[Devel] Re: C/R and stdio redirection
Greg Kurz
gkurz at fr.ibm.com
Wed Oct 6 06:43:27 PDT 2010
On 10/06/2010 11:58 AM, Louis Rilling wrote:
> On 05/10/10 22:50 -0700, Sukadev Bhattiprolu wrote:
>> Greg Kurz [gkurz at fr.ibm.com] wrote:
>> | On Tue, 2010-09-07 at 13:03 -0700, Sukadev Bhattiprolu wrote:
>> |> Suppose we create a container and redirect its stdout/stderr as follows:
>> |>
>> |> lxc-execute -name foo -- /path/to/app> /tmp/xyz.out 2>&1
>> |>
>> |> If we attempt to checkpoint the container 'foo', we fail bc one of the
>> |> fds in the application refers to /tmp/xyz.out, which is also in use
>> |> outside the container (specifically sys_checkpoint() fails due to the
>> |> "alien mount ns" check in ckpt_fill_fname()).
>> |>
>> |> It can be argued, 'foo' is not a strict container (since it shares the
>> |> fd with another container). For this reason, we currently need the
>> |> CHECKPOINT_SUBTREE flag in lxc-checkpoint.
>> |>
>> |> We initially thought that solving mount-namespaces will solve this, but
>> |> realized that they are both separate problems. Mount-namespace C/R addresses
>> |> preserving the mounts within the container and /tmp/xyz.out is outside
>> |> the container.
>> |>
>> |> So if an application container needs to redirect stdio as above, we should
>> |> either
>> |> a) disable/ignore the alien-mount-ns check or
>> |>
>> |> b) try and start the application something like:
>> |>
>> |> $ cat /tmp/wrapper
>> |> /path/to/app> /tmp/xyz.out 2>&1
>> |>
>> |> $ lxc-execute --name foo -- /tmp/wrapper
>> |>
>> |> with the difference being /tmp/xyz.out is now inside the container's /tmp
>> |> filesystem rather than in the parent container.
>> |>
>> |> Maybe we can go with approach 'a' above only if CHECKPOINT_SUBTREE is also
>> |> set - we had discussed this before and considered it hacky.
>> |>
>> |> Or are there other solutions to this stdio redirection issue ?
>> |>
>> |
>> | To be more accurate, this issue is about fd leaking from a parent
>> | container to its descendants. The fd numbers may be anything else than
>> | 0,1 or 2 and the underlying files may be regular files, pipes,
>> | sockets... For example, in the HPC world, stdio are often sockets
>> | inheritated from a rshd like daemon.
>>
>> I agree that fd substitution is the right way to go.
>>
>> However, Matt Helsley and I were discussing this and wondered if we should
>> ignore the redirection and expect to user to specify it during restart.
>>
>> i.e if container was created like this:
>>
>> lxc-execute -name foo -- /path/to/app> /tmp/xyz.out 2>&1
>>
>> and checkpointed, can we expect the user to restart it like this ?
>>
>> lxc-restart --name foo --statefile ckpt.img>> /tmp/xyz.out
>>
>> i.e user has to redo the redirection or the output would go to stdout.
>>
>> Doing this would somehow seem to match a (bogus container) like:
>>
>> lxc-execute --name foo -- /path/to/app | sort
>>
>> If this container is checkpointed/restarted, we can't really redirect
>> the output of the app to 'sort' right ? So expecting the user to
>> redo the redirection on restart would treat both redirections ('>'
>> and '|') in a consistent way ?
> From the fd substitution point of view, this means that lxc-restart would
> automatically request the substitution of its stdout to the checkpointed
> container init's stdout?
>
Yes, and this should apply to any inherited file descriptor (not only
0,1 and 2).
> This sounds reasonable to me at least. Especially since the container is usually
> not supposed to know where the host is redirecting its stdout.
>
> Thanks,
>
> Louis
>
--
Greg
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
More information about the Devel
mailing list