Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
Posted Feb 18, 2014 19:54 UTC (Tue) by Cyberax (✭ supporter ✭, #52523)In reply to: Shuttleworth: Losing graciously by fandingo
Parent article: Shuttleworth: Losing graciously
Incorrect. Right now cgroups can be manipulated by any number of processes.
I repeat, IT WORKS ALREADY.
Posted Feb 18, 2014 20:44 UTC (Tue)
by fandingo (guest, #67019)
[Link] (6 responses)
You're complaining about a deprecated feature will be removed. You have four options:
1) Start using the systemd or CGManager DBus APIs.
2) Use CGManager with its cgroupfs provider.
3) Implement spitemanager for whatever API (presumably cgroupfs) you desire.
4) Fork the kernel or stop using new versions.
Posted Feb 18, 2014 21:04 UTC (Tue)
by jspaleta (subscriber, #50639)
[Link]
Though it is interesting to see if Ubuntu patches libvirt as shipped in Trusty to talk to cgmanager. Right now it it appears that libvirt as packaged in Trusty isn't patched for that yet and will be relying on the cgroupfs in 14.04. So that's an interesting little wrinkle. Will a trusty host running cgmanager be able to work with trusty libvirt based containers?
Posted Feb 18, 2014 21:34 UTC (Tue)
by Cyberax (✭ supporter ✭, #52523)
[Link] (4 responses)
Posted Feb 18, 2014 21:57 UTC (Tue)
by mathstuf (subscriber, #69389)
[Link] (3 responses)
[1]Assuming that you don't somehow convince kernel developers to forego the single-writer changes (which seems very unlikely at this point).
Posted Feb 18, 2014 22:20 UTC (Tue)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
0) Regular permissions apply.
1) Add 'pid-lock' file at each level of cgroups tree. Everyone can modify cgroups tree if this file is empty.
2) Once you write a pid into this file only this process can make modifications to this tree level and deeper.
3) The pid-lock process can modify pid-lock files in its subtree, either clearing them completely or by writing another pid. It doesn't lose access as long as it's still alive.
4) Subtree moves must respect pid-locks and permissions.
That's basically it. It still allows to lock the tree against accidental modifications and also gives a clear path for delegation. DBUS connoisseurs can still use fully DBUS-based delegation and access control and everybody else can use normal filesystem-based API.
It's also possible to add a bitmask of delegated controllers. For example, so that the parent controller can limit the delegated controllers to cpu manager but not costly memcg.
Posted Feb 19, 2014 14:24 UTC (Wed)
by HelloWorld (guest, #56129)
[Link] (1 responses)
Posted Feb 19, 2014 14:28 UTC (Wed)
by mathstuf (subscriber, #69389)
[Link]
Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
Shuttleworth: Losing graciously
