OpenVZ Forum


Home » Mailing lists » Devel » [RFC] ns containers (v2): namespace entering
Re: [RFC] ns containers (v2): namespace entering [message #17496 is a reply to message #17476] Wed, 21 February 2007 21:04 Go to previous messageGo to previous message
serue is currently offline  serue
Messages: 750
Registered: February 2006
Senior Member
Quoting Eric W. Biederman (ebiederm@xmission.com):
> "Serge E. Hallyn" <serue@us.ibm.com> writes:
> 
> > Quoting Eric W. Biederman (ebiederm@xmission.com):
> >> 
> >> You miss an issue here.  One of the dangers of enter is leaking
> >> capabilities into a contained set of processes.   Once you show up in
> >
> > Good point.  As wrong as it feels to me to use ptrace for this, the
> > advantage is that none of my task attributes leak into the target
> > namespace, and that's a very good thing.
> >
> > I do wonder how you specify what the forced clone should run.
> > Presumably you want to run something not in the target container.
> > I suppose we can pass the fd over a socket or something.
> 
> Yes.  At least in the case without a network namespace I can setup
> a unix domain socket and pass file descriptors around.  I think my solution
> to the network namespace case was to just setup a unix domain socket in
> the parent namespace and leave it open in init.  Not a real solution :(

How about we solve both this and the general ugliness of using ptrace
with a new

	hijack_and_clone(struct task_struct *tsk, int fd)

Which takes tsk, clones it, and execs the contents of fd?

-serge
_______________________________________________
Containers mailing list
Containers@lists.osdl.org
https://lists.osdl.org/mailman/listinfo/containers
 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: [RFC][PATCH 6/6]: Enable unsharing pid namespace.
Next Topic: [PATCH 0/2] resource control file system - aka containers on top of nsproxy!
Goto Forum:
  


Current Time: Sun Aug 10 23:15:51 GMT 2025

Total time taken to generate the page: 0.13810 seconds