Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an option which only root user can execute Windows binary in WSL #11481

Open
firejox opened this issue Apr 17, 2024 · 3 comments
Open

Add an option which only root user can execute Windows binary in WSL #11481

firejox opened this issue Apr 17, 2024 · 3 comments
Labels

Comments

@firejox
Copy link

firejox commented Apr 17, 2024

Is your feature request related to a problem? Please describe.
I want that only root user is able to execute Windows binary in WSL.

Describe the solution you'd like
There is an option like rootOnly to enable this feature in wsl.conf. For example,

[interop]
rootOnly = true

And when WSL non-root user execute Windows binary will produce proper error message.

firejox@DESKTOP-2BCQGK7:~$ xxx.exe
xxx.exe permission denied

Describe alternatives you've considered
Currently, I can use chmod o= /run/WSL to forbid non-root user execute Windows binary. However, it produces ugly error message.

firejox@DESKTOP-2BCQGK7:~$ choice.exe
<3>WSL (841) ERROR: UtilConnectUnix:513: connect failed 13
                                                          firejox@DESKTOP-2BCQGK7:~$
Copy link

Logs are required for review from WSL team

If this a feature request, please reply with '/feature'. If this is a question, reply with '/question'.
Otherwise please attach logs by following the instructions below, your issue will not be reviewed unless they are added. These logs will help us understand what is going on in your machine.

How to collect WSL logs

Download and execute collect-wsl-logs.ps1 in an administrative powershell prompt:

Invoke-WebRequest -UseBasicParsing "https://raw.githubusercontent.com/microsoft/WSL/master/diagnostics/collect-wsl-logs.ps1" -OutFile collect-wsl-logs.ps1
Set-ExecutionPolicy Bypass -Scope Process -Force
.\collect-wsl-logs.ps1

The scipt will output the path of the log file once done.

Once completed please upload the output files to this Github issue.

Click here for more info on logging
If you choose to email these logs instead of attaching to the bug, please send them to wsl-gh-logs@microsoft.com with the number of the github issue in the subject, and in the message a link to your comment in the github issue and reply with '/emailed-logs'.

@firejox
Copy link
Author

firejox commented Apr 17, 2024

/feature

Copy link

Diagnostic information
Found '/feature', adding tag 'feature'

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant