Anthony,

On 6/13/07, Anthony Liguori <[EMAIL PROTECTED]> wrote:

> One thing to consider is that if a userspace process can create KVM
> guests, they are capable of pinning large quantities of physical
> memory.  This could be used as a DoS attack so consider VM creation a
> privileged operation.

No, that's not what is intended. I was asking about possibility to run
KVM at users privileges after some necessary actions have been
completed, and tried to compile a list of such actions.

That is,

- adjust RTC (I just added this to the system startup script)
- create a tap
- add tap to the bridge (if bridging is used)/adjust iptables if no
bridging (another example in qemu wiki)
- open /dev/kvm (as it has been found, group membership is sufficient
if group can write to /dev/kvm)

After that, process privileges might be dropped to those of the user
who logged (ssh'd) in. Images of disk volumes and CDs may then be
assigned proper permissions, so users may be more flexible on what to
run, and regular Unix filesystem mechanisms will control access.

BTW if qemu_system_x86-64 runs at user privileges, can the memory
consumed be subject to whatever per-user limits that may be set
systemwide?

-- 
Dimitry Golubovsky

Anywhere on the Web

-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to