linux/kernel/cgroup
Tejun Heo 5136f6365c cgroup: implement "nsdelegate" mount option
Currently, cgroup only supports delegation to !root users and cgroup
namespaces don't get any special treatments.  This limits the
usefulness of cgroup namespaces as they by themselves can't be safe
delegation boundaries.  A process inside a cgroup can change the
resource control knobs of the parent in the namespace root and may
move processes in and out of the namespace if cgroups outside its
namespace are visible somehow.

This patch adds a new mount option "nsdelegate" which makes cgroup
namespaces delegation boundaries.  If set, cgroup behaves as if write
permission based delegation took place at namespace boundaries -
writes to the resource control knobs from the namespace root are
denied and migration crossing the namespace boundary aren't allowed
from inside the namespace.

This allows cgroup namespace to function as a delegation boundary by
itself.

v2: Silently ignore nsdelegate specified on !init mounts.

Signed-off-by: Tejun Heo <tj@kernel.org>
Cc: Aravind Anbudurai <aru7@fb.com>
Cc: Serge Hallyn <serge@hallyn.com>
Cc: Eric Biederman <ebiederm@xmission.com>
2017-06-28 14:45:21 -04:00
..
cgroup-internal.h cgroup: Move debug cgroup to its own file 2017-06-14 16:01:21 -04:00
cgroup-v1.c cgroup: Move debug cgroup to its own file 2017-06-14 16:01:21 -04:00
cgroup.c cgroup: implement "nsdelegate" mount option 2017-06-28 14:45:21 -04:00
cpuset.c cpuset: consider dying css as offline 2017-05-24 12:43:30 -04:00
debug.c cgroup: fix lockdep warning in debug controller 2017-06-14 16:01:41 -04:00
freezer.c
Makefile cgroup: Move debug cgroup to its own file 2017-06-14 16:01:21 -04:00
namespace.c kernel: convert cgroup_namespace.count from atomic_t to refcount_t 2017-03-06 14:55:22 -05:00
pids.c cgroup/pids: remove spurious suspicious RCU usage warning 2017-03-06 15:11:29 -05:00
rdma.c