Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263697AbTKFQAf (ORCPT ); Thu, 6 Nov 2003 11:00:35 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263698AbTKFQAf (ORCPT ); Thu, 6 Nov 2003 11:00:35 -0500 Received: from 90.Red-213-97-199.pooles.rima-tde.net ([213.97.199.90]:40685 "HELO fargo") by vger.kernel.org with SMTP id S263697AbTKFQAa (ORCPT ); Thu, 6 Nov 2003 11:00:30 -0500 Date: Thu, 6 Nov 2003 17:00:28 +0100 From: David =?iso-8859-15?Q?G=F3mez?= To: DervishD Cc: Linux-kernel Subject: Re: Using proc in chroot environments Message-ID: <20031106160028.GA6392@fargo> Mail-Followup-To: DervishD , Linux-kernel References: <20031102204934.GB54@DervishD> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20031102204934.GB54@DervishD> User-Agent: Mutt/1.4.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 919 Lines: 22 Hi ;), > I'm using a chroot environment on my main disk as a 'crash test > dummy', and I need to access the proc filesystem inside it. Since > hard links are not allowed for directories, the only solution I can > think of is to mount proc inside the chroot environment just after > chrooting. This works, I've tested, but I have two problems: Have you tried the --bind mount option? It's great to solve this kind of problem, accesing to a directory within a chrooted enviroment. I've used it successly with a ftp server ;). -- David G?mez "The question of whether computers can think is just like the question of whether submarines can swim." -- Edsger W. Dijkstra - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/