>
> On Tue, Dec 13, 2005 at 05:20:22PM +0100, Joel Soete wrote:
> > Hello All,
> > Great the kernel was booting fine; just grep the upstream util-vserver
> > tools and hack lib/syscall-faalback.h to match __NR_vserver 263 for
> > hppa to build it with default debian pkg configure options ;-)
> >
> > As I already had some chroot disks that I used for severall test
> > (glibc, ...) and I wouldn't like to re-install a debian debootstrap, I
>
> sounds reasonable ...
>
> > use a vserver build -m skeleton ;-) and gather some more info to start
> > my vserver named DebSid:
> >
> > # vserver-stat
> > CTX   PROC    VSZ    RSS  userTIME   sysTIME    UPTIME NAME
> > 0       68 134.3M  49.3M   7m32s62  28m01s19   4h14m54 root server
> > 49153   15  76.8M  22.5M   0m05s31   0m14s53   2h47m02 DebSid
> >
[...]
> > and after stolen an ipv4 address and configure nic, ssh, ...:
> > > ssh 10.24.252.111
> > Linux patst007 2.6.15-rc1-pa3-d32up #8 Mon Nov 14 13:01:04 CET 2005
> > parisc GNU/Linux
>
> excellent, so the patch worked fine for you on 2.6.15-rc1-pa3?
>
mmm, no sorry I didn't pay attention: this message stand in fact in the
/etc/motd of the vps (updated last time I booted actualy with another testing
2.6.15-rc1-pa3-d32up kernel); I need to check to update this motd when the vps
is started. Apologies for confusion ;-(

> could you give the testme.sh and testfs.sh a spin on
> that machine?
>
testme works fine:
# ./testme.sh-0.14 -v
Linux-VServer Test [V0.14] Copyright (C) 2003-2005 H.Poetzl
chcontext is working.
chbind is working.
chcontext 0.30.209 -- allocates/enters a security context
This program is part of util-vserver 0.30.209

Copyright (C) 2004 Enrico Scholz
This program is free software; you may redistribute it under the terms of
the GNU General Public License.  This program has absolutely no warranty.
Linux 2.6.14.3-vs2.1.0-rc10-pa0-d32up parisc/0.30.209/0.30.209 [Ea] (0)
VCI:  0002:0001 263 03000116
([EMAIL PROTECTED])
(gcc version 4.0.3 20051201 (prerelease)
(Debian 4.0.2-5))
#2 Wed Dec 7 12:07:47 CET 2005
---
[000]# chcontext true && chcontext --ctx 45678 true
[000]# succeeded.
[001]# chcontext --ctx 45678 egrep 'context|VxID' /proc/self/status
[001]# succeeded.
[011]# chcontext --secure --ctx 45678 mknod /tmp/testme.sh-0.14.x4zqUF/node c 0 0
[011]# succeeded.
[031]# chcontext --hostname zaphod.21379 uname -a | grep -q zaphod.21379
[031]# succeeded.
[101]# chbind --ip 192.168.0.42 true
[101]# succeeded.
[102]# chbind --ip 192.168.0.1/255.255.255.0 --ip 10.0.0.1/24 true
[102]# succeeded.
[201]# chcontext --ctx 45678 --flag fakeinit bash -c 'test $$ -eq 1'
[201]# succeeded.
[202]# chcontext --flag fakeinit bash -c 'test $$ -eq 1'
[202]# succeeded.

OTC testfs.sh-0.11 failed after a return (no messaged)?
I have a quick look and testfs -v -F ext2 (help example)
launch "mkfs.ext2 /dev/zero"

manualy this cmdl is querying:
mke2fs 1.38 (30-Jun-2005)
/dev/zero is not a block special device.
Proceed anyway? (y,n)

though.

(


[...]
> >
> > The additional question is (may be non sense but thought): those
> > chroot disk was also bootable, so if I want to reboot I would
> > just have to write and run a script which will would restore /dev
> > /etc/init.d and corresponding rc?.d?
>
> well, it might be an option to use udev to populate
> the dev (on a real boot) and just clense them before
> you use it as guest ...
>
> > Or is it possible to instruct vserver to use better a /dev.vserver as
> > well as /etc/init.d.vserver, ...?
>
> you could also do some --bind mounting on guest
> startup (see pre/post scripts and fstab) and of course
> if security is not an issue for your guests, you could
> also let them run with the fully populated /dev
>
(well I just discover this proj about 2 weeks ago so still have planty to
learn ;-) )

Effectively for the moment I am not already worry on security of the guest vps
but more of application started (as motd update ;-)), also the option
"pre/post scripts" would certainly take my first attention.

Thanks a lot,
    Joel



---------------------------------------------------------------
A free anti-spam and anti-virus filter on all Scarlet mailboxes
More info on http://www.scarlet.be/

_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to