Cargando…
A fully unprivileged CernVM-FS
The CernVM File System provides the software and container distribution backbone for most High Energy and Nuclear Physics experiments. It is implemented as a file system in user-space (Fuse) module, which permits its execution without any elevated privileges. Yet, mounting the file system in the fir...
Autores principales: | , , , , |
---|---|
Lenguaje: | eng |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://dx.doi.org/10.1051/epjconf/202024507012 http://cds.cern.ch/record/2758804 |
_version_ | 1780970191891464192 |
---|---|
author | Blomer, Jakob Dykstra, Dave Ganis, Gerardo Mosciatti, Simone Priessnitz, Jan |
author_facet | Blomer, Jakob Dykstra, Dave Ganis, Gerardo Mosciatti, Simone Priessnitz, Jan |
author_sort | Blomer, Jakob |
collection | CERN |
description | The CernVM File System provides the software and container distribution backbone for most High Energy and Nuclear Physics experiments. It is implemented as a file system in user-space (Fuse) module, which permits its execution without any elevated privileges. Yet, mounting the file system in the first place is handled by a privileged suid helper program that is installed by the Fuse package on most systems. The privileged nature of the mount system call is a serious hindrance to running CernVM-FS on opportunistic resource and supercomputers. Fortunately, recent developments in the Linux kernel and in the Fuse user-space libraries enabled fully unprivileged mounting for Fuse file systems (as of RHEL 8), or at least outsourcing the privileged mount system call to a custom, external process. This opens the door to several, very appealing new ways to use CernVM-FS, such as a generally usable "super pilot" consisting of the pilot code bundled with Singularity and CernVM-FS, or the on-demand instantiation of unprivileged, ephemeral containers to publish new CernVM-FS content from anywhere. In this contribution, we discuss the integration of these new Linux features with CernVM-FS and show some of its most promising, new applications. |
id | oai-inspirehep.net-1796162 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2020 |
record_format | invenio |
spelling | oai-inspirehep.net-17961622021-03-25T08:30:21Zdoi:10.1051/epjconf/202024507012http://cds.cern.ch/record/2758804engBlomer, JakobDykstra, DaveGanis, GerardoMosciatti, SimonePriessnitz, JanA fully unprivileged CernVM-FSComputing and ComputersThe CernVM File System provides the software and container distribution backbone for most High Energy and Nuclear Physics experiments. It is implemented as a file system in user-space (Fuse) module, which permits its execution without any elevated privileges. Yet, mounting the file system in the first place is handled by a privileged suid helper program that is installed by the Fuse package on most systems. The privileged nature of the mount system call is a serious hindrance to running CernVM-FS on opportunistic resource and supercomputers. Fortunately, recent developments in the Linux kernel and in the Fuse user-space libraries enabled fully unprivileged mounting for Fuse file systems (as of RHEL 8), or at least outsourcing the privileged mount system call to a custom, external process. This opens the door to several, very appealing new ways to use CernVM-FS, such as a generally usable "super pilot" consisting of the pilot code bundled with Singularity and CernVM-FS, or the on-demand instantiation of unprivileged, ephemeral containers to publish new CernVM-FS content from anywhere. In this contribution, we discuss the integration of these new Linux features with CernVM-FS and show some of its most promising, new applications.The CernVM File System provides the software and container distribution backbone for most High Energy and Nuclear Physics experiments. It is implemented as a file system in user-space (Fuse) module, which permits its execution without any elevated privileges. Yet, mounting the file system in the first place is handled by a privileged suid helper program that is installed by the Fuse package on most systems. The privileged nature of the mount system call is a serious hindrance to running CernVM-FS on opportunistic resource and supercomputers. Fortunately, recent developments in the Linux kernel and in the Fuse user-space libraries enabled fully unprivileged mounting for Fuse file systems (as of RHEL 8), or at least outsourcing the privileged mount system call to a custom, external process. This opens the door to several, very appealing new ways to use CernVM-FS, such as a generally usable “super pilot” consisting of the pilot code bundled with Singularity and CernVM-FS, or the on-demand instantiation of unprivileged, ephemeral containers to publish new CernVM-FS content from anywhere. In this contribution, we discuss the integration of these new Linux features with CernVM-FS and show some of its most promising, new applications.FERMILAB-CONF-20-109-SCDoai:inspirehep.net:17961622020 |
spellingShingle | Computing and Computers Blomer, Jakob Dykstra, Dave Ganis, Gerardo Mosciatti, Simone Priessnitz, Jan A fully unprivileged CernVM-FS |
title | A fully unprivileged CernVM-FS |
title_full | A fully unprivileged CernVM-FS |
title_fullStr | A fully unprivileged CernVM-FS |
title_full_unstemmed | A fully unprivileged CernVM-FS |
title_short | A fully unprivileged CernVM-FS |
title_sort | fully unprivileged cernvm-fs |
topic | Computing and Computers |
url | https://dx.doi.org/10.1051/epjconf/202024507012 http://cds.cern.ch/record/2758804 |
work_keys_str_mv | AT blomerjakob afullyunprivilegedcernvmfs AT dykstradave afullyunprivilegedcernvmfs AT ganisgerardo afullyunprivilegedcernvmfs AT mosciattisimone afullyunprivilegedcernvmfs AT priessnitzjan afullyunprivilegedcernvmfs AT blomerjakob fullyunprivilegedcernvmfs AT dykstradave fullyunprivilegedcernvmfs AT ganisgerardo fullyunprivilegedcernvmfs AT mosciattisimone fullyunprivilegedcernvmfs AT priessnitzjan fullyunprivilegedcernvmfs |