Re: [PATCH 2/2] kvm tools: Allow easily sandboxing applications within a guest

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2011-12-02 at 09:26 +0200, Pekka Enberg wrote:
> On Fri, Dec 2, 2011 at 9:16 AM, Sasha Levin <levinsasha928@xxxxxxxxx> wrote:
> > This patch adds a '--sandbox' argument when used in conjuction with a custom
> > rootfs, it allows running a script or an executable in the guest environment
> > by using executables and other files from the host.
> >
> > This is useful when testing code that might cause problems on the host, or
> > to automate kernel testing since it's now easy to link a kvm tools test
> > script with 'git bisect run'.
> >
> > Suggested-by: Ingo Molnar <mingo@xxxxxxx>
> > Signed-off-by: Sasha Levin <levinsasha928@xxxxxxxxx>
> 
> Nice! How do I use this to run trinity sandboxed in a guest?

Assuming you have trinity installed in /usr/bin or something similar in
on the host (you can just 'cp trinity /usr/bin/'), just write this
script:

test-trinity.sh:
	#! /bin/bash
	trinity --mode=random --quiet -i

and run using:
	./kvm run -k [kernel to test] --sandbox test-trinity.sh

-- 

Sasha.

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux