Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
cgroups v2 supports secure delegation of cgroups. Accordingly, control over a cgroup (that is, creation of new child cgroups and movement of processes and threads among the cgroup subtree exposed to a container) can be safely delegated to a container. Adjusting the ownership enables real-world use cases like systemd-based containers fully isolated in user namespaces. To encourage adoption of this feature, and secure implementation, define the semantics of cgroup ownership. Changing/setting the cgroup ownership is only allowed on cgroups v2, and the specific files whose ownership can be change are mentioned. In terms of current practice, this is already the behaviour of crun (which also chown's the memory.oom.group file), and there is a pull request for runc: opencontainers/runc#3057 (the behaviour is enabled by an annotation). Signed-off-by: Fraser Tweedale <[email protected]>
- Loading branch information