On Fri, May 20, 2016 at 9:25 AM, James Bottomley
wrote:
>
> On Fri, 2016-05-20 at 09:17 -0700, Tejun Heo wrote:
> > Hello, James.
> >
> > On Fri, May 20, 2016 at 12:09:10PM -0400, James Bottomley wrote:
> > > I think it's just different definitions. If you
On Fri, May 20, 2016 at 9:25 AM, James Bottomley
wrote:
>
> On Fri, 2016-05-20 at 09:17 -0700, Tejun Heo wrote:
> > Hello, James.
> >
> > On Fri, May 20, 2016 at 12:09:10PM -0400, James Bottomley wrote:
> > > I think it's just different definitions. If you take on our
> > > definition of being
On Thu, Apr 14, 2016 at 8:27 AM, Serge E. Hallyn wrote:
> Quoting Eric W. Biederman (ebied...@xmission.com):
>> "Serge E. Hallyn" writes:
>>
>> > This is so that userspace can distinguish a mount made in a cgroup
>> > namespace from a bind mount from a cgroup
On Thu, Apr 14, 2016 at 8:27 AM, Serge E. Hallyn wrote:
> Quoting Eric W. Biederman (ebied...@xmission.com):
>> "Serge E. Hallyn" writes:
>>
>> > This is so that userspace can distinguish a mount made in a cgroup
>> > namespace from a bind mount from a cgroup subdirectory.
>>
>> To do that do
On Wed, Apr 13, 2016 at 12:01 PM, Serge E. Hallyn wrote:
> Quoting Tejun Heo (t...@kernel.org):
>> Hello, Serge.
>>
>> On Wed, Apr 13, 2016 at 01:46:39PM -0500, Serge E. Hallyn wrote:
>> > It's not a leak of any information we're trying to hide. I realize
>> > something like 8
On Wed, Apr 13, 2016 at 12:01 PM, Serge E. Hallyn wrote:
> Quoting Tejun Heo (t...@kernel.org):
>> Hello, Serge.
>>
>> On Wed, Apr 13, 2016 at 01:46:39PM -0500, Serge E. Hallyn wrote:
>> > It's not a leak of any information we're trying to hide. I realize
>> > something like 8 years have passed,
On Wed, Jan 7, 2015 at 1:28 AM, Richard Weinberger wrote:
> Am 07.01.2015 um 00:20 schrieb Aditya Kali:
>> I understand your point. But it will add some complexity to the code.
>>
>> Before trying to make it work for non-unified hierarchy cases, I would
>> like to get
On Wed, Jan 7, 2015 at 1:28 AM, Richard Weinberger rich...@nod.at wrote:
Am 07.01.2015 um 00:20 schrieb Aditya Kali:
I understand your point. But it will add some complexity to the code.
Before trying to make it work for non-unified hierarchy cases, I would
like to get a clearer idea.
What
, 2015 at 4:17 PM, Richard Weinberger wrote:
> Am 06.01.2015 um 01:10 schrieb Aditya Kali:
>> Since the old/default behavior is on its way out, I didn't invest time
>> in fixing that. Also, some of the properties that make
>> cgroup-namespace simpler are only provided
, 2015 at 4:17 PM, Richard Weinberger rich...@nod.at wrote:
Am 06.01.2015 um 01:10 schrieb Aditya Kali:
Since the old/default behavior is on its way out, I didn't invest time
in fixing that. Also, some of the properties that make
cgroup-namespace simpler are only provided by unified hierarchy
On Mon, Jan 5, 2015 at 3:53 PM, Eric W. Biederman wrote:
> Richard Weinberger writes:
>
>> Am 05.01.2015 um 23:48 schrieb Aditya Kali:
>>> On Sun, Dec 14, 2014 at 3:05 PM, Richard Weinberger wrote:
>>>> Aditya,
>>>>
>>>> I gave your pa
Thanks for the review. I have made the suggested fixes. Regarding
relative path, please see inline.
