Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161106AbWBTSTe (ORCPT ); Mon, 20 Feb 2006 13:19:34 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1161108AbWBTSTe (ORCPT ); Mon, 20 Feb 2006 13:19:34 -0500 Received: from e4.ny.us.ibm.com ([32.97.182.144]:32726 "EHLO e4.ny.us.ibm.com") by vger.kernel.org with ESMTP id S1161106AbWBTSTc (ORCPT ); Mon, 20 Feb 2006 13:19:32 -0500 Subject: Re: (pspace,pid) vs true pid virtualization From: Dave Hansen To: Kirill Korotaev Cc: "Serge E. Hallyn" , "Eric W. Biederman" , linux-kernel@vger.kernel.org, vserver@list.linux-vserver.org, Alan Cox , Arjan van de Ven , Suleiman Souhlal , Hubertus Franke , Cedric Le Goater , Kyle Moffett , Greg , Linus Torvalds , Andrew Morton , Greg KH , Rik van Riel , Alexey Kuznetsov , Andrey Savochkin , Kirill Korotaev , Andi Kleen , Benjamin Herrenschmidt , Jeff Garzik , Trond Myklebust , Jes Sorensen In-Reply-To: <43F991DC.8010509@sw.ru> References: <20060215145942.GA9274@sergelap.austin.ibm.com> <20060216143030.GA27585@MAIL.13thfloor.at> <20060216153729.GB22358@sergelap.austin.ibm.com> <43F991DC.8010509@sw.ru> Content-Type: text/plain Date: Mon, 20 Feb 2006 10:19:26 -0800 Message-Id: <1140459566.10909.12.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Evolution 2.4.1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 922 Lines: 25 On Mon, 2006-02-20 at 12:54 +0300, Kirill Korotaev wrote: > VPS has reached it's process limit and you can't enter it. > If you suggest to make enter without resource limitations, then it will > be a security hole. I think the question is: Can or should an administrative process be able to do things inside of a container, without being subject that that container's resource limitations? Implementation wise, I'm sure we _can_ do something like that. We simply have to make sure that when processes are entering containers, they are subject to the originating container's resource limits, not the destination. Could you explain why this is a security hole? -- Dave - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/