Introduction to Bubblewrap

Bubblewrap is a setuid implementation of user namespaces, or sandboxing, that provides access to a subset of kernel user namespace features. Bubblewrap allows user owned processes to run in an isolated environment with limited access to the underlying filesystem.



Development versions of BLFS may not build or run some packages properly if dependencies have been updated since the most recent stable versions of the book.

Package Information

Bubblewrap Dependencies


libxslt-1.1.37 (to generate manual pages) and libseccomp-2.5.4 (built with python bindings, for tests)

User Notes: https://wiki.linuxfromscratch.org/blfs/wiki/bubblewrap

Installation of Bubblewrap

Install Bubblewrap by running the following commands:

mkdir build &&
cd    build &&

meson --prefix=/usr --buildtype=release .. &&

Next, if you desire to run the test suite, fix an issue caused by the merged-/usr configuration in LFS:

sed '[email protected] usr/[email protected] /lib64@' -i ../tests/libtest.sh

To test the results, issue: ninja test

Now, as the root user:

ninja install

Command Explanations

--buildtype=release: Specify a buildtype suitable for stable releases of the package, as the default may produce unoptimized binaries.


Installed Program: bwrap
Installed Libraries: None
Installed Directories: None

Short Descriptions


generates a sandbox for a program to run in