On Fri, Dec 12, 2014 at 12:54 AM, Zefan Li wrote:
>> +In its current form, the cgroup namespaces patcheset provides following
>> +behavior:
>> +
>> +(1) The 'cgroupns-root' for a cgroup namespace
On Sun, Dec 14, 2014 at 3:05 PM, Richard Weinberger wrote:
> Aditya,
>
> I gave your patch set a try but it does not work for me.
> Maybe you can bring some light into the issues I'm facing.
> Sadly I still had no time to dig into your code.
>
> Am 05.12.2014 um 02:5
On Sun, Dec 14, 2014 at 3:05 PM, Richard Weinberger rich...@nod.at wrote:
Aditya,
I gave your patch set a try but it does not work for me.
Maybe you can bring some light into the issues I'm facing.
Sadly I still had no time to dig into your code.
Am 05.12.2014 um 02:55 schrieb Aditya Kali
Thanks for the review. I have made the suggested fixes. Regarding
relative path, please see inline.
On Fri, Dec 12, 2014 at 12:54 AM, Zefan Li lize...@huawei.com wrote:
+In its current form, the cgroup namespaces patcheset provides following
+behavior:
+
+(1) The 'cgroupns-root' for a cgroup
On Mon, Jan 5, 2015 at 3:53 PM, Eric W. Biederman ebied...@xmission.com wrote:
Richard Weinberger rich...@nod.at writes:
Am 05.01.2015 um 23:48 schrieb Aditya Kali:
On Sun, Dec 14, 2014 at 3:05 PM, Richard Weinberger rich...@nod.at wrote:
Aditya,
I gave your patch set a try but it does
These patches are now also hosted on github at
https://github.com/adityakali/linux/tree/cgroupns_v3.
Thanks,
On Thu, Dec 4, 2014 at 5:55 PM, Aditya Kali wrote:
> Another spin for CGroup Namespaces feature.
>
> Changes from V2:
> 1. Added documentation in Documentation/cgroups/names
get_task_cgroup() returns the (reference counted) cgroup of the
given task on the default hierarchy.
Acked-by: Serge Hallyn
Signed-off-by: Aditya Kali
---
include/linux/cgroup.h | 1 +
kernel/cgroup.c| 25 +
2 files changed, 26 insertions(+)
diff --git
the target cgroupns-root.
Signed-off-by: Aditya Kali
---
kernel/cgroup_namespace.c | 17 +++--
1 file changed, 15 insertions(+), 2 deletions(-)
diff --git a/kernel/cgroup_namespace.c b/kernel/cgroup_namespace.c
index 0e0ef3a..ee0cc51 100644
--- a/kernel/cgroup_namespace.c
+++ b/kernel
Signed-off-by: Aditya Kali
---
Documentation/cgroups/namespace.txt | 147
1 file changed, 147 insertions(+)
create mode 100644 Documentation/cgroups/namespace.txt
diff --git a/Documentation/cgroups/namespace.txt
b/Documentation/cgroups/namespace.txt
new
libcontainer, lxc, lmctfy, etc.) to create completely virtualized
containers without leaking system level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali
---
fs/proc/namespaces.c | 1 +
include/linux/cgroup.h
move cgroup_get() and cgroup_put() into cgroup.h so that
they can be called from other places.
Acked-by: Serge Hallyn
Signed-off-by: Aditya Kali
---
include/linux/cgroup.h | 22 ++
kernel/cgroup.c| 22 --
2 files changed, 22 insertions(+), 22
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali
---
fs/kernfs/mount.c | 48
include/linux/kernfs.h
CLONE_NEWCGROUP will be used to create new cgroup namespace.
Acked-by: Serge Hallyn
Signed-off-by: Aditya Kali
---
include/uapi/linux/sched.h | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h
index 34f9d73..2f90d00
The new function kernfs_path_from_node() generates and returns
kernfs path of a given kernfs_node relative to a given parent
kernfs_node.
