[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140529111236.GA14576@cachalot>
Date: Thu, 29 May 2014 15:12:37 +0400
From: Vasily Kulikov <segoon@...nwall.com>
To: Pavel Emelyanov <xemul@...allels.com>
Cc: Richard Weinberger <richard.weinberger@...il.com>,
containers@...ts.linux-foundation.org,
Serge Hallyn <serge.hallyn@...ntu.com>,
linux-kernel@...r.kernel.org, Oleg Nesterov <oleg@...hat.com>,
David Howells <dhowells@...hat.com>,
"Eric W. Biederman" <ebiederm@...ssion.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Al Viro <viro@...iv.linux.org.uk>
Subject: Re: [PATCH v2] /proc/pid/status: show all sets of pid according to ns
On Thu, May 29, 2014 at 13:07 +0400, Pavel Emelyanov wrote:
> On 05/29/2014 09:59 AM, Vasily Kulikov wrote:
> > On Wed, May 28, 2014 at 23:27 +0400, Pavel Emelyanov wrote:
> > ] We need a direct method of getting the pid inside containers.
> > ] If some issues occurred inside container guest, host user
> > ] could not know which process is in trouble just by guest pid:
> > ] the users of container guest only knew the pid inside containers.
> > ] This will bring obstacle for trouble shooting.
> >
> > A new syscall might complicate trouble shooting by admin.
>
> Pure syscall -- yes. What if we teach the ps and top utilities to show additional
> info? I think that would help.
I like the idea with low level non-shell API which can be used by
utility like ps (or implementation of a new tool to work with complex
namespace hierarchies). It should fit for troublesooting. Then there
should be no reason to implement two different APIs for observation from
shell via FS and from applications.
However, maybe it is possible to implement not via new syscall but
by implementation of new symlink in sysfs? Then both ps-like tool and
CRIU-like tool is able to obtain the ns information by the same means.
Maybe sort of a symlink to a parent namespace or a process which is
inside of the parent namespace? Then a process may identify IDs using
following steps:
1) identify target NS by walking current procfs
2) do setns(2)/chroot(2)
3) look at procfs to identify target IDs in the target NS
It would be impossible to identify foreign IDs for unprivileged
processes, however.
Thanks,
--
Vasily Kulikov
http://www.openwall.com - bringing security into open computing environments
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists