Thanks Herbert!

I am using the 1.9.5 developer patches. I've just looked at the table in the
"Release FAQ". Am I right I have to upgrade my kernel to 2.0RCx in order to
have VROOT support? Is it already in implemented in RC3?


Martin


Herbert Poetzl wrote:

> On Mon, Jun 06, 2005 at 10:30:16AM +0200, Martin Honermeyer wrote:
>> Hello people,
>> 
>> 
>> Herbert Poetzl wrote:
>> 
>> > On Sat, May 28, 2005 at 09:25:51PM +0200, Bodo Eggert wrote:
>> >> On Sat, 28 May 2005, gary ng wrote:
>> >> 
>> >> > I am testing out vserver(1.2.10 on 2.4, not ready for
>> >> > 2.6 yet because of stability issue unrelated to
>> >> > vserver) and I am wondering what is the impact of
>> >> > giving CAP_SYS_ADMIN to it.
>> >> > 
>> >> > Without it, I cannot mount within vserver but I see
>> >> > mount as a legitimate use like mounting CIFS/NFS or
>> >> > FUSE related file systems.
>> >> 
>> >> You can also mount filesystems containing device nodes. This would
>> >> give you root access to the host.
>> >> 
>> >> Secure user mounts are planned in the vanilla kernel, maybe they can
>> >> be adopted for vservers.
>> > 
>> > 2.6/1.9.x and 2.0-* already support 'secure' mounts inside
>> > a vserver guest ...
>> 
>> How does this work? I am puzzled about this. In my setup, there is a
>> vserver which has to access different logical volumes mounted on
>> different paths. The vserver should be able to set up and manage quotas
>> for each lv.
> 
> well, secure mounts are basically mounts of 'devices'
> the guest has available with the important restriction
> that they happen with 'nodev' so that the guest can not
> use new device nodes this way ...
> 
>> So far, I have an ugly workaround. The host mounts those lv's from
>> /dev/vg into the vserver. _After_ that, the vserver can be started,
>> because it doesn't see those mounts when it's already running! This way,
>> quotas can only be managed from within the host, as the vserver doesn't
>> really see those mounts/devices!
> 
> that's a different issue you want to address here and
> the solution is the vroot device proxy, which allos to
> proxy quota ioctls to the device without giving away
> full access to the device ...
> 
>> What would be the best way to do it? I don't quite understand what secure
>> mounts are and how they work..
> 
> just do it as you do it now, configure a vroot device
> for each lvm volume and copy that into the server ...
> set the filesystem type to ufs to avoid that the guest
> tools try to access the filesystem directly (done for
> ext2/3) and make sure that mtab contains the usr/grpquota
> flags (which are checked by the quota tools)
> 
> HTH,
> Herbert
> 
>> Greetings,
>> Martin
>> 
>> 
>> _______________________________________________
>> Vserver mailing list
>> Vserver@list.linux-vserver.org
>> http://list.linux-vserver.org/mailman/listinfo/vserver
> _______________________________________________
> Vserver mailing list
> Vserver@list.linux-vserver.org
> http://list.linux-vserver.org/mailman/listinfo/vserver


_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to