Re: [lxc-devel] antispam policies [was: rename /etc/lxc/lxc.conf to /etc/lxc/default.conf]

2013-02-04 Thread Michael Tokarev
05.02.2013 05:10, Stéphane Graber wrote: dwight.en...@oracle.com: host aserp1030.oracle.com[141.146.126.68] said: 554 5.3.0 5.7.1 Permanently rejected due to our anti-spam policies. (in reply to MAIL FROM command) (this is about isrv.corpit.ru[86.62.121.231] - our mail host).

Re: [lxc-devel] Please make -f mandatory in lxc-create

2012-05-28 Thread Michael Tokarev
On 29.05.2012 02:02, richard -rw- weinberger wrote: Hi! Is there any use case where a user wants to omit -f? In my case I didn't use -f, but later resorted to using -f /dev/null to be sure. So this is yet another me too, I guess. Maybe there should be more well-defined behavour about what

Re: [lxc-devel] poor 10G ethernet performance

2012-05-11 Thread Michael Tokarev
On 11.05.2012 20:59, Ward, David - 0663 - MITLL wrote: [] In the container, could you create a MACVLAN interface in bridge mode attached to your 10Gb Ethernet interface, instead of going through a bridge device? I would expect that to perform better. FWIW, I tested macvlan vs bridge in the

Re: [lxc-devel] Detecting if you are running in a container

2011-11-02 Thread Michael Tokarev
On 02.11.2011 03:51, Eric W. Biederman wrote: [] And having CAP_MKNOD in container may not be that bad either, while cgroup device.permission is set correctly - some nodes may need to be created still, even in an unprivileged containers. Who filters out CAP_MKNOD during container startup (I

Re: [lxc-devel] mount ro in guest change host filesystem to ro

2011-09-01 Thread Michael Tokarev
On 02.09.2011 00:46, Daniel Lezcano wrote: On 09/01/2011 09:30 PM, Nico wrote: Hi, I just wanted to give it a try again with lxc after one year, this is so bad same bugs are always here : * you can do a mount -o romount,ro / inside container (reported since first times ... :( ), and host

Re: [lxc-devel] lxc 0.7.4 does not mount anything

2011-03-11 Thread Michael Tokarev
11.03.2011 22:47, richard -rw- weinberger пишет: hi, i'm using this minimal config: lxc.utsname = c0 lxc.mount.entry = none /lxc/c0/proc proc defaults 0 0 lxc.rootfs = /lxc/c0/ but lxc does not mount proc into /lxc/c0/proc. using lxc.mount = /path/to/fstab also does not work. it's also

Re: [lxc-devel] lxc 0.7.4 does not mount anything

2011-03-11 Thread Michael Tokarev
Daniel, this is this part: conf.c:mount_entry_on_absolute_rootfs(): aux = strstr(mntent-mnt_dir, rootfs-path); snprintf(path, MAXPATHLEN, %s%s, rootfs-mount, aux + strlen(rootfs-path)); if rootfs-path ends with a slash we happily eat it, producing this in

Re: [lxc-devel] Restarting snmp service on the host, shutdown snmp on the guest.

2011-01-20 Thread Michael Tokarev
[resending to the correct address; lxc-users@ bounced] On 20.01.2011 19:09, Jean-Philippe Menil wrote: Hi, i've just found something that is being anoying me: when i restart the snmpd daemon on my host, it shutdown the snmpd daemon on my container. This, and many similar cases, happens

Re: [lxc-devel] Packet loss when high network traffic load

2010-12-09 Thread Michael Tokarev
09.12.2010 18:29, Menil Jean-Philippe wrote: Hi, i'm experiencing some packet loss under high network traffic. Here is the scenario: i have on host with one guest running as a proxy (squid) So, when i start downloading 10-15 dvd image from my client (wget

Re: [lxc-devel] relative paths in mounts?

2010-11-23 Thread Michael Tokarev
23.11.2010 13:25, Michael Tokarev wrote: Hello again. I asked this question before, but got no (satisfactory) answer. So here it goes again. Why not chdir into the root of container right when the root filesystem is (bind-)mounted, and let all mount entries to be relative

Re: [lxc-devel] [PATCH] add lxc.network.script(.pre|.post|) configuration hooks

2010-10-08 Thread Michael Tokarev
Stefan Tomanek wrote: Dies schrieb Michael Tokarev (m...@tls.msk.ru): [] There's apparently no reason to run a script before creating a netdev (pair). Note that we don't even know which names will be used for the netdevs, at least in general case. I know, but there might be a point

Re: [lxc-devel] [PATCH] add lxc.network.script(.pre|.post|) configuration hooks

2010-10-08 Thread Michael Tokarev
Stefan Tomanek wrote: Dies schrieb Daniel Lezcano (daniel.lezc...@free.fr): Are we sure, we want to add these hooks (pre and post) ? I am not against adding them, but IMO it is more sane to add them if needed rather than adding something which may not be used. Well, until now, there was

Re: [lxc-devel] [PATCH] add lxc.network.script(.pre|.post|) configuration hooks

2010-10-08 Thread Michael Tokarev
08.10.2010 19:45, Daniel Lezcano wrote: [] There IS a trivial way to extend system already (when just ONE hook is implemented) - chain your scripts. There's no need to re-implement shell in lxc. Michael, I am not sure I get the idea. Can you elaborate a bit ? In our case, we need the

Re: [lxc-devel] Script hook for veth configuration (incl. patch)

2010-10-06 Thread Michael Tokarev
06.10.2010 12:06, Stefan Tomanek wrote: Hello, I'd like to use lxc for containing virtual debian instances, using the veth networking method. Due to the network topology employed, I do not want to use a bridge to connect the virtual devices to the real network, but set individual host

Re: [lxc-devel] read-only container root

2010-02-16 Thread Michael Tokarev
Daniel Lezcano wrote: Michael Tokarev wrote: lxc-start: No such file or directory - failed to mount a new instance of '/dev/pts' I'm experimenting with a read-only root fs in the container. So far it does not work. First of all, when trying to start a container in a read-only root lxc

[lxc-devel] read-only container root

2010-02-15 Thread Michael Tokarev
lxc-start: No such file or directory - failed to mount a new instance of '/dev/pts' I'm experimenting with a read-only root fs in the container. So far it does not work. First of all, when trying to start a container in a read-only root lxc-start complains: lxc-start: Read-only file system -