|File Search||Catalog||Content Search|
The practical upshot of this is that the technology supports intercepting the "open" system call. In particular, this allows simulating the "chroot" command reliably.
Another important difference is that fakeroot-ng can fool applications that do not perform system calls through glibc, such as statically linked executables and programs written in some non-C languages (like the latest Sun JDK).
This file lists bugs and limitations of fakeroot-ng. There are three lists: TODO - lists action items that are simply not yet implemented BUGS - lists functions that are implemented, but have known limitations that will be addressed soonish LIMITATIONS - lists limitations either inherent to the technology, or that are outside the scope of coverage intended in the foreseeable future. TODO - Wider more»
fakeroot-ng for Debian ---------------------- Fakeroot-ng adds itself as a candidate for the "fakeroot" command. You can use "update-alternatives --config fakeroot" to make it the default when running fakeroot. -- Shachar Shemesh <email@example.com> Tue, 08 Jan 2008 20:27:55 +0000
This document lists the steps required to port fakeroot-ng to a new platform. SHORT INSTRUCTIONS - Create a directory called arch/<os name>/<hw platform>/ - Create a file called arch/<os name>/<hw platform>/platform_specific.h. It needs to define all the constants defined by arch/linux/i386 as well as the ptlib_stat structure. - Implement all functions declared in arch/platform.h - Make s more»
As of version 0.15, fakeroot-ng makes sure that it has complete access to files and directories it c more»
FAKEROOT-NG(1) Fakeroot Next Gen User Manual FAKEROOT-NG(1) NAME fakeroot-ng - more»
fakeroot-ng (0.16-1) unstable; urgency=low * New upstream version (major bug fixes) * fakeroot- more»
Version 0.16 * Sending an ALRM signal to the fakeroot-ng process dumps to the log all trac more»
fakeroot-ng is copyright (c) 2007-2009 by Shachar Shemesh Special thanks goes to Bernhard R. Link f more»