Quoting Jean-Marc Pigeon ([email protected]):
> Hello,
> 
> Hello,
> 
> > >   Namely, I have in iptables, reject packet logging
> > >   on the HOST, as soon rsyslog is started on one
> > >   container, I can't see my reject packet log anymore. 
> > > 
> [...]
> 
> > >   If I am right, should ALL /proc/kmsg be isolated from
> > >   each other???
> > >   
> > >   How could it be done??
> > 
> > Well, the results of do_syslog() should be containerized.  Kernel
> > messages (oopses for instance) should always go to the initial
> > container.  Shouldn't be hard to do, but the question is what do
> > we tie it to?  User namespace?  Network namespace?  Eric, is this
> > something you've thought about at all?
> > 
> > I'm tempted to say userns makes the most sense - if you start a new
> > userns you likely always want private syslog, whereas with netns and
> > pidns you may not.
> 
>       I am not a kernel expert, but my guess/answer is
>       "user namespace".
>       I mean container /proc return only process number/info
>       pertaining to container.
>       Likewise /proc/kmsg should be container own, after all
>       if iptables rules can be specific to container AND
>       iptables can log via kmsg, then message must be reported
>       to container (and duplicated to kmsg host?) and do not
>       make trouble to host.

/proc/kmsg is just hooked int do_syslog(), the same helper used
by sys_sylog(), so we should be able to address this purely in
kernel/printk.c.

If I get some time tonight I may whip up a proof of concept, though
if anyone else wants to have at, please do.

-serge
_______________________________________________
Containers mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/containers

_______________________________________________
Devel mailing list
[email protected]
https://openvz.org/mailman/listinfo/devel

Reply via email to