[PATCH] devpts: Add ptmx_uid and ptmx_gid options
Eric W. Biederman
ebiederm at xmission.com
Thu May 28 21:50:37 UTC 2015
Kenton Varda <kenton at sandstorm.io> writes:
> On Thu, May 28, 2015 at 1:06 PM, Alexander Larsson <alexl at redhat.com> wrote:
>> On Thu, 2015-05-28 at 12:14 -0500, Eric W. Biederman wrote:
>>> > Where does the second namespace enter into this?
>>> Step a. Create create a user namespace where uid 0 is mapped to your
>>> real uid, and set up your sandbox (aka mount /dev/pts and everything
>>> Step b. Create a nested user namespace where your uid is identity
>>> mapped and run your desktop application. You can even drop all caps
>>> your namespace.
>> Just tried this. Its not the nicest, and it doubles the number of
>> namespaces in action for each sandbox, but it does work.
> How much overhead is involved in each user namespace?
> Is there any system-wide limit on total namespaces, other than RAM?
There is a system-wide maximum depth, but not count.
> Is there
> (non-negligible) CPU overhead for each syscall seeking permissions in
> the namespace?
ns_capable(ns, X) in some cases can walk up the from a starting user
namespace to the initial user. (The only non-constant operation I am
aware of). However unless the user namespace depth is deep it should
still take a negligible amount of time.
More information about the Containers