Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964901AbWBPVLa (ORCPT ); Thu, 16 Feb 2006 16:11:30 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S964903AbWBPVLa (ORCPT ); Thu, 16 Feb 2006 16:11:30 -0500 Received: from watts.utsl.gen.nz ([202.78.240.73]:60321 "EHLO mail.utsl.gen.nz") by vger.kernel.org with ESMTP id S964901AbWBPVL3 (ORCPT ); Thu, 16 Feb 2006 16:11:29 -0500 Message-ID: <43F4EA6D.2040504@vilain.net> Date: Fri, 17 Feb 2006 10:11:09 +1300 From: Sam Vilain User-Agent: Mozilla Thunderbird 1.0.7 (X11/20051013) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Dave Hansen Cc: Herbert Poetzl , "Eric W. Biederman" , "Serge E. Hallyn" , Kirill Korotaev , linux-kernel@vger.kernel.org, vserver@list.linux-vserver.org, Alan Cox , Arjan van de Ven , Suleiman Souhlal , Hubertus Franke , Cedric Le Goater , Kyle Moffett , Greg , Linus Torvalds , Andrew Morton , Greg KH , Rik van Riel , Alexey Kuznetsov , Andrey Savochkin , Kirill Korotaev , Andi Kleen , Benjamin Herrenschmidt , Jeff Garzik , Trond Myklebust , Jes Sorensen Subject: Re: (pspace,pid) vs true pid virtualization References: <20060215145942.GA9274@sergelap.austin.ibm.com> <20060216143030.GA27585@MAIL.13thfloor.at> <1140111692.21383.2.camel@localhost.localdomain> <20060216191245.GA28223@MAIL.13thfloor.at> <1140118693.21383.18.camel@localhost.localdomain> In-Reply-To: <1140118693.21383.18.camel@localhost.localdomain> X-Enigmail-Version: 0.92.1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1567 Lines: 34 Dave Hansen wrote: > Brainstorming ... what do you think about having a special init process > inside the child to act as a proxy of sorts? It is controlled by the > parent vserver/container, and would not be subject to resource limits. > It would not necessarily need to fork in order to kill other processes > inside the vserver (not subject to resource limits). It could also > continue when the rest of the guest was suspended. > A pid killer would be ineffective against such a process because you > can't kill init. Well, another approach would be to create a new context which has visibility over the other container as well as the ability to send signals to it. >>In general, I prefer to think of this as working >>with nuclear material via an actuator from behind >>a 4" lead wall -- you just do not want to go in >>to fix things :) > Where does that lead you? Having a single global pid space which the > admin can see? Or, does a special set of system calls do it well > enough? I don't like this term "single global pid space". Two containers might be able to see all processes on the system, one might have a flat mapping to all PIDs < 64k (or pid_max), one with the XID,PID encoded bitwise. They are both global pid spaces, but there is no "single" one, unless that is all you compile in. Sam. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/