[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <E8CD8839-8FC9-4404-863B-38F36F7D4328@gmail.com>
Date: Wed, 24 Sep 2014 14:30:30 -0500
From: Riya Khanna <riyakhanna1983@...il.com>
To: "Eric W. Biederman" <ebiederm@...ssion.com>
Cc: LXC development mailing-list
<lxc-devel@...ts.linuxcontainers.org>,
Miklos Szeredi <miklos@...redi.hu>,
fuse-devel <fuse-devel@...ts.sourceforge.net>,
Tejun Heo <tj@...nel.org>,
Seth Forshee <seth.forshee@...onical.com>,
linux-kernel@...r.kernel.org,
Serge Hallyn <serge.hallyn@...ntu.com>
Subject: Re: Using devices in Containers (was: [lxc-devel] device namespaces)
On Sep 24, 2014, at 12:43 PM, Eric W. Biederman <ebiederm@...ssion.com> wrote:
> Serge Hallyn <serge.hallyn@...ntu.com> writes:
>
>> Isolation is provided by the devices cgroup. You want something more
>> than isolation.
>>
>> Quoting riya khanna (riyakhanna1983@...il.com):
>>> My use case for having device namespaces is device isolation. Isn't what
>>> namespaces are there for (as I understand)?
>
> Namespaces fundamentally provide for using the same ``global'' name
> in different contexts. This allows them to be used for isolation
> and process migration (because you can take the same name from
> machine to machine).
>
> Unless someone cares about device numbers at a namespace level
> the work is done.
>
> The mount namespace provides exsits to deal with file names.
> The devices cgroup will limit which devices you can access (although
> I can't ever imagine a case where the mout namespace would be
> insufficient).
>
>>> Not everything should be
>>> accessible (or even visible) from a container all the time (we have seen
>>> people come up with different use cases for this). However, bind-mounting
>>> takes away this flexibility.
>
> I don't see how. If they are mounts that propogate into the container
> and are controlled from outside you can do whatever you want. (I am
> imagining device by device bind mounts here). It should be trivial
> to have a a directory tree that propogates into a container and works.
>
Device-by-device bind mounts can grant/revoke access to real individual devices as and when needed. However, revoking the access to real devices could break the applications if there’s no transparent mechanism to back up the propagated (but now revoked) device bind mounts that could fool the apps into believing that they are working with real devices. Frame buffer is one such example, where safe multiplexing could be applied.
>>> I agree that assigning fixed device numbers is
>>> clearly not a long-term solution. Emulation for safe and flexible
>>> multiplexing, like you suggested either using CUSE/FUSE or something like
>>> devpts, is what I'm exploring.
>
> Is the problem you actually care about multiplexing devices?
>
The problem I care about is access to real devices, such as input, fb, loop, etc. as and when needed, thereby having native I/O performance - either through secure multiplexing or exclusive ownership, whatever makes sense according to the device type.
> I think there is quite a bit of room to talk about how to safely
> and effectively use devices in containers. So let's make that the
> discussion. No one actually wants device number namespaces and talking
> about them only muddies the watters.
>
I cannot agree more. Let’s restrict the discussion to it.
Thanks,
Riya
> Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists