-
Notifications
You must be signed in to change notification settings - Fork 550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cgroup (namespace) Delegation #948
Comments
In addition, the way you set up delegation is that you have to set the However, I do agree that we should have cgroup namespace support. Once we have that then we can do a "real" Christian Brauner of the LXC project gave a very good talk on what the precise complications are with a hybrid cgroup setup for container runtimes and why this is quite complicated to do. |
@cyphar devices was merged into master, based on BPF filters. So, that's done. I've talked to Tejun, and it sounds like Freezer is underway, although it will not be the same approach. It seems like all we really use Freezer for (that's critical) is to terminate all processes within the container, no? This could just as easily be done by setting pids.max to 0, and walking the hierarchy, or terminating pid 1 of the pid namespace. I agree, that mixing them is an absolute mess, and I wouldn't push that strategy at all. |
On Sun, Jan 28, 2018 at 08:28:05AM -0800, Aleksa Sarai wrote:
However, I do agree that we should have cgroup namespace support.
Don't we have that since your #397?
|
@wking That should come in opencontainers/runc#1184 |
We also expose freezer with I still am not sure about how |
This was fixed via #1123, right? 🙏 |
Now that cgroups can be delegated, it would be nice to have the ability to specify that in the config: https://lkml.iu.edu/hypermail/linux/kernel/1801.1/01070.html
It'd be nice to stay which cgroups should be delegated, and which shouldn't. Right now, all of /sys/fs/cgroup gets bind mounted.
The text was updated successfully, but these errors were encountered: