[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Re: Users can provide their own kernels?


  • To: xen-users@xxxxxxxxxxxxxxxxxxx
  • From: Andy Smith <andy@xxxxxxxxxxxxxx>
  • Date: Wed, 15 Jun 2005 14:47:26 +0000
  • Delivery-date: Wed, 15 Jun 2005 14:46:31 +0000
  • List-id: Xen user discussion <xen-users.lists.xensource.com>
  • Openpgp: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc

On Wed, Jun 15, 2005 at 10:38:06AM -0400, Andrew Thompson wrote:
> Will there be options to prevent a domU that booted a dom0 kernel from 
> accessing xend? I'd hate for an abusive user to balloon all the other 
> domUs to 16MB RAM and balloon themselves to 1GB RAM, play with 
> scheduling parameters, or randomly kill off other domUs.

If they tried to run a dom0 inside a dom0 wouldn't they only have
access to whatever devices their domain was already allowed access
to?  SO they'd only be able to further subdivide their own RAM and
disk.. which might be interesting.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.