[lxc-devel] Running windows over lxc
We where reading about OS level virtualization and came across that non of such Open Source implementation have feature of providing virtualization for propitiatory OS like windows. Proposing idea: We can run QEMU in one of the container which will create a virtualization environment for Windows. Proposal: We need to integrate the QEMU inside the OpenVZ so that whenever any windows OS need a virtualization environment, we will run a copy of QEMU working with single Windows OS. Please give your suggestions over this. -- Be Happy Always +919579650250 -- Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ ___ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel
[lxc-devel] Running windows over lxc
We where reading about OS level virtualization and came across that non of such Open Source implementation have feature of providing virtualization for propitiatory OS like windows. Proposing idea: We can run QEMU in one of the container which will create a virtualization environment for Windows. Proposal: We need to integrate the QEMU inside the OpenVZ so that whenever any windows OS need a virtualization environment, we will run a copy of QEMU working with single Windows OS. Please give your suggestions over this. -- Be Happy Always +919579650250 -- Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ ___ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel
Re: [lxc-devel] Running windows over lxc
The idea works, you just have to make the /dev/kvm device visible in the lxc with something like: lxc.cgroup.devices.allow = c 10:* rwm" The kvm device has a minor that could be detected before lxc configuration to avoid the * giving the lxc visibility to all the miscellaneous devices. Of course the kvm module must be inserted by host or lxc guest and the /dev/kvm node must exist in the lxc guest file-system. Mixing of virtualizations is good fun, I prefer making lxc containers in a qemu-kvm virtualization... Also qemu in qemu can be done thanks to the nested function of the kvm module. What is the difference between "windows in qemu in lxc" and "windows in qemu" Why would you want a windows, anyway ? > We where reading about OS level virtualization and came across that > non of such Open Source implementation have feature of providing > virtualization for propitiatory OS like windows. > > Proposing idea: > We can run QEMU in one of the container which will create a > virtualization environment for Windows. > > Proposal: > We need to integrate the QEMU inside the OpenVZ so that whenever any > windows OS need a virtualization environment, we will run a copy of > QEMU working with single Windows OS. > > Please give your suggestions over this. > > -- > Be Happy Always > +919579650250 > > -- > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > ___ > Lxc-devel mailing list > Lxc-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/lxc-devel > -- Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ ___ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel
Re: [lxc-devel] Running windows over lxc
On 16.08.2012 22:18, Kumar Sukhani wrote: > We where reading about OS level virtualization and came across that > non of such Open Source implementation have feature of providing > virtualization for propitiatory OS like windows. > > Proposing idea: > We can run QEMU in one of the container which will create a > virtualization environment for Windows. QEMU already creates virtualization environment, why do you need another layer? You may take a look at libvirt which already uses cgroups for qemu processes for better isolation. Qemu itself has a few interesting options, like -runas and -chroot. /mjt -- Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ ___ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel
[lxc-devel] [PATCH 1/1] Cleanup partial container if -h was passed to template
If user calls 'lxc-create -t ubuntu -- -h' (as opposed to 'lxc-create -t ubuntu -h') then the ubuntu template will print its help then exit 0. Then lxc-create does not cleanup. So detect this in lxc-create. --- src/lxc/lxc-create.in | 12 1 file changed, 12 insertions(+) diff --git a/src/lxc/lxc-create.in b/src/lxc/lxc-create.in index 39d6f54..cca4157 100644 --- a/src/lxc/lxc-create.in +++ b/src/lxc/lxc-create.in @@ -136,6 +136,18 @@ while true; do esac done +# If -h or --help was passed into the container, we'll want to cleanup +# afterward +wantedhelp=0 +for var in "$@" +do +if [ "$var" = "-h" -o "$var" = "--help" ]; then +help +exit 1 +fi +done + + if [ -z "$lxc_path" ]; then echo "$(basename $0): no configuration path defined" >&2 exit 1 -- 1.7.9.5 -- Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ ___ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel