Re: [PATCH RESEND] userns: enable tmpfs support for user namespace

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx):
> Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> writes:
> 
> > Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx):
> >> Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> writes:
> >> 
> >> > I actually was waiting for Eric to do it, but I'll happily send it
> >> > to linux-fsdevel and lkml (in a bit).
> >> 
> >> I might just.
> >> 
> >> I will take a look at this in a week or so.  I want to get through the
> >> core userspace bits first so I can just cross those off my list of
> >> things that need to be done.
> >> 
> >> Eric
> >
> > Ok, I'll wait on sending it then - thanks.
> 
> Next up is my patch to shadow-utils and then taking a good hard stare at
> what is left kernel side.
> 
> One of the questions I need to answer is:  Do cgroups actually work
> for what needs to be limited?  Or does the the focus of cgroups on
> processes without other ownership in objects fundamentally limit what

Note that with pam (and presumably through systemd) you can tie a user to
a cgroup at login.  You could chown the cgroup to the user, counting on
proper hierarchy enforcement to not let the user escape, while the user
could still descend in the hierarchy for flexibility (i.e. creating his
own containers).

> can be expressed with cgroups in a problematic way.  In which case would
> some hierarchical limits based on user namespaces and rlimits be easier
> to implement and make more sense.

1. most distros enable cgroups, so the penalty is being paid anyway.
2. if there are real gains to be had by adding another set of limits
   as mentioned here, then I hope someone will look into it.  But that
   it separate from the question of whether the memory cgroup is
   enough to justify allowing tmpfs mounts in user namespaces.

   We could make the FS_USERNS_MOUNT flag in tmpfs conditional on
   the memory cgroup being on?  Though that doesn't guarantee that
   the cgroups will be properly configured.

> I think the answer will be that cgroups are good enough but that
> question certainly needs looking at.
> 
> Anyway.  shadow-utils, minimal tmpfs, minimal devpts, and then the rest.

Sounds good - thanks.

Is there a git tree for the shadow-utils changes which people can start
looking at?

-serge
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/containers


[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux