<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openvz.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Med</id>
	<title>OpenVZ Virtuozzo Containers Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openvz.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Med"/>
	<link rel="alternate" type="text/html" href="https://wiki.openvz.org/Special:Contributions/Med"/>
	<updated>2026-05-15T16:23:56Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Containers/Mini-summit_2008_notes&amp;diff=6232</id>
		<title>Containers/Mini-summit 2008 notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Containers/Mini-summit_2008_notes&amp;diff=6232"/>
		<updated>2008-07-23T00:33:39Z</updated>

		<summary type="html">&lt;p&gt;Med: Fix typo in name of attendee&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category: Containers]]&lt;br /&gt;
&lt;br /&gt;
Intros (8:36am)&lt;br /&gt;
&lt;br /&gt;
        Dave Hansen&lt;br /&gt;
        Eric Biederman&lt;br /&gt;
        Jason Byron, Red Hat&lt;br /&gt;
        Joe Rusio, Evergreen&lt;br /&gt;
        Joe McDonald&lt;br /&gt;
        HP China&lt;br /&gt;
        Sonny Rao&lt;br /&gt;
        HP&lt;br /&gt;
        HP&lt;br /&gt;
        Matine Silberman HP&lt;br /&gt;
        Sandy Harris&lt;br /&gt;
        NEC Japan&lt;br /&gt;
        John Schultz, AOL&lt;br /&gt;
        Pavel Emelyanov, Parallels/OpenVZ&lt;br /&gt;
        Denis Lunev, Parallels/OpenVZ&lt;br /&gt;
        Constant Chan&lt;br /&gt;
        Benjamin Thery, Bull&lt;br /&gt;
        Daniel Lezcano, IBM&lt;br /&gt;
        Serge Hallyn, IBM&lt;br /&gt;
&lt;br /&gt;
On Phone:&lt;br /&gt;
        Amy Griffis, HP&lt;br /&gt;
        Dhaval Giani, IBM&lt;br /&gt;
&lt;br /&gt;
(Later walk-ins)&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
&lt;br /&gt;
Why do various companies want containers?&lt;br /&gt;
        ibm: workload management&lt;br /&gt;
        EB: using containers as improved chroot&lt;br /&gt;
        HP: wants similar to ibm, plus security&lt;br /&gt;
        parallels: hosted providers&lt;br /&gt;
&lt;br /&gt;
sysfs issues&lt;br /&gt;
        EB gives status: should go into next merge window&lt;br /&gt;
&lt;br /&gt;
mini-namespaces&lt;br /&gt;
        NFS&lt;br /&gt;
                clients should behave differently on diff. containers&lt;br /&gt;
                currently uses single sunrpc transport for all containers&lt;br /&gt;
        Dave: is there a list of all openvz mini-ns?&lt;br /&gt;
        EB:&lt;br /&gt;
                proposal:&lt;br /&gt;
                        create little filesystems&lt;br /&gt;
                        still store everything in nsproxy&lt;br /&gt;
                currently:&lt;br /&gt;
                        some people want same process in different netns's&lt;br /&gt;
                        almost possible now, but can't open new sockets&lt;br /&gt;
                namespace enter:&lt;br /&gt;
                        3 purposes&lt;br /&gt;
                                login&lt;br /&gt;
                                monitoring&lt;br /&gt;
                                configuring&lt;br /&gt;
                may be worth prototyping the proposal&lt;br /&gt;
                        address mqns, or sunrpc, or fuse?&lt;br /&gt;
        DH:&lt;br /&gt;
                openvz addresses this using one big clone(), right?&lt;br /&gt;
                (yes)&lt;br /&gt;
&lt;br /&gt;
userid namespaces&lt;br /&gt;
        EB summarizes his proposal&lt;br /&gt;
                userid ns is unsharable without privilege&lt;br /&gt;
                userids, capabilities, security labels become ns-local&lt;br /&gt;
                hierarchical like pidns&lt;br /&gt;
        openvz: just does chroot&lt;br /&gt;
        DH:&lt;br /&gt;
                observers that system vs. app containers have different requirements&lt;br /&gt;
        EB:&lt;br /&gt;
                so with userid namespaces, user has god-like powers over created namespaces&lt;br /&gt;
        EB+SH will talk about hacking something this week during ols&lt;br /&gt;
        Uses:&lt;br /&gt;
                user unttrusted mounts&lt;br /&gt;
                build systems&lt;br /&gt;
&lt;br /&gt;
device namespaces&lt;br /&gt;
        tty namespaces rejected&lt;br /&gt;
        should be solved with generic device namespaces&lt;br /&gt;
                virtualize the major:minor-&amp;gt;device mapping&lt;br /&gt;
        reserved device numbers (unnamed)&lt;br /&gt;
                created with /proc?&lt;br /&gt;
                get_unnamed_device()&lt;br /&gt;
        tty ideas:&lt;br /&gt;
                use selinux ptys&lt;br /&gt;
                use user namespaces&lt;br /&gt;
                use legacy ptys&lt;br /&gt;
                leverage ptyfs&lt;br /&gt;
        Suka is not on, so he gets volunteered to do pure /dev/pts fs approach&lt;br /&gt;
&lt;br /&gt;
per-container LSMs:&lt;br /&gt;
        SH: thinks LSMs should handle it&lt;br /&gt;
        EB:&lt;br /&gt;
                original purpose of chroot&lt;br /&gt;
                set up policies from inside container&lt;br /&gt;
                creating smack container inside selinux would be ideal&lt;br /&gt;
&lt;br /&gt;
entering a  container&lt;br /&gt;
        netns: identified using pid of a ns&lt;br /&gt;
        sh: can we solve this using EB's namespace filesystems proposal?&lt;br /&gt;
        (EB goes to the board to demonstrate his proposal)&lt;br /&gt;
        PM: Can we use control groups?&lt;br /&gt;
        PE: Can we re-use /proc/pid/ ?&lt;br /&gt;
        EB: could have a ns with no processes in it&lt;br /&gt;
        Example of command using this:&lt;br /&gt;
                ip set eth0 netns &amp;lt;pid&amp;gt;&lt;br /&gt;
                becomes&lt;br /&gt;
                ip set eth0 netns /proc/&amp;lt;pid&amp;gt;/&lt;br /&gt;
        DL:&lt;br /&gt;
                a real netns problem is knowing when a childns has died&lt;br /&gt;
                the netnsfs mount could solve that&lt;br /&gt;
        PE: EB, can you send POC patches for the namespace?&lt;br /&gt;
                EB and EM will both send their own POC.&lt;br /&gt;
&lt;br /&gt;
DL: people have complained about needing CAP_SYS_ADMIN to unshare ns&lt;br /&gt;
        EB: example, setuid root sysvipc-using program could be fooled&lt;br /&gt;
&lt;br /&gt;
PE: Entering a container:&lt;br /&gt;
        reasons:&lt;br /&gt;
                monitoring&lt;br /&gt;
                enter an administrative command&lt;br /&gt;
        DH: how do you do it now?&lt;br /&gt;
        PE: numerical ID for each VE, use it to enter&lt;br /&gt;
        EB:&lt;br /&gt;
                one need for entering: /sbin/hotplug&lt;br /&gt;
        (someone): does hijack suffice?&lt;br /&gt;
        EB: two cases:&lt;br /&gt;
                partial entering&lt;br /&gt;
                full entering&lt;br /&gt;
                sys_hijack does not address partial entering&lt;br /&gt;
        DH:&lt;br /&gt;
                why need partial entering?&lt;br /&gt;
                fs stuff can be done without entering&lt;br /&gt;
        PM: privileged process&lt;br /&gt;
        PE:&lt;br /&gt;
                will look at hijack patches&lt;br /&gt;
                someone will re-send hijack to containers@&lt;br /&gt;
                EB:&lt;br /&gt;
                        if we can do sys_hijack cleanly,&lt;br /&gt;
                        we can use it to solve kthread problem&lt;/div&gt;</summary>
		<author><name>Med</name></author>
		
	</entry>
</feed>