summaryrefslogtreecommitdiffstats
path: root/sys-utils/unshare.c
diff options
context:
space:
mode:
authorSerge Hallyn2016-03-03 02:53:42 +0100
committerSerge Hallyn2016-03-03 02:53:42 +0100
commitf9e7b66dbded19d798b883be68b0613749d7b8bb (patch)
treef4991edc70c9bf49c63895d16b35aa9211675128 /sys-utils/unshare.c
parentblkdiscard: add --zeroout (BLKZEROOUT ioctl) (diff)
downloadkernel-qcow2-util-linux-f9e7b66dbded19d798b883be68b0613749d7b8bb.tar.gz
kernel-qcow2-util-linux-f9e7b66dbded19d798b883be68b0613749d7b8bb.tar.xz
kernel-qcow2-util-linux-f9e7b66dbded19d798b883be68b0613749d7b8bb.zip
Implement support for cgroup namespaces
Currently these are supported in #for-next. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Diffstat (limited to 'sys-utils/unshare.c')
-rw-r--r--sys-utils/unshare.c34
1 files changed, 21 insertions, 13 deletions
diff --git a/sys-utils/unshare.c b/sys-utils/unshare.c
index 988632062..234c7501f 100644
--- a/sys-utils/unshare.c
+++ b/sys-utils/unshare.c
@@ -53,12 +53,13 @@ static struct namespace_file {
const char *name; /* ns/<type> */
const char *target; /* user specified target for bind mount */
} namespace_files[] = {
- { .type = CLONE_NEWUSER, .name = "ns/user" },
- { .type = CLONE_NEWIPC, .name = "ns/ipc" },
- { .type = CLONE_NEWUTS, .name = "ns/uts" },
- { .type = CLONE_NEWNET, .name = "ns/net" },
- { .type = CLONE_NEWPID, .name = "ns/pid" },
- { .type = CLONE_NEWNS, .name = "ns/mnt" },
+ { .type = CLONE_NEWUSER, .name = "ns/user" },
+ { .type = CLONE_NEWCGROUP,.name = "ns/cgroup" },
+ { .type = CLONE_NEWIPC, .name = "ns/ipc" },
+ { .type = CLONE_NEWUTS, .name = "ns/uts" },
+ { .type = CLONE_NEWNET, .name = "ns/net" },
+ { .type = CLONE_NEWPID, .name = "ns/pid" },
+ { .type = CLONE_NEWNS, .name = "ns/mnt" },
{ .name = NULL }
};
@@ -255,6 +256,7 @@ static void usage(int status)
fputs(_(" -n, --net[=<file>] unshare network namespace\n"), out);
fputs(_(" -p, --pid[=<file>] unshare pid namespace\n"), out);
fputs(_(" -U, --user[=<file>] unshare user namespace\n"), out);
+ fputs(_(" -C, --cgroup[=<file>] unshare cgroup namespace\n"), out);
fputs(_(" -f, --fork fork before launching <program>\n"), out);
fputs(_(" --mount-proc[=<dir>] mount proc filesystem first (implies --mount)\n"), out);
fputs(_(" -r, --map-root-user map current user to root (implies --user)\n"), out);
@@ -281,12 +283,13 @@ int main(int argc, char *argv[])
{ "help", no_argument, 0, 'h' },
{ "version", no_argument, 0, 'V'},
- { "mount", optional_argument, 0, 'm' },
- { "uts", optional_argument, 0, 'u' },
- { "ipc", optional_argument, 0, 'i' },
- { "net", optional_argument, 0, 'n' },
- { "pid", optional_argument, 0, 'p' },
- { "user", optional_argument, 0, 'U' },
+ { "mount", optional_argument, 0, 'm' },
+ { "uts", optional_argument, 0, 'u' },
+ { "ipc", optional_argument, 0, 'i' },
+ { "net", optional_argument, 0, 'n' },
+ { "pid", optional_argument, 0, 'p' },
+ { "user", optional_argument, 0, 'U' },
+ { "cgroup", optional_argument, 0, 'C' },
{ "fork", no_argument, 0, 'f' },
{ "mount-proc", optional_argument, 0, OPT_MOUNTPROC },
@@ -312,7 +315,7 @@ int main(int argc, char *argv[])
textdomain(PACKAGE);
atexit(close_stdout);
- while ((c = getopt_long(argc, argv, "+fhVmuinpUr", longopts, NULL)) != -1) {
+ while ((c = getopt_long(argc, argv, "+fhVmuinpCUr", longopts, NULL)) != -1) {
switch (c) {
case 'f':
forkit = 1;
@@ -352,6 +355,11 @@ int main(int argc, char *argv[])
if (optarg)
set_ns_target(CLONE_NEWUSER, optarg);
break;
+ case 'C':
+ unshare_flags |= CLONE_NEWCGROUP;
+ if (optarg)
+ set_ns_target(CLONE_NEWCGROUP, optarg);
+ break;
case OPT_MOUNTPROC:
unshare_flags |= CLONE_NEWNS;
procmnt = optarg ? optarg : "/proc";