Karel Zak wrote: > On Thu, Apr 08, 2010 at 02:09:37PM -0400, Adam Jackson wrote: >> Largely functionally equivalent to chroot(1), but creates a new >> filesystem namespace so the chroot'd process can't escape. It's >> possible to do this with unshare/mount/chroot in a shell script, but >> it's a bit tricky to get right. > > Interesting idea. > > What about to add this functionality to the chroot(1)? For example > add a new option "--ns" to move the process to a separate namespace > with a real new root directory. Hi Karel, I like the idea. For a new long-named option, you might as well make it readable, e.g., --name-space or --namespace. People can abbreviate it with --na or, in this case, even --n. > I think coreutils already uses linux specific options for some utils, > so a new option for chroot(1) should not be a problem. Right. Do you feel like adding it? -- To unsubscribe from this list: send the line "unsubscribe util-linux-ng" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html