[Devel] [RFC] [PATCH 0/2] namespace enter through hijack
Serge E. Hallyn
serue at us.ibm.com
Wed Aug 29 13:04:20 PDT 2007
This patchset implements namespace entering by forcing a task in
the target namespace to clone itself. This has some advantages
over just replacing a random task's namespace pointers to the
target ones. In particular
1. If switching pid namespaces, the stack of upids is
automatically correctly generated.
2. Security context is inherited from the target
task. Assuming a security module which labels
data based on the task security context, like selinux,
this may prevent severe mislabeling of container data by
an inadvertant host system administrator action.
Whether that works or not will still depend on the
policy and the task cloned.
While this version takes a pid of a process to clone (for
convenience of prototyping) we may prefer to use a ns_container
name and choose one of it's tasks, to prevent pid wraparound.
Tested and 'works for me', but at the moment I'm just sending
this out for discussion.
Alternatives to this include bind_ns()+switch_ns() by Cedric
and the ns_container namespace entering enhancements I've
previously sent.
thanks,
-serge
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
More information about the Devel
mailing list