Dimitry Golubovsky wrote:
> Anthony,
>
> On 6/13/07, Anthony Liguori <[EMAIL PROTECTED]> wrote:
>
>> One thing to consider is that if a userspace process can create KVM
>> guests, they are capable of pinning large quantities of physical
>> memory.  This could be used as a DoS attack so consider VM creation a
>> privileged operation.
>
> No, that's not what is intended. I was asking about possibility to run
> KVM at users privileges after some necessary actions have been
> completed, and tried to compile a list of such actions.
>
> That is,
>
> - adjust RTC (I just added this to the system startup script)

You can also just run guests with -no-rtc.

> - create a tap
> - add tap to the bridge (if bridging is used)/adjust iptables if no
> bridging (another example in qemu wiki)

You may want to look at VDE (http://vde.sf.net).  One of it's purposes 
was to allow non-privileged users to access bridges.

> - open /dev/kvm (as it has been found, group membership is sufficient
> if group can write to /dev/kvm)
>
> After that, process privileges might be dropped to those of the user
> who logged (ssh'd) in. Images of disk volumes and CDs may then be
> assigned proper permissions, so users may be more flexible on what to
> run, and regular Unix filesystem mechanisms will control access.

Yup.

> BTW if qemu_system_x86-64 runs at user privileges, can the memory
> consumed be subject to whatever per-user limits that may be set
> systemwide?

I don't think so although as Avi mentioned, this will be addressed when 
the overcommit patches are merged.

Regards,

Anthony Liguori


-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to