Signed-off-by: Aditya Kali
---
fs/kernfs/dir.c| 195 +++--
include/linux/kernfs.h | 3 +
2 files
Another spin for CGroup Namespaces feature.
Changes from V2:
1. Added documentation in Documentation/cgroups/namespace.txt
2. Fixed a bug that caused crash
3. Incorporated some other suggestions from last patchset:
- removed use of threadgroup_lock() while creating new cgroupns
- use
Another spin for CGroup Namespaces feature.
Changes from V2:
1. Added documentation in Documentation/cgroups/namespace.txt
2. Fixed a bug that caused crash
3. Incorporated some other suggestions from last patchset:
- removed use of threadgroup_lock() while creating new cgroupns
- use
The new function kernfs_path_from_node() generates and returns
kernfs path of a given kernfs_node relative to a given parent
kernfs_node.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/kernfs/dir.c| 195 +++--
include/linux/kernfs.h
CLONE_NEWCGROUP will be used to create new cgroup namespace.
Acked-by: Serge Hallyn serge.hal...@canonical.com
Signed-off-by: Aditya Kali adityak...@google.com
---
include/uapi/linux/sched.h | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/include/uapi/linux/sched.h b
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/kernfs/mount.c | 48
move cgroup_get() and cgroup_put() into cgroup.h so that
they can be called from other places.
Acked-by: Serge Hallyn serge.hal...@canonical.com
Signed-off-by: Aditya Kali adityak...@google.com
---
include/linux/cgroup.h | 22 ++
kernel/cgroup.c| 22
Signed-off-by: Aditya Kali adityak...@google.com
---
Documentation/cgroups/namespace.txt | 147
1 file changed, 147 insertions(+)
create mode 100644 Documentation/cgroups/namespace.txt
diff --git a/Documentation/cgroups/namespace.txt
b/Documentation/cgroups
libcontainer, lxc, lmctfy, etc.) to create completely virtualized
containers without leaking system level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/proc/namespaces.c | 1 +
include/linux
get_task_cgroup() returns the (reference counted) cgroup of the
given task on the default hierarchy.
Acked-by: Serge Hallyn serge.hal...@canonical.com
Signed-off-by: Aditya Kali adityak...@google.com
---
include/linux/cgroup.h | 1 +
kernel/cgroup.c| 25 +
2
the target cgroupns-root.
Signed-off-by: Aditya Kali adityak...@google.com
---
kernel/cgroup_namespace.c | 17 +++--
1 file changed, 15 insertions(+), 2 deletions(-)
diff --git a/kernel/cgroup_namespace.c b/kernel/cgroup_namespace.c
index 0e0ef3a..ee0cc51 100644
--- a/kernel
These patches are now also hosted on github at
https://github.com/adityakali/linux/tree/cgroupns_v3.
Thanks,
On Thu, Dec 4, 2014 at 5:55 PM, Aditya Kali adityak...@google.com wrote:
Another spin for CGroup Namespaces feature.
Changes from V2:
1. Added documentation in Documentation/cgroups
On Wed, Nov 26, 2014 at 2:58 PM, Richard Weinberger
wrote:
>
> On Thu, Nov 6, 2014 at 6:33 PM, Aditya Kali wrote:
> > On Tue, Nov 4, 2014 at 5:10 AM, Vivek Goyal wrote:
> >> On Fri, Oct 31, 2014 at 12:18:54PM -0700, Aditya Kali wrote:
> >> [..]
> >>&g
On Wed, Nov 26, 2014 at 2:58 PM, Richard Weinberger
richard.weinber...@gmail.com wrote:
On Thu, Nov 6, 2014 at 6:33 PM, Aditya Kali adityak...@google.com wrote:
On Tue, Nov 4, 2014 at 5:10 AM, Vivek Goyal vgo...@redhat.com wrote:
On Fri, Oct 31, 2014 at 12:18:54PM -0700, Aditya Kali wrote
feedback.
