Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Why setup the device when you should be able to open it way prior to chrooting (if you don't - that's a proper time to abort() on my book) and keep the descriptor open for later use?


What if the random numbers are needed not by the daemon that chroots itself, but by a separate program that gets exec()'d within the chroot?


A good point. Didn't thought about this case.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: