Chroot is not good option as stated at many places due to root process can easily exit the chroot
Is there any way to isolate the user space completely in *nix based systems?
Chroot is not good option as stated at many places due to root process can easily exit the chroot
Is there any way to isolate the user space completely in *nix based systems?
You ask "how to isolate user processes from kernel processes completely". The answer is that you can't, and shouldn't; the kernel provides many essential services to userspace. Any user process that can't talk to the kernel at all can't use virtual memory, or a filesystem, or the network, or inter-process communication, or any number of other services the kernel is gatekeeper and housemaid for - and therefore it can't do much except tiny numerical computations that it can never tell anyone about.
chroot
, containerisation, and virtualisation provide increasing levels of isolation for environments. Each has different costs, pros, and cons, and they should not be confused with each other - or with physical separation. Which you want will be dependent on your needs, which usually proceeds from a threat model and the resultant analysis. So decide what you want to protect, and from whom, and consider opening a new question.
But the answer to this one is: no, and for good reason.
Edit: I understand what you want, but you can't have it: the kernel is there for a good reason. You can mitigate the risks of a suborned daemon suborning the kernel (least-possible privilege, privilege separation, SELinux or similar MACs, chroot/containerisation to constrain FS access, etc.), but in the end userspace has to be able to talk to the kernel, kernels are buggy too, and these bugs can sometimes be exploited. Keep up with your patches!
We all do what we can, then hope for the best. If your best is not good enough for you, you will need to get professional help in.