On Tue, Nov 4, 2014 at 7:50 AM, Serge E. Hallyn wrote:
>
> Quoting Andy Lutomirski (l...@amacapital.net):
> > On Tue, Nov 4, 2014 at 5:46 AM, Tejun Heo wrote:
> > > Hello, Aditya.
> > >
> > > On Mon, Nov 03, 2014 at 02:43:47PM -
feedback.
On Tue, Nov 4, 2014 at 7:50 AM, Serge E. Hallyn se...@hallyn.com wrote:
Quoting Andy Lutomirski (l...@amacapital.net):
On Tue, Nov 4, 2014 at 5:46 AM, Tejun Heo t...@kernel.org wrote:
Hello, Aditya.
On Mon, Nov 03, 2014 at 02:43:47PM -0800, Aditya Kali wrote:
I agree
On Tue, Nov 4, 2014 at 5:10 AM, Vivek Goyal wrote:
> On Fri, Oct 31, 2014 at 12:18:54PM -0700, Aditya Kali wrote:
> [..]
>> fs/kernfs/dir.c | 194
>> ++-
>> fs/kernfs/mount.c| 48 ++
On Tue, Nov 4, 2014 at 5:57 AM, Tejun Heo wrote:
> Hello, Aditya.
>
> On Mon, Nov 03, 2014 at 03:12:28PM -0800, Aditya Kali wrote:
>> I think the sane-behavior flag is only temporary and will be removed
>> anyways, right? So I didn't bother asking user to supply it. But I c
On Tue, Nov 4, 2014 at 5:57 AM, Tejun Heo t...@kernel.org wrote:
Hello, Aditya.
On Mon, Nov 03, 2014 at 03:12:28PM -0800, Aditya Kali wrote:
I think the sane-behavior flag is only temporary and will be removed
anyways, right? So I didn't bother asking user to supply it. But I can
make
On Tue, Nov 4, 2014 at 5:10 AM, Vivek Goyal vgo...@redhat.com wrote:
On Fri, Oct 31, 2014 at 12:18:54PM -0700, Aditya Kali wrote:
[..]
fs/kernfs/dir.c | 194
++-
fs/kernfs/mount.c| 48 ++
fs/proc/namespaces.c
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali
---
fs/kernfs/mount.c | 48
include/linux/kernfs.h
libcontainer, lxc, lmctfy, etc.) to create completely virtualized
containers without leaking system level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali
---
fs/proc/namespaces.c | 1 +
include/linux/cgroup.h
On Mon, Nov 3, 2014 at 4:17 PM, Andy Lutomirski wrote:
> On Mon, Nov 3, 2014 at 4:12 PM, Aditya Kali wrote:
>> On Mon, Nov 3, 2014 at 3:48 PM, Andy Lutomirski wrote:
>>> On Mon, Nov 3, 2014 at 3:23 PM, Aditya Kali wrote:
>>>> On Mon, Nov 3, 2014 at 3:15 PM
On Mon, Nov 3, 2014 at 3:48 PM, Andy Lutomirski wrote:
> On Mon, Nov 3, 2014 at 3:23 PM, Aditya Kali wrote:
>> On Mon, Nov 3, 2014 at 3:15 PM, Andy Lutomirski wrote:
>>> On Mon, Nov 3, 2014 at 3:12 PM, Aditya Kali wrote:
>>>> On Fri, Oct 31, 2014 at 5:07 PM
On Fri, Oct 31, 2014 at 5:58 PM, Eric W. Biederman
wrote:
> Andy Lutomirski writes:
>
>> On Fri, Oct 31, 2014 at 12:18 PM, Aditya Kali wrote:
>
>
>
>>> +static void *cgroupns_get(struct task_struct *task)
>>> +{
>>> + struct cgroup_
On Fri, Oct 31, 2014 at 5:02 PM, Andy Lutomirski wrote:
> On Fri, Oct 31, 2014 at 12:18 PM, Aditya Kali wrote:
>> Introduce the ability to create new cgroup namespace. The newly created
>> cgroup namespace remembers the cgroup of the process at the point
>> of creation of
On Mon, Nov 3, 2014 at 3:15 PM, Andy Lutomirski wrote:
> On Mon, Nov 3, 2014 at 3:12 PM, Aditya Kali wrote:
>> On Fri, Oct 31, 2014 at 5:07 PM, Andy Lutomirski wrote:
>>> On Fri, Oct 31, 2014 at 12:19 PM, Aditya Kali wrote:
>>>> This patch enables cgroup mountin
On Fri, Oct 31, 2014 at 5:07 PM, Andy Lutomirski wrote:
> On Fri, Oct 31, 2014 at 12:19 PM, Aditya Kali wrote:
>> This patch enables cgroup mounting inside userns when a process
>> as appropriate privileges. The cgroup filesystem mounted is
>> rooted at the cgroupns-root.
