From: Tejun Heo <tj@kernel.org> To: Lee Jones <lee.jones@linaro.org> Cc: linux-kernel@vger.kernel.org, Zefan Li <lizefan.x@bytedance.com>, Johannes Weiner <hannes@cmpxchg.org>, cgroups@vger.kernel.org Subject: Re: [PATCH 1/1] cgroup-v1: Grant CAP_SYS_NICE holders permission to move tasks between cgroups Date: Thu, 17 Jun 2021 07:41:36 -0400 [thread overview] Message-ID: <YMs08Ij8PZ/gemLL@slm.duckdns.org> (raw) In-Reply-To: <20210617090941.340135-1-lee.jones@linaro.org> Hello, On Thu, Jun 17, 2021 at 10:09:41AM +0100, Lee Jones wrote: > It should be possible for processes with CAP_SYS_NICE capabilities > (privileges) to move lower priority tasks within the same namespace to > different cgroups. I'm not sure that "should" is justified that easily given that cgroup can affect things like device access permissions and basic system organization. > One extremely common example of this is Android's 'system_server', > which moves processes around to different cgroups/cpusets, but should > not require any other root privileges. Why is this being brought up now after all the years? Isn't android moving onto cgroup2 anyway? Thanks. -- tejun
WARNING: multiple messages have this Message-ID (diff)
From: Tejun Heo <tj-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> To: Lee Jones <lee.jones-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org> Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Zefan Li <lizefan.x-EC8Uxl6Npydl57MIdRCFDg@public.gmane.org>, Johannes Weiner <hannes-druUgvl0LCNAfugRpC6u6w@public.gmane.org>, cgroups-u79uwXL29TY76Z2rM5mHXA@public.gmane.org Subject: Re: [PATCH 1/1] cgroup-v1: Grant CAP_SYS_NICE holders permission to move tasks between cgroups Date: Thu, 17 Jun 2021 07:41:36 -0400 [thread overview] Message-ID: <YMs08Ij8PZ/gemLL@slm.duckdns.org> (raw) In-Reply-To: <20210617090941.340135-1-lee.jones-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org> Hello, On Thu, Jun 17, 2021 at 10:09:41AM +0100, Lee Jones wrote: > It should be possible for processes with CAP_SYS_NICE capabilities > (privileges) to move lower priority tasks within the same namespace to > different cgroups. I'm not sure that "should" is justified that easily given that cgroup can affect things like device access permissions and basic system organization. > One extremely common example of this is Android's 'system_server', > which moves processes around to different cgroups/cpusets, but should > not require any other root privileges. Why is this being brought up now after all the years? Isn't android moving onto cgroup2 anyway? Thanks. -- tejun
next prev parent reply other threads:[~2021-06-17 11:41 UTC|newest] Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-06-17 9:09 [PATCH 1/1] cgroup-v1: Grant CAP_SYS_NICE holders permission to move tasks between cgroups Lee Jones 2021-06-17 9:09 ` Lee Jones 2021-06-17 11:41 ` Tejun Heo [this message] 2021-06-17 11:41 ` Tejun Heo 2021-06-17 12:01 ` Lee Jones 2021-06-17 12:01 ` Lee Jones 2021-09-30 21:20 ` Suren Baghdasaryan 2021-09-30 21:20 ` Suren Baghdasaryan 2021-10-04 16:41 ` Tejun Heo 2021-10-04 16:41 ` Tejun Heo 2021-10-04 16:57 ` Suren Baghdasaryan 2021-10-04 16:57 ` Suren Baghdasaryan 2021-10-04 17:23 ` John Stultz 2021-10-04 17:23 ` John Stultz 2021-10-04 17:33 ` John Stultz
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=YMs08Ij8PZ/gemLL@slm.duckdns.org \ --to=tj@kernel.org \ --cc=cgroups@vger.kernel.org \ --cc=hannes@cmpxchg.org \ --cc=lee.jones@linaro.org \ --cc=linux-kernel@vger.kernel.org \ --cc=lizefan.x@bytedance.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.