Artificial intelligent assistant

Emulate /proc folder I've a software that uses a few nasty algorithms to determine, wether it runs in a docker container or not. One example is, that it scans `/proc/1/cgroup` for non root paths (i.e. `/docker/SOME-UUID` instead of `/` behind a group name) My question is, if it is possible, to inject a fake `/proc/1/cgroup` (or similar files) file into the process to circumvent the check? I've thought about using chroot, but would be interested, if there are nicer alternatives.

You can use a bind mount for that:


mount --bind /replacement/file /proc/1/cgroup


That should be done within the container name space.

xcX3v84RxoQ-4GxG32940ukFUIEgYdPy aeb8aed3cdd6924b3ebf377cf20dd88f