(sorry for accidental non-plain-text response earlier).
On Fri, Oct 31, 2014 at 6:09 PM, Eric W. Biederman
wrote:
> Aditya Kali writes:
>
>> This patch enables cgroup mounting inside userns when a process
>> as appropriate privileges. The cgroup filesystem mounted is
>>
(sorry for accidental non-plain-text response earlier).
On Fri, Oct 31, 2014 at 6:09 PM, Eric W. Biederman
ebied...@xmission.com wrote:
Aditya Kali adityak...@google.com writes:
This patch enables cgroup mounting inside userns when a process
as appropriate privileges. The cgroup filesystem
On Fri, Oct 31, 2014 at 5:07 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Oct 31, 2014 at 12:19 PM, Aditya Kali adityak...@google.com wrote:
This patch enables cgroup mounting inside userns when a process
as appropriate privileges. The cgroup filesystem mounted is
rooted
On Mon, Nov 3, 2014 at 3:15 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Nov 3, 2014 at 3:12 PM, Aditya Kali adityak...@google.com wrote:
On Fri, Oct 31, 2014 at 5:07 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Oct 31, 2014 at 12:19 PM, Aditya Kali adityak...@google.com
On Fri, Oct 31, 2014 at 5:02 PM, Andy Lutomirski l...@amacapital.net wrote:
On Fri, Oct 31, 2014 at 12:18 PM, Aditya Kali adityak...@google.com wrote:
Introduce the ability to create new cgroup namespace. The newly created
cgroup namespace remembers the cgroup of the process at the point
On Fri, Oct 31, 2014 at 5:58 PM, Eric W. Biederman
ebied...@xmission.com wrote:
Andy Lutomirski l...@amacapital.net writes:
On Fri, Oct 31, 2014 at 12:18 PM, Aditya Kali adityak...@google.com wrote:
snip
+static void *cgroupns_get(struct task_struct *task)
+{
+ struct
On Mon, Nov 3, 2014 at 3:48 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Nov 3, 2014 at 3:23 PM, Aditya Kali adityak...@google.com wrote:
On Mon, Nov 3, 2014 at 3:15 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Nov 3, 2014 at 3:12 PM, Aditya Kali adityak...@google.com wrote
On Mon, Nov 3, 2014 at 4:17 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Nov 3, 2014 at 4:12 PM, Aditya Kali adityak...@google.com wrote:
On Mon, Nov 3, 2014 at 3:48 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Nov 3, 2014 at 3:23 PM, Aditya Kali adityak...@google.com wrote
libcontainer, lxc, lmctfy, etc.) to create completely virtualized
containers without leaking system level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/proc/namespaces.c | 1 +
include
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/kernfs/mount.c | 48
Another attempt at Cgroup Namespace patch-set. This incorporates
suggestions on previous patch-set.
