Dear Ian,

to support your request in a convenience way, i recently drop in a small patch 
for the  lxc-ps  helper command. Using the LXC-aware frontend for ps, you're 
able to filter the ps output down to a (set of) named container or all of them. 
With the patch applied, you're now able to filter it down to the oposite: The 
processes not in any container ns, i.e. that of the host.

Notice that LXC is a "meta project" which is bundling the work of many other to 
a vehicle know as container. To make commands offered by other packages 
LXC-aware, we have to advance this request to the maintainers of this tools. 
But this only make sense, if the feature have reached a "stable" state in the 
context of LXC.

In the mean time, the LXC project have to provide some helpers like lxc-ps. And 
if you have a real usecase of it, then one have to build a lxc-killall.


A meta answer to your example is that the best practice for a realworld LXC 
production setup will include not to run *any* service on the host. From that, 
there's nothing that you can kill from the host inside a container "by 
mistake". And even at all: Unix is Unix; the root user of the host is the 
responsible super root user of the containers by basic design. And the root 
have to be able to do anything with the system and subsystems without any 
limitations as he may "kill -9 1" or "rm -r /". 


with greetings

Guido

On 2013-02-20 15:48, Serge Hallyn wrote:
> No.  However, you should be able to hack it up pretty easily in
> userspace by comparing /proc/$$/ns/pid.  It requires privilege,
> but a very simple, easy-to-verify helper which simply takes one
> argument and returns 0 if /proc/$1/ns/pid is the same as
> /proc/self/ns/pid should be trustable with setuid-root or
> file capabilities.
> 
> -serge
> 
> Quoting ian sison (mailing list) (ian.si...@gmail.com):
>> Hi - i'm re forwarding this email from 2011 in the hope that there's
>> been some work done on the mainline LXC code regarding hiding
>> container processes from the hardware node's process list.  Back then
>> there was no option available in LXC to implement this.  How about
>> today?
>>
>> - Ian
>>
>>
>> ---------- Forwarded message ----------
>> From: ian sison (mailing list) <ian.si...@gmail.com>
>> Date: Tue, May 3, 2011 at 6:53 PM
>> Subject: Hiding container processes from Host/HN's 'ps'
>> To: lxc-users@lists.sourceforge.net
>>
>>
>> Hi all -
>>
>> In openvz, a certain sysctl parameter,
>>
>> kernel.pid_ns_hide_child = 1
>>
>> when executed at HN system startup will hide any processes that run
>> inside the running containers from appearing in the output of 'ps'.
>> This makes for a cleaner 'ps' output in the hardware node, and
>> prevents inadvertent container malfunctions when something like
>> 'killall -9 httpd' is executed in the command line of the HN.
>>
>> How can i do the same with LXC?  My google searches draw up a blank.
>>
>> - Ian


------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_feb
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to