Quoting Mahesh Bandewar (महेश बंडेवार) (maheshb@xxxxxxxxxx): > On Mon, Jan 8, 2018 at 7:47 AM, Serge E. Hallyn <serge@xxxxxxxxxx> wrote: > > Quoting James Morris (james.l.morris@xxxxxxxxxx): > >> On Mon, 8 Jan 2018, Serge E. Hallyn wrote: > >> I meant in terms of "marking" a user ns as "controlled" type -- it's > >> unnecessary jargon from an end user point of view. > > > > Ah, yes, that was my point in > > > > http://lkml.iu.edu/hypermail/linux/kernel/1711.1/01845.html > > and > > http://lkml.iu.edu/hypermail/linux/kernel/1711.1/02276.html > > > >> This may happen internally but don't make it a special case with a > >> different name and don't bother users with internal concepts: simply > >> implement capability whitelists with the default having equivalent So the challenge is to have unprivileged users be contained, while allowing trusted workloads in containers created by a root user to bypass the restriction. Now, the current proposal actually doesn't support a root user starting an application that it doesn't quite trust in such a way that it *is* subject to the whitelist. Which is unfortunate. But apart from using ptags or a cgroup, I can't think of a good way to get us everything we want: 1. unprivileged users always restricted 2. existing unprivileged containers become restricted when whitelist is enabled 3. privileged users are able to create containers which are not restricted 4. privileged users are able to create containers which *are* restricted -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html