On Wed December 14 2011, Vasanth Ragavendran wrote:
> >
> >
> >
> > Which looks exactly as expected from the previous condition
> > you listed before the move.
> >
> > What do you want different about it?
> >

I think I have stumbled onto a similar situation that does not
involve auFS nor either of the *_root calls.

Just setting up a directory with files for a chroot, mount /proc
and then changing to that file system namespace with a "chroot /x/y/z"

Then you can find some very strange things (with the 3.0.4 kernel):

cat /proc/self/mounts (or the older cat /proc/mounts) shows the paths
properly trimmed for the second view of proc:
That is, it shows: /proc not: /x/y/z/proc
__BUT__ is does not edit out those mount paths no longer accessible!
That is, you can find mount paths listed that are outside of the /x/y/z path.

Of course, any operations on them (since /x/y/z doesn't exist inside the
chroot) return errors.

Another interesting note:
There will be a visible (and working) /dev inside of the chroot.

I am not sure if this is a "feature" or an "error" -
in the 2.6.x series kernels, you had to mount it to have it inside.

When I have a chance, I will see if the same happens with the 3.1.y 
and 3.2.x series of kernels.

Mike



------------------------------------------------------------------------------
Write once. Port to many.
Get the SDK and tools to simplify cross-platform app development. Create 
new or port existing apps to sell to consumers worldwide. Explore the 
Intel AppUpSM program developer opportunity. appdeveloper.intel.com/join
http://p.sf.net/sfu/intel-appdev

Reply via email to