Re: [PATCH] [RFC] c/r: Add UTS support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Quoting Daniel Lezcano (daniel.lezcano@xxxxxxx):
> Dan Smith wrote:
> > DL> I guess it will be esay to implement with a nsproxy level counter.
> > DL> Each time you unshare, the new nsproxy count is incremented.
> > DL> Assuming the init_nsproxy is level 0, when the nsproxy counter is
> > DL> > 1, the process is uncheckpointable.
> >
> > This should also be possible by just making sure that the nsproxy of
> > the root process being checkpointed is the same as any of the
> > children, correct?  That way we avoid having to modify the core
> > nsproxy bits and can still reject any nested namespaces.
> >   
> Right, this is another option. The nsproxy counter will allow to flag at 
> runtime a process to be uncheckpointable. The nsproxy comparison will 
> detect nested nsproxies at checkpoint time.

Or, to stick more to the resource->may_checkpoint way of doing it, you
setbit(&nsproxy->uts_ns->may_checkpoint, 0) when the uts_ns is
created, and anytime a task does clone(CLONE_NEWUTS) or
unshare(CLONE_NEWUTS), you clear the bit on the parent uts_ns.

-serge
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linux-foundation.org/mailman/listinfo/containers

[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux