Hack-A-N900/Unionfs
aus Metalab Wiki, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Zur Navigation springenZur Suche springen
EXPERIMENTAL: You need to read and understand the chroot-unionfs.sh script.
Update Kernel
Add tesing repositories to /etc/apt/sources.list:
deb http://repository.maemo.org/extras/ fremantle free deb-src http://repository.maemo.org/extras/ fremantle free deb http://repository.maemo.org/extras-testing/ fremantle free deb-src http://repository.maemo.org/extras-testing/ fremantle free
apt-get update
apt-get install kernel-flasher-maemo kernel-modules-maemo
cross your thumbs now.. (you backed up before right?)
reboot
WELCOME TO YOUR UPDATED SYSTEM THAT SUPPORTS UNIONFS \o/!
Create unionfs / chroot overlay filesystem for development
Create a 2 GB file on /home/user/MyDocs/sandbox/fs.img
mkdir /home/user/MyDocs/sandbox/ cd /home/user/MyDocs/sandbox/ dd if=/dev/zero of=fs.img bs=1M count=1 seek=2048 mkfs.ext2 fs.img
Get the shiny overlay/chroot shellscript
wget http://metalab.at/wiki/images/d/d8/Chroot-unionfs.sh WARNING the link might be different now look here: Datei:Chroot-unionfs.sh mv chroot-unionfs.sh /sbin/chroot-unionfs chmod +x /sbin/chroot-unionfs
This script doeas some magic including
- loading the dm-loop kernel module (for /dev/loop? devices)
- overlaying the unionfs filesystem
- mounting all needed filesystem folders inside the unionfs
- chroot()'ing inside
It is started like this:
bash /sbin/chroot-unionfs -v -t /home/user/MyDocs/sandbox/fs.img
Read the source to find out about command line parameters like -t for testing and others..
If this script is successful you should find yourself in a chrooted environment inside the unionfs
touch /CHROOTED ls /CHROOTED # it should be here! exit ls /CHROOTED # it should be gone!