Re: The issues for agreeing on a virtualization/namespacesimplementation.
From: Eric W. Biederman
Date: Wed Feb 08 2006 - 17:28:51 EST
Hubertus Franke <frankeh@xxxxxxxxxxxxxx> writes:
> Eric W. Biederman wrote:
>> Hubertus Franke <frankeh@xxxxxxxxxxxxxx> writes:
>>
>>>Eric W. Biederman wrote:
>>>
>>
>>>>3) How do we refer to namespaces and containers when we are not members?
>>>> - Do we refer to them indirectly by processes or other objects that
>>>> we can see and are members?
>>>> - Do we assign some kind of unique id to the containers?
>>>
>>>
>> What I have done which seems easier than creating new names is to refer
>> to the process which has the namespace I want to manipulate.
>
> Is then the idea to only allow the container->init to manipulate
> or is there need to allow other priviliged processes to perform namespace
> manipulation?
> Also after thinking about it.. why is there a need to have an external name
> for a namespace ?
There are several cases.
Passing network devices to a childs namespace, as usually
the loopback interface is not enough.
Monitoring the namespace from outside, so among other things
you aren't required to checkpoint and migrate your monitoring
daemon.
There are several other control and monitoring operations
that I am not quite as familiar. One of them is the
vserver idea of entering a guest.
To expand on things a little bit. If we have interfaces
that take strings we can refer to an arbitrary child process
as pid/pid/pid/.... So we should not be limited to what
is at the init of the container. If that proves desirable.
Permissions checks for most of these operations require some
serious thinking before they are merged.
Eric
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/