"Demmel Nikolaus (BOSP/PAR)":
> I'm assuming from your response that in general you expect AUFS to work wit=
> h PREEMPT_RT, or is this not the case?
Although I myself don't use RT patch, yes it should work. Of course,
some workaround may be necessary. It won't be clear until lots of tests
and
Hi
Now, i continue appliyng my patch to compile KERNEL+RT+AUFS.
I was try to use the rt_mutex_set_owner() wihtout success. I do not
remember what the problem was.
Now i'm running 4.4.38-rt49 Kernel wiht RT and AUFS
Linux x64-v3 4.4.38-rt49 #1 SMP PREEMPT RT Mon Dec 19 10:28:46 CET
2016 x86_64
Hi J. R. Okajima,
thank you for your prompt response.
I'm assuming from your response that in general you expect AUFS to work with
PREEMPT_RT, or is this not the case?
"Demmel Nikolaus (BOSP/PAR)":
> > we are using AUFS for our root filesystem with an tmpfs overlay and recentl=
> > y wanted to
Arun Chandran:
> "sudo mount .." gives correct labels. I can't use it because the
> containers don't get sudo inside ; container might be running with the
> lowest possible privileges.
Our discussion about the smack label is almost done. Thank you.
But I'd suggest you to consider other docker
On Mon, Jan 16, 2017 at 7:59 PM, wrote:
>
> Arun Chandran:
>> No with 'sudo mount ..' the .wh.* files are created with label of the
>> user test not with the label of root.
>> [This is because objects gets label of the process; label of user test
>> is "k1"; sudo is
Arun Chandran:
> No with 'sudo mount ..' the .wh.* files are created with label of the
> user test not with the label of root.
> [This is because objects gets label of the process; label of user test
> is "k1"; sudo is not changing label]
I see.
It may be a very basic building block of security
On Mon, Jan 16, 2017 at 6:39 PM, wrote:
>
> Arun Chandran:
>> No, It succeeded and created with label "k1", please see below
>
> Ok, then let's make sure again.
> - you wrote that the smack label for root user is "_".
Yes. That is correct.
# id
uid=0(root)
Hello Nikolaus,
"Demmel Nikolaus (BOSP/PAR)":
> we are using AUFS for our root filesystem with an tmpfs overlay and recentl=
> y wanted to switch to a kernel with PREEMPT_RT patch. Unfortunately, it see=
> ms that mounting aufs seems to hang about 40% of the time during boot (ther=
> e is no
Arun Chandran:
> No, It succeeded and created with label "k1", please see below
Ok, then let's make sure again.
- you wrote that the smack label for root user is "_".
- "sudo mount -t aufs ..." created the file with access="_".
- "sudo touch ..." created with access="k1".
Why didn't "touch" and
On Mon, Jan 16, 2017 at 12:29 PM, wrote:
>
> Arun Chandran:
>> # id
>> uid=1001(test) gid=1001(test) groups=1001(test)
> :::
>> # cd layer1/
>> # >.wh..wh.aufs
>> # ln .wh..wh.aufs .wh.0.txt
>
> Ok, succeeded with a normal user.
> How about as a superuser?
>
Hi,
we are using AUFS for our root filesystem with an tmpfs overlay and recently
wanted to switch to a kernel with PREEMPT_RT patch. Unfortunately, it seems
that mounting aufs seems to hang about 40% of the time during boot (there is
no specific kernel or log message). When it
11 matches
Mail list logo