Changes from V1:
1. No pinning of processes within cgroupns. Tasks can be freely moved
across cgroups even outside of their cgroupns-root. Usual DAC/MAC policies
apply as before.
2. Path in
move cgroup_get() and cgroup_put() into cgroup.h so that
they can be called from other places.
Signed-off-by: Aditya Kali
---
include/linux/cgroup.h | 22 ++
kernel/cgroup.c| 22 --
2 files changed, 22 insertions(+), 22 deletions(-)
diff --git
get_task_cgroup() returns the (reference counted) cgroup of the
given task on the default hierarchy.
Signed-off-by: Aditya Kali
---
include/linux/cgroup.h | 1 +
kernel/cgroup.c| 25 +
2 files changed, 26 insertions(+)
diff --git a/include/linux/cgroup.h b
The new function kernfs_path_from_node() generates and returns
kernfs path of a given kernfs_node relative to a given parent
kernfs_node.
Signed-off-by: Aditya Kali
---
fs/kernfs/dir.c| 194 +++--
include/linux/kernfs.h | 3 +
2 files
libcontainer, lxc, lmctfy, etc.) to create completely virtualized
containers without leaking system level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali
---
fs/proc/namespaces.c | 1 +
include/linux/cgroup.h
the target cgroupns-root.
Signed-off-by: Aditya Kali
---
kernel/cgroup_namespace.c | 18 --
1 file changed, 16 insertions(+), 2 deletions(-)
diff --git a/kernel/cgroup_namespace.c b/kernel/cgroup_namespace.c
index 7e9bda0..0803575 100644
--- a/kernel/cgroup_namespace.c
+++ b/kernel
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali
---
fs/kernfs/mount.c | 48
include/linux/kernfs.h
CLONE_NEWCGROUP will be used to create new cgroup namespace.
Signed-off-by: Aditya Kali
---
include/uapi/linux/sched.h | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h
index 34f9d73..2f90d00 100644
--- a/include/uapi
CLONE_NEWCGROUP will be used to create new cgroup namespace.
Signed-off-by: Aditya Kali adityak...@google.com
---
include/uapi/linux/sched.h | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h
index 34f9d73..2f90d00 100644
the target cgroupns-root.
Signed-off-by: Aditya Kali adityak...@google.com
---
kernel/cgroup_namespace.c | 18 --
1 file changed, 16 insertions(+), 2 deletions(-)
diff --git a/kernel/cgroup_namespace.c b/kernel/cgroup_namespace.c
index 7e9bda0..0803575 100644
--- a/kernel
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/kernfs/mount.c | 48
The new function kernfs_path_from_node() generates and returns
kernfs path of a given kernfs_node relative to a given parent
kernfs_node.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/kernfs/dir.c| 194 +++--
include/linux/kernfs.h
libcontainer, lxc, lmctfy, etc.) to create completely virtualized
containers without leaking system level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali adityak...@google.com
---
fs/proc/namespaces.c | 1 +
include/linux
get_task_cgroup() returns the (reference counted) cgroup of the
given task on the default hierarchy.
Signed-off-by: Aditya Kali adityak...@google.com
---
include/linux/cgroup.h | 1 +
kernel/cgroup.c| 25 +
2 files changed, 26 insertions(+)
diff --git a/include
move cgroup_get() and cgroup_put() into cgroup.h so that
they can be called from other places.
Signed-off-by: Aditya Kali adityak...@google.com
---
include/linux/cgroup.h | 22 ++
kernel/cgroup.c| 22 --
2 files changed, 22 insertions(+), 22
Another attempt at Cgroup Namespace patch-set. This incorporates
suggestions on previous patch-set.
Changes from V1:
1. No pinning of processes within cgroupns. Tasks can be freely moved
across cgroups even outside of their cgroupns-root. Usual DAC/MAC policies
apply as before.
2. Path in
I will include the suggested changes in the new patchset. Some comments inline.
On Thu, Oct 16, 2014 at 9:37 AM, Serge E. Hallyn wrote:
> Quoting Aditya Kali (adityak...@google.com):
>> Introduce the ability to create new cgroup namespace. The newly created
>> cgroup name
I will include the suggested changes in the new patchset. Some comments inline.
On Thu, Oct 16, 2014 at 9:37 AM, Serge E. Hallyn se...@hallyn.com wrote:
Quoting Aditya Kali (adityak...@google.com):
Introduce the ability to create new cgroup namespace. The newly created
cgroup namespace
On Fri, Oct 17, 2014 at 2:28 AM, Serge E. Hallyn wrote:
> Quoting Aditya Kali (adityak...@google.com):
>> Restrict following operations within the calling tasks:
>> * cgroup_mkdir & cgroup_rmdir
>> * cgroup_attach_task
>> * writes to cgroup files outside of task's
On Tue, Oct 21, 2014 at 5:58 PM, Andy Lutomirski wrote:
> On Tue, Oct 21, 2014 at 5:46 PM, Aditya Kali wrote:
>> On Tue, Oct 21, 2014 at 3:42 PM, Andy Lutomirski wrote:
>>> On Tue, Oct 21, 2014 at 3:33 PM, Aditya Kali wrote:
>>>> On Tue, Oct 21, 2014 at 12:02 PM
On Tue, Oct 21, 2014 at 5:58 PM, Andy Lutomirski l...@amacapital.net wrote:
On Tue, Oct 21, 2014 at 5:46 PM, Aditya Kali adityak...@google.com wrote:
On Tue, Oct 21, 2014 at 3:42 PM, Andy Lutomirski l...@amacapital.net wrote:
On Tue, Oct 21, 2014 at 3:33 PM, Aditya Kali adityak...@google.com
On Fri, Oct 17, 2014 at 2:28 AM, Serge E. Hallyn se...@hallyn.com wrote:
Quoting Aditya Kali (adityak...@google.com):
Restrict following operations within the calling tasks:
* cgroup_mkdir cgroup_rmdir
* cgroup_attach_task
* writes to cgroup files outside of task's cgroupns-root
Also, read
On Tue, Oct 21, 2014 at 3:42 PM, Andy Lutomirski wrote:
> On Tue, Oct 21, 2014 at 3:33 PM, Aditya Kali wrote:
>> On Tue, Oct 21, 2014 at 12:02 PM, Andy Lutomirski
>> wrote:
>>> On Tue, Oct 21, 2014 at 11:49 AM, Aditya Kali wrote:
>>>> On Mon, Oct 2
On Tue, Oct 21, 2014 at 12:02 PM, Andy Lutomirski wrote:
> On Tue, Oct 21, 2014 at 11:49 AM, Aditya Kali wrote:
>> On Mon, Oct 20, 2014 at 10:49 PM, Andy Lutomirski
>> wrote:
>>> On Mon, Oct 20, 2014 at 10:42 PM, Eric W. Biederman
>>> wrote:
On Mon, Oct 20, 2014 at 10:49 PM, Andy Lutomirski wrote:
> On Mon, Oct 20, 2014 at 10:42 PM, Eric W. Biederman
> wrote:
>> Andy Lutomirski writes:
>>
>>> On Mon, Oct 20, 2014 at 9:49 PM, Eric W. Biederman
>>> wrote:
Andy Lutomirski writes:
> Possible solution:
>
> Ditch the
On Mon, Oct 20, 2014 at 10:49 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Oct 20, 2014 at 10:42 PM, Eric W. Biederman
ebied...@xmission.com wrote:
Andy Lutomirski l...@amacapital.net writes:
On Mon, Oct 20, 2014 at 9:49 PM, Eric W. Biederman
ebied...@xmission.com wrote:
Andy
On Tue, Oct 21, 2014 at 12:02 PM, Andy Lutomirski l...@amacapital.net wrote:
On Tue, Oct 21, 2014 at 11:49 AM, Aditya Kali adityak...@google.com wrote:
On Mon, Oct 20, 2014 at 10:49 PM, Andy Lutomirski l...@amacapital.net
wrote:
On Mon, Oct 20, 2014 at 10:42 PM, Eric W. Biederman
ebied
