On Wed, 20 Apr 2005, Rob Landley wrote:

By the way, I've toyed with the idea of running this sucker in an otherwise
empty chroot environment (/proc/self/fd is likely to exist and have fairly
uninteresting contents.  As a chroot environment, it just has symlinks that
point to nothing), but to chroot the UML kernel process from inside the
initramfs, I need to come up with a new syscall.

Not neccesarily. All you need is a way of making the UML execute the chroot syscall. This can be easily be done by loading a module, or even linking a dummy object file with just a kernel init function making the chroot call if it is not sensitive when in the kernel boot process this takes place.


Can't do it before running the UML kernel because A) it needs to make its memory file, 2) it needs to access /proc/self/exe, III) it needs to loopback mount its executable file to pull the trick I just did.

Ok, then the module approach is the simplest.

Does a new "chroot UML" syscall sound like a worthwhile idea?

IMHO a syscall is overkill for this.

Regards
Henrik



-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
User-mode-linux-devel mailing list
User-mode-linux-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel

Reply via email to