chroot breakout (was: Xen 2.0 Virtual Machine)
    David Nicol 
    davidnicol at gmail.com
       
    Mon Nov  8 12:04:43 CST 2004
    
    
  
calling chroot requires superuser priv.  I imagine, without a whole
lot of basis,
that the extended priv systems (SELinux, etc) can abstract choot rights to a
more restricted credential.
SELilnux strikes me as a magic trick -- by redefining the security policy,
user ID zero no longer means superuser.  Something else means superuser 
instead.
for finding out if a kernel will work with your hardware, there really is no
substitute for trying it on a second machine with the same hardware.  
-- 
David L Nicol
"How cool is that?" -- Elgie
    
    
More information about the Kclug
mailing list