struct pakfire_jail* jail, pid_t pid) char path[PATH_MAX]; int r; - // Skip mapping anything when running on / - if (pakfire_on_root(jail->pakfire)) - return 0; - // Fetch GID const gid_t gid = pakfire_gid(jail->pakfire);