On Friday 01 April 2005 20:14, Tracy R Reed wrote: > Making root filesystems for UML to boot off of is a royal pain. I am > surprised it has not gotten any easier. In the past I have installed an > empty HD just like I wanted it and then copied the fs onto my uml host > computer and it was a real time waster. It seems like there should be > some sort of way to launch a UML kernel pointed at a distro install disk > and go straight into a text based install. I know Gentoo can do this: > > http://www.gentoo.org/doc/en/uml.xml
> But that's Gentoo. Barely a step away from making your own root_fs using > Linux From Scratch. :) I hear Debian can do it too. Unfortunately those > distro's are not my cup of tea although I might try those gentoo > instructions if I can't get anything else going. > > I am mainly interested in booting CentOS 4 (RHEL4) and FC3 in this way. > The host system is an FC1 box running: > > Linux copilotconsulting.com 2.4.22-1.2188.nptl #1 Wed Apr 21 20:36:05 > EDT 2004 i686 i686 i386 GNU/Linux > > And the UML kernel is 2.6.8.1 with the matching patch and all standard > build options except I turned on magic sysrq support. It should be > possible to run a 2.6 UML kernel under a 2.4 host kernel right? I would > upgrade the host but it would be quite inconvenient at the moment for > reasons too complicated to explain. Yes, it's possible to do it. However, you should probably upgrade to vanilla 2.6.11, either without any patch (UML has finally been merged) or with the -bs1 tree on my homepage, see my signature (I should have uploaded it, I don't remember well). > Usually when I boot my uml kernel I get: > [EMAIL PROTECTED] linux-2.6.8.1]$ ./linux > ubd0=/mnt/images/boot.iso con0=fd:0,fd:1 > Checking for the skas3 patch in the host...not found > Checking for /proc/mm...not found > Adding 25 153 536 bytes to physical memory to account for exec-shield gap Ok, exec-shield on the host. This is very interesting, since it causes a bit of problems. If upgrading to 2.6.11 for UML does not help, there are at least two ways to disable this on the host: globally through /proc/sys or locally through setarch. Actually I don't remember well, but ask "disabling exec shield on the host?" on this list and you'll surely get somebody answering. -- Paolo Giarrusso, aka Blaisorblade Linux registered user n. 292729 http://www.user-mode-linux.org/~blaisorblade ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ User-mode-linux-user mailing list User-mode-linux-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user