Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Your trying to run an (old) installer script that makes a DEBIAN ROOT for install disks: but your getting an error from UBUNTU who apparently would rather that job be left to themselves? Otherwise it'd be working! it wasn't (maybe is now, but wasn't) made for making configure chroots.
Try making your own chroot using Busybox, a slackware boot disk, something. There's not much to it: just a standard list of files that need to be copied.
(now, that'll be a huge chroot in ubuntu, perhaps you need a huge one perhaps your seeking a busybox size one and can preen things)
NOTE: CHROOT AND JAILS ARE NOT SECURE (freebsd jails if kernel supported ... have some extra security)
It only tells the kernel where to read files for (the session / logged in user). It literally does NOTHING else.
But the effect is as strong as you think: you can run older, same, even newer "roots" without effecting the root you booted from in the other console window. (um, you can effect the other window easily - it's just you have to want to. no applications will do that usually no worry there. there's no security, as i said, between chroots.)
"chroot" is a comparatively weak technology. Containers have taken the whole idea much farther, using newly-added kernel features to create strong isolation (and phantom perceived environments) while the processes in question continue to run natively on the host. They're also generally much easier to manage. There's Docker, of course, but also "lxc/lxd."
The clear advantage of containers is that they are lightweight. The processes are "wearing rose-colored glasses," but they are still running "on the host." Container technology now is quite mature, with several good options to choose from, so that's how I would do it today.
Last edited by sundialsvcs; 12-29-2022 at 09:53 AM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.