Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx): > Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> writes: > > > Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx): > >> Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> writes: > >> > >> > I actually was waiting for Eric to do it, but I'll happily send it > >> > to linux-fsdevel and lkml (in a bit). > >> > >> I might just. > >> > >> I will take a look at this in a week or so. I want to get through the > >> core userspace bits first so I can just cross those off my list of > >> things that need to be done. > >> > >> Eric > > > > Ok, I'll wait on sending it then - thanks. > > Next up is my patch to shadow-utils and then taking a good hard stare at > what is left kernel side. > > One of the questions I need to answer is: Do cgroups actually work > for what needs to be limited? Or does the the focus of cgroups on > processes without other ownership in objects fundamentally limit what Note that with pam (and presumably through systemd) you can tie a user to a cgroup at login. You could chown the cgroup to the user, counting on proper hierarchy enforcement to not let the user escape, while the user could still descend in the hierarchy for flexibility (i.e. creating his own containers). > can be expressed with cgroups in a problematic way. In which case would > some hierarchical limits based on user namespaces and rlimits be easier > to implement and make more sense. 1. most distros enable cgroups, so the penalty is being paid anyway. 2. if there are real gains to be had by adding another set of limits as mentioned here, then I hope someone will look into it. But that it separate from the question of whether the memory cgroup is enough to justify allowing tmpfs mounts in user namespaces. We could make the FS_USERNS_MOUNT flag in tmpfs conditional on the memory cgroup being on? Though that doesn't guarantee that the cgroups will be properly configured. > I think the answer will be that cgroups are good enough but that > question certainly needs looking at. > > Anyway. shadow-utils, minimal tmpfs, minimal devpts, and then the rest. Sounds good - thanks. Is there a git tree for the shadow-utils changes which people can start looking at? -serge _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers