On Tue, Feb 07, 2017 at 03:08:58PM -0500, Rich Freeman wrote

> I suspect sticking something like this before the chroot command might
> do the trick:
> unshare -p -f --mount-proc -m -i -u
> 
> That will create a new PID, mount, IPC, and UTS namespace for the
> chroot.  If you do the mounts after this then when the process exists
> any mounts will disappear.  If you run ps -ea inside you'll see your
> shell running as pid 1.  Now, if you set up your mounts before running
> unshare then they'll stick around since they were set up in the host
> namespace and not the container.

  Is the command sequence...

unshare -p -f --mount-proc -m -i -u
mount --bind /dev/ /home/misc/centos65/dev/
mount --bind /proc/ /home/misc/centos65/proc/
linux32 chroot /home/misc/centos65/ /bin/bash

-- 
Walter Dnes <waltd...@waltdnes.org>
I don't run "desktop environments"; I run useful applications

Reply via email to