Quoting Cedric Le Goater ([EMAIL PROTECTED]):
* filesystems
- r/o bind mounts
being worked on by dave. hch will help.
- /proc and /sys isolation/virtualization
we should be able to mount different /proc in
containers. hch said he add ideas on the
Quoting Cedric Le Goater ([EMAIL PROTECTED]):
However, i've also heard many times that we should agree before
flooding lkml. So I guess we should use the vserver, openvz, lxc-devel
mailing-list (eric please subscribe to one) before sending our
agreement or disagreement on lkml.
Quoting Herbert Poetzl ([EMAIL PROTECTED]):
On Mon, Jul 03, 2006 at 11:38:38AM +0200, Rik Bobbaers wrote:
sorry guys, this was supposed to be to Bert only, that's
why it was in dutch...
good explanation, ignoring the fact that I do not 'really'
speak or understand dutch either :)
but
Quoting Eugen Leitl ([EMAIL PROTECTED]):
On Tue, Apr 25, 2006 at 08:25:37PM +1000, Tony Lewis wrote:
I think this would be a valuable addition to vservers. One of the risks
of renting a virtual server (pick your flavour) is that you're not
safe from the hosting sysadmin. If vservers
Quoting Oliver Welter ([EMAIL PROTECTED]):
Hi Mike, Serge,
So, is there any way to do this ? I guess that SELinux/GR will offer
some pointers to forbid root these actions, but are there any easier
ways ??
Sounds like SELinux is the tool of choice for that.
And if your concern is with
Quoting Michael S. Zick ([EMAIL PROTECTED]):
On Mon April 24 2006 01:02, Oliver Welter wrote:
Hi Folks,
this might be a strange question for some of you as it is more an
academical interesst, but I hope you can help me out ;)
Q: Is there a way to prevent that a superuser on the
Quoting Herbert Poetzl ([EMAIL PROTECTED]):
Hi Community!
for those who do not know yet, I recently was invited
from the PlanetLab folks to pay a visit to Princeton,
Cool.
- we will continue to develop ngnet and try to make
it work side by side with the current legacy net
(well,
Quoting Herbert Poetzl ([EMAIL PROTECTED]):
- pid and other types of 'isolation' will be extended
to do full virtualization without increasing the
overhead (in cooperation with folks from columbia)
(had to add it back :)
btw, do you have a version of the pid virtualization
patches
Quoting Herbert Poetzl ([EMAIL PROTECTED]):
On Thu, Dec 15, 2005 at 11:49:34AM -0800, Gerrit Huizenga wrote:
On Thu, 15 Dec 2005 09:35:57 EST, Hubertus Franke wrote:
This patchset is a followup to the posting by Serge.
http://marc.theaimsgroup.com/?l=linux-kernelm=113200410620972w=2
Quoting Rik van Riel ([EMAIL PROTECTED]):
On Tue, 13 Dec 2005, Herbert Poetzl wrote:
Well, as the OpenVZ folks announced their release on LKML
I just decided to do similar for the Linux-VServer release,
so please let me know if that is not considered appropriate.
Since there is a
Sigh... well I've got some major library problems on my
current partitions it seems, and no time to deal with them.
I'll have access to a new one soon, will play with this then.
-serge
Quoting Herbert Poetzl ([EMAIL PROTECTED]):
On Wed, Nov 09, 2005 at 10:48:47AM -0600, Serge Hallyn wrote:
Quoting Gregory (Grisha) Trubetskoy ([EMAIL PROTECTED]):
On Thu, 14 Jul 2005, Enrico Scholz wrote:
[EMAIL PROTECTED] (Enrico Scholz) writes:
| # auditctl -m 'foo'
| Error sending user message request (Operation not permitted)
...
This gives problems on Fedora Core 4 as recent pam
Quoting Herbert Poetzl ([EMAIL PROTECTED]):
ah, you are the one who is to blame for this mess ... :)
Well, I wanted to use lsm hooks, not capabilities...
For vserver, loginuid should probably always be reported along with
the vserver id, I guess...
patches to virtualize the loginuid are
13 matches
Mail list logo