pid ns feature request
Eric W. Biederman
ebiederm at xmission.com
Fri Apr 25 19:37:29 UTC 2014
Andy Lutomirski <luto at amacapital.net> writes:
> Unless I'm missing some trick, it's currently rather painful to mount
> a namespace /proc. You have to actually be in the pid namespace to
> mount the correct /proc instance, and you can't unmount the old /proc
> until you've mounted the new /proc. This means that you have to fork
> into the new pid namespace before you can finish setting it up.
Yes. You have to be inside just about all namespaces before you can
finish setting them up.
I don't know the context in which needed to be inside the pid namespace
is a burden.
> Would it make sense to add a mount option to procfs to request a mount
> for pid_ns_for_children instead of task_active_pid_ns?
This is about the using setns and unshare?
Adding a proc amount option that takes a pid namespace file descriptor
would be the general solution, and might be worth implementing.
Getting a pid namespace file descriptors when there are no pids might be
a challenge.
Eric
More information about the Containers
mailing list