On Tue, Oct 21, 2014 at 3:42 PM, Andy Lutomirski l...@amacapital.net wrote:
On Tue, Oct 21, 2014 at 3:33 PM, Aditya Kali adityak...@google.com wrote:
On Tue, Oct 21, 2014 at 12:02 PM, Andy Lutomirski l...@amacapital.net
wrote:
On Tue, Oct 21, 2014 at 11:49 AM, Aditya Kali adityak
On Thu, Oct 16, 2014 at 2:12 PM, Serge E. Hallyn wrote:
> Quoting Aditya Kali (adityak...@google.com):
>> setns on a cgroup namespace is allowed only if
>> * task has CAP_SYS_ADMIN in its current user-namespace and
>> over the user-namespace associated with target cgroupns
On Thu, Oct 16, 2014 at 2:12 PM, Serge E. Hallyn se...@hallyn.com wrote:
Quoting Aditya Kali (adityak...@google.com):
setns on a cgroup namespace is allowed only if
* task has CAP_SYS_ADMIN in its current user-namespace and
over the user-namespace associated with target cgroupns.
* task's
On Tue, Oct 14, 2014 at 3:42 PM, Andy Lutomirski wrote:
> On Mon, Oct 13, 2014 at 2:23 PM, Aditya Kali wrote:
>> Second take at the Cgroup Namespace patch-set.
>>
>> Major changes form RFC (V0):
>> 1. setns support for cgroupns
>> 2. 'mount -t cgroup cg
On Tue, Oct 14, 2014 at 3:42 PM, Andy Lutomirski l...@amacapital.net wrote:
On Mon, Oct 13, 2014 at 2:23 PM, Aditya Kali adityak...@google.com wrote:
Second take at the Cgroup Namespace patch-set.
Major changes form RFC (V0):
1. setns support for cgroupns
2. 'mount -t cgroup cgroup mntpt
Second take at the Cgroup Namespace patch-set.
Major changes form RFC (V0):
1. setns support for cgroupns
2. 'mount -t cgroup cgroup ' from inside a cgroupns now
mounts the cgroup hierarcy with cgroupns-root as the filesystem root.
3. writes to cgroup files outside of cgroupns-root are not
roup of another task outside of its cgroupns-root, then
it won't be able to see anything for the default hierarchy.
This is same as if the cgroups are not mounted.
Signed-off-by: Aditya Kali
---
kernel/cgroup.c | 34 +-
1 file changed, 33 insertions(+), 1 deletion(-)
move cgroup_get() and cgroup_put() into cgroup.h so that
they can be called from other places.
Signed-off-by: Aditya Kali
---
include/linux/cgroup.h | 22 ++
kernel/cgroup.c| 22 --
2 files changed, 22 insertions(+), 22 deletions(-)
diff --git
CLONE_NEWCGROUP will be used to create new cgroup namespace.
Signed-off-by: Aditya Kali
---
include/uapi/linux/sched.h | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h
index 34f9d73..2f90d00 100644
--- a/include/uapi
completely virtualized containers without leaking system
level cgroup hierarchy to the task.
This patch only implements the 'unshare' part of the cgroupns.
Signed-off-by: Aditya Kali
---
fs/proc/namespaces.c | 3 +
include/linux/cgroup.h | 18 +-
include/linux
to run inside the containers
without depending on any global state.
In order to support this, a new kernfs api is added to lookup the
dentry for the cgroupns-root.
Signed-off-by: Aditya Kali
---
fs/kernfs/mount.c | 48
include/linux/kernfs.h
1 - 100 of 162 matches
Mail list logo