[Devel] Re: [patch 0/8] unprivileged mount syscall

2007-04-13 Thread Serge E. Hallyn
Quoting Miklos Szeredi ([EMAIL PROTECTED]): > > > Thinking a bit more about this, I'm quite sure most users wouldn't > > > even want private namespaces. It would be enough to > > > > > > chroot /share/$USER > > > > > > and be done with it. > > > > > > Private namespaces are only good for keep

[Devel] Re: [patch 0/8] unprivileged mount syscall

2007-04-13 Thread Karel Zak
On Fri, Apr 13, 2007 at 01:58:59PM +0200, Miklos Szeredi wrote: > > On Wed, 2007-04-11 at 12:44 +0200, Miklos Szeredi wrote: > > > > 1. clone the master namespace. > > > > > > > > 2. in the new namespace > > > > > > > > move the tree under /share/$me to / > > > > for each ($user,

[Devel] Re: [PATCH 2/5] sysfs: Remove first pass at shadow directory support

2007-04-13 Thread Eric W. Biederman
Greg KH <[EMAIL PROTECTED]> writes: > On Fri, Apr 06, 2007 at 10:48:42AM -0600, Eric W. Biederman wrote: >> >> While shadow directories appear to be a good idea, the current scheme >> of controlling their creation and destruction outside of sysfs appears >> to be a locking and maintenance nightma

[Devel] Re: [PATCH 2/5] sysfs: Remove first pass at shadow directory support

2007-04-13 Thread Greg KH
On Fri, Apr 06, 2007 at 10:48:42AM -0600, Eric W. Biederman wrote: > > While shadow directories appear to be a good idea, the current scheme > of controlling their creation and destruction outside of sysfs appears > to be a locking and maintenance nightmare in the face of sysfs directories > dynam

[Devel] Re: [PATCH 2/8] Add container pointer on struct page

2007-04-13 Thread Pavel Emelianov
Jean-Pierre Dion wrote: > Hi Pavel, > > I have been implied in the work for the > memory controller of res groups a few months ago. > > I see that you propose to modify the struct > page to point to rss container struct. > This has made some debate because of the struct > page size increase, but

[Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag

2007-04-13 Thread Eric W. Biederman
"Serge E. Hallyn" <[EMAIL PROTECTED]> writes: > Quoting Miklos Szeredi ([EMAIL PROTECTED]): >> > Given the existence of shared subtrees allowing/denying this at the mount >> > namespace level is silly and wrong. >> > >> > If we need more than just the filesystem permission checks can we >> > make

[Devel] Re: [patch 0/8] unprivileged mount syscall

2007-04-13 Thread Miklos Szeredi
> > Thinking a bit more about this, I'm quite sure most users wouldn't > > even want private namespaces. It would be enough to > > > > chroot /share/$USER > > > > and be done with it. > > > > Private namespaces are only good for keeping a bunch of mounts > > referenced by a group of processes

[Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag

2007-04-13 Thread Serge E. Hallyn
Quoting Miklos Szeredi ([EMAIL PROTECTED]): > > Given the existence of shared subtrees allowing/denying this at the mount > > namespace level is silly and wrong. > > > > If we need more than just the filesystem permission checks can we > > make it a mount flag settable with mount and remount that

[Devel] Re: [patch 0/8] unprivileged mount syscall

2007-04-13 Thread Serge E. Hallyn
Quoting Miklos Szeredi ([EMAIL PROTECTED]): > > On Wed, 2007-04-11 at 12:44 +0200, Miklos Szeredi wrote: > > > > 1. clone the master namespace. > > > > > > > > 2. in the new namespace > > > > > > > > move the tree under /share/$me to / > > > > for each ($user, $what, $how) { > > >

[Devel] Re: [patch 0/8] unprivileged mount syscall

2007-04-13 Thread Miklos Szeredi
> On Wed, 2007-04-11 at 12:44 +0200, Miklos Szeredi wrote: > > > 1. clone the master namespace. > > > > > > 2. in the new namespace > > > > > > move the tree under /share/$me to / > > > for each ($user, $what, $how) { > > > move /share/$user/$what to /$what > > > if ($

Re: [Devel] Licensing Userland utils

2007-04-13 Thread Enrico Weigelt
* [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: Hi folks, > If it needs to support OpenVZ quickly, it would be great if the > userland control code is available in a library format under the > LGPL, whereas the utilities can still be GPL. I'm not an author of ovz, so I don't take part in th

[Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag

2007-04-13 Thread Miklos Szeredi
> Given the existence of shared subtrees allowing/denying this at the mount > namespace level is silly and wrong. > > If we need more than just the filesystem permission checks can we > make it a mount flag settable with mount and remount that allows > non-privileged users the ability to create mo

[Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag

2007-04-13 Thread Miklos Szeredi
> question: how is mounting filesystems (loopback, > fuse, etc) secured in such way that the user > cannot 'create' device nodes with 'unfortunate' > permissions? All unprivileged mounts have "nosuid,nodev" added to their options. Miklos ___ Containers