qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* [Qemu-devel] chroot jailing...
@ 2014-01-12 19:17 immersive.excel
  2014-01-13  4:11 ` Stefan Hajnoczi
  0 siblings, 1 reply; 6+ messages in thread
From: immersive.excel @ 2014-01-12 19:17 UTC (permalink / raw)
  To: qemu-devel

Would there be any security benefits, without suffering any considerable
relative loss in performance, to (chroot) jailing qemu? Can it,
practically speaking, be done?? Would that be a partial safeguard
against virtual machine escapes? Or is it the case that if a virtual
machine escape takes place, then all bets are probably off? (i.e., you
probably have already pole-vaulted over any filesystem driver/partition
access control mechanisms...) Are there any articles or discussions that
I can be directed to about it? (my focus for now is 64 bit, Intel core
i7...) Are there specific suggestions and/or guidelines for attempting
to do so -or not??

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2014-01-13 17:07 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-01-12 19:17 [Qemu-devel] chroot jailing immersive.excel
2014-01-13  4:11 ` Stefan Hajnoczi
2014-01-13  4:22   ` immersive.excel
2014-01-13 10:28     ` Markus Armbruster
2014-01-13 14:38     ` Alex Bennée
2014-01-13 17:07       ` immersive.excel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).