Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932340AbWBPR6w (ORCPT ); Thu, 16 Feb 2006 12:58:52 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932551AbWBPR6v (ORCPT ); Thu, 16 Feb 2006 12:58:51 -0500 Received: from e35.co.us.ibm.com ([32.97.110.153]:3799 "EHLO e35.co.us.ibm.com") by vger.kernel.org with ESMTP id S932549AbWBPR6u (ORCPT ); Thu, 16 Feb 2006 12:58:50 -0500 Date: Thu, 16 Feb 2006 11:57:49 -0600 From: "Serge E. Hallyn" To: "Eric W. Biederman" Cc: "Serge E. Hallyn" , Kirill Korotaev , linux-kernel@vger.kernel.org, vserver@list.linux-vserver.org, Alan Cox , Dave Hansen , Arjan van de Ven , Suleiman Souhlal , Hubertus Franke , Cedric Le Goater , Kyle Moffett , Greg , Linus Torvalds , Andrew Morton , Greg KH , Rik van Riel , Alexey Kuznetsov , Andrey Savochkin , Kirill Korotaev , Andi Kleen , Benjamin Herrenschmidt , Jeff Garzik , Trond Myklebust , Jes Sorensen Subject: Re: (pspace,pid) vs true pid virtualization Message-ID: <20060216175749.GB11974@sergelap.austin.ibm.com> References: <20060215145942.GA9274@sergelap.austin.ibm.com> <20060216143030.GA27585@MAIL.13thfloor.at> <20060216153729.GB22358@sergelap.austin.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.11 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1493 Lines: 36 Quoting Eric W. Biederman (ebiederm@xmission.com): > "Serge E. Hallyn" writes: > > > Quoting Herbert Poetzl (herbert@13thfloor.at): > >> > - Should a process have some sort of global (on the machine identifier)? > >> > >> this is mandatory, as it is required to kill any process > >> from the host (admin) context, without entering the pid > >> space (which would lead to all kind of security issues) > > > > Just to be clear: you think there should be cases where pspace x can > > kill processes in pspace y, but can't enter it? > > > > I'm not convinced that grounded in reasonable assumptions... > > Actually I think it is. The admin should control what is running > on their box. Of course. I meant "grounded in reasonable security assumptions." If you really are the admin then you will find another way of "getting into" the pspace. But really, what does "enter" mean in this case? If you can see the processes so as to kill them, is that all you need? After all this is distinct from the filesystem namespace - the pids are the only thing that's distinct. So the only thing that I can see you preventing by preventing "entering" the pspace is starting a new process with a pid valid in the other pspace. -serge - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/