Re: Virtualizing /proc/sys/kernel/random/boot_id per container ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 09/04/2012 09:18 PM, Serge E. Hallyn wrote:
> Quoting Glauber Costa (glommer@xxxxxxxxxxxxx):
>> On 09/04/2012 07:25 PM, Serge Hallyn wrote:
>>> Quoting Glauber Costa (glommer@xxxxxxxxxxxxx):
>>>> On 09/04/2012 06:44 PM, Serge Hallyn wrote:
>>>>> Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx):
>>>>>> Glauber Costa <glommer@xxxxxxxxxxxxx> writes:
>>>>>>
>>>>>>> On 08/31/2012 04:13 AM, Eric W. Biederman wrote:
>>>>>>>> "Daniel P. Berrange" <berrange@xxxxxxxxxx> writes:
>>>>>>>>
>>>>>>>>> On Thu, Aug 30, 2012 at 03:15:17PM -0700, Eric W. Biederman wrote:
>>>>>>>>>> "Daniel P. Berrange" <berrange@xxxxxxxxxx> writes:
>>>>>>>>>>
>>>>>>>>>>> One of the features that SystemD folks have asked us to fix in LXC, is
>>>>>>>>>>> to make sure that /proc/sys/kernel/random/boot_id changes each time a
>>>>>>>>>>> container is started.
>>>>>>>>>>
>>>>>>>>>> There may be a good reason for this.  Most of the time what I have seen
>>>>>>>>>> of kernel requests from the direction of SystemD is that while there may
>>>>>>>>>> be a real problem but usually their imagined solution is not a
>>>>>>>>>> particularly good solution.  So a description of the problem is needed.
>>>>>>>>>>
>>>>>>>>>> Justifying something with just SystemD wants this is a good way to get
>>>>>>>>>> a nack.
>>>>>>>>>
>>>>>>>>> SystemD records log messages for all system services in their journal.
>>>>>>>>> They can show you all log messages for the current service execution,
>>>>>>>>> all log messages for a service since system boot, or all log messsages
>>>>>>>>> ever. The boot_id value is used as a unique tag to allow grouping of
>>>>>>>>> the log messages per system boot. When we run systemd inside a container
>>>>>>>>> we want to get that grouping of log messages generated by services inside
>>>>>>>>> the container, to take account of the container boot, not the host boot.
>>>>>>>>> Hence the desire to have the boot_id value reflect when a container is
>>>>>>>>> booted.
>>>>>>>>
>>>>>>>> Since SystemD post-dates containers and since the logging feature is not
>>>>>>>> currently in wide use that use case is completely non-persuasive.
>>>>>>>>
>>>>>>>> So far this just sounds like a plain SystemD bug and something that can
>>>>>>>> be easily changed at this point in time.
>>>>>>>>
>>>>>>>> It has been a long time but my fuzzy memory says that the originial
>>>>>>>> boot_id justification was based on use cases that could not be solved
>>>>>>>> any other way.
>>>>>>>>
>>>>>>>> My memory says it was this thread https://lkml.org/lkml/1999/5/31/233
>>>>>>>> that inspired the implementation of boot_id.  However reading the
>>>>>>>> current emacs source code it appears emacs gave up before boot_id
>>>>>>>> was implemented and stats /var/run/random-seed (which we seem to
>>>>>>>> have removed) or looks in wtmp or utmp for the latest boot record.
>>>>>>>>
>>>>>>>> I did a quick grep through the binaries on my system and I could not
>>>>>>>> find anything using /proc/sys/random/boot_id.
>>>>>>>>
>>>>>>>> That suggests to me that the proper solution is to actually just remove
>>>>>>>> boot_id.
>>>>>>>>
>>>>>>>> Hmm.  And then there is other interesting detail.  What should boot_id
>>>>>>>> return after the processes have migrated from one system to another.
>>>>>>>>
>>>>>>>
>>>>>>> Since this would be a per-boot id, this clearly has to be carried over
>>>>>>> with migration, along with all the tons of data we already carry.
>>>>>>
>>>>>> The twist of course is what does a boot mean.  If we are really after
>>>>>> machine boots than the current behavior is correct.
>>>>>>
>>>>>> Looking back in the archives the desired behavior appears to be a value
>>>>>> that can be used to see if a pid value must be stale.
>>>>>>
>>>>>> As a stale pid detector boot_id is pretty lousy.  Pids can still be
>>>>>> reused.
>>>>>>
>>>>>> Still a role as a stale pid detector makes it clear which namespace
>>>>>> boot_id should be in and how we should treat boot_id upon migration.
>>>>>>
>>>>>> You can only serve as a stale pid detector if you are in the pid
>>>>>> namespace.
>>>>>>
>>>>>> So at this point patches are welcome.  Hopefully with a summary
>>>>>> of the discussion.
>>>>>
>>>>> I don't understand why this should be provided by the kernel.  Especially
>>>>> given that we've proven that everyone really wants this to be per-container
>>>>> as well.
>>>>>
>>>>> So why not just have init, on startup, create a /run/boot_id file, perhaps
>>>>> by sha1summing the time at which it started perhaps plus some nonce?
>>>>>
>>>> Why shouldn't it provided by the kernel?, is the real question
>>>
>>> Because it's not the right place.  The origin of this thread proves that
>>> people want a per-init, not per-kernel, value.
>>>
>>
>> Not all files provided by the kernel are "per-kernel". /proc/self is
>> full of per-namespace stuff.
>>
>>>> The way I see it, every file we need to setup from the outside is a
>>>> hassle. Among many other things, it is just asking for duplication of
>>>> efforts among multiple userspaces.
>>>>
>>>> netns does this for its proc files. The only reason we don't do it for
>>>> cgroups-driven file, is that the semantics is very ill-defined. For this
>>>> file, it doesn't seem to be the case.
>>>
>>> But it is the case.  How do you intend to have the kernel decide what
>>> value to put in there for a process in a container, or in a chroot?
>>>
>>
>> one value per pidns.
> 
> ok.  (So should it be called /proc/pidns_uuid?  Well, whatever.  No
> objection from me - thanks.)
> 
> -serge
> 
For completeness, I believe it should live in the same place it lives
today, and become a symlink from /proc/self/boot_id.

Consistent with what we have today for other values like this.
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/containers


[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux