On Wed, 20 Apr 2005, Rob Landley wrote:
By the way, I've toyed with the idea of running this sucker in an otherwise empty chroot environment (/proc/self/fd is likely to exist and have fairly uninteresting contents. As a chroot environment, it just has symlinks that point to nothing), but to chroot the UML kernel process from inside the initramfs, I need to come up with a new syscall.
Not neccesarily. All you need is a way of making the UML execute the chroot syscall. This can be easily be done by loading a module, or even linking a dummy object file with just a kernel init function making the chroot call if it is not sensitive when in the kernel boot process this takes place.
Can't do it before running the UML kernel because A) it needs to make its memory file, 2) it needs to access /proc/self/exe, III) it needs to loopback mount its executable file to pull the trick I just did.
Ok, then the module approach is the simplest.
Does a new "chroot UML" syscall sound like a worthwhile idea?
IMHO a syscall is overkill for this.
Regards Henrik
------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ User-mode-linux-devel mailing list User-mode-linux-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel