On Tue, Sep 04, 2012 at 02:20:46AM -0700, Eric W. Biederman wrote: > Glauber Costa <glommer@xxxxxxxxxxxxx> writes: > >> The twist of course is what does a boot mean. If we are really after > >> machine boots than the current behavior is correct. > >> > >> Looking back in the archives the desired behavior appears to be a value > >> that can be used to see if a pid value must be stale. > >> > >> As a stale pid detector boot_id is pretty lousy. Pids can still be > >> reused. > >> > >> Still a role as a stale pid detector makes it clear which namespace > >> boot_id should be in and how we should treat boot_id upon migration. > >> > >> You can only serve as a stale pid detector if you are in the pid > >> namespace. > >> > >> So at this point patches are welcome. Hopefully with a summary > >> of the discussion. > > > > Your discussion about boot_id being a limited solution is totally valid. > > But it is orthogonal to the question of whether or not a container > > should have it. > > The important part is that boot_id as originally conceived is an > identifier to be used in conjunction with pids. Therefore boot_id is a > proper pid_namespace component, and there are no semantic problems with > putting it in the kernel. > > boot_id as a pid namespace id is a very well defined concept. > > Agreed. > > A reference to the history and the definition needs to be in the patch > description. > > Then any tool could clone, mount proc, set this id, and continue > > normally. Any objections ? > > My biggest concern is that creating multiple pid namespaces might allow > a way to drain the entropy pool in a way that we don't allow normal > users. > > This is important to look at as with a little luck we will have > unprivileged creation of user namespaces and pid namespaces in the near > future. Unprivileged users can already ask the kernel to generate random UUIDs on demand. eg $ sysctl kernel.random.uuid kernel.random.uuid = 76199778-8f6d-4fae-a45d-2c4cc0bca62a $ sysctl kernel.random.uuid kernel.random.uuid = 00c7d637-f94d-4df6-82c3-34ad97dd782e ...etc... So allocating a new random UUID for boot_id each time a pid namespace is created does not appear to make the situation worse wrt entropy usage by unprivileged users. Regards, Daniel -- |: http://berrange.com -o- http://www.flickr.com/photos/dberrange/ :| |: http://libvirt.org -o- http://virt-manager.org :| |: http://autobuild.org -o- http://search.cpan.org/~danberr/ :| |: http://entangle-photo.org -o- http://live.gnome.org/gtk-vnc :| _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers