[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130607125848.GG24681@arachsys.com>
Date: Fri, 7 Jun 2013 13:58:49 +0100
From: Chris Webb <chris@...chsys.com>
To: "Eric W. Biederman" <ebiederm@...ssion.com>
Cc: linux-kernel@...r.kernel.org
Subject: Re: Building a BSD-jail clone out of namespaces
"Eric W. Biederman" <ebiederm@...ssion.com> writes:
> It is a wider issue. Capabilities cover most of places in the kernel
> where the kernel tests if you have privilege but there are other
> filesystems like devtmpsfs, and the occasional silly piece of kernel
> code that should be using capabilities but is not. Beyond the kernel
> there are files like /etc/shadow that only root is allowed to read.
>
> Which all boils down to the fact that for the inconvience of using a
> separate range of uids a lot of other problems just go away.
Hi. Thanks for the clarifications here, which make a lot of sense.
> Not being able to share the host filesystem into a container is a
> downside of the current implementation. In principle you can have an
> overlay style filesystem that munges the uids and removes this
> limitation, but that doesn't currently exist.
Yes, given the design means I can't just have an identity UID/GID mapping,
this seems like the building block I'm missing to get namespace IDs instead
of host IDs stored on disk. I imagine it might be fairly straightforward for
me to take a simple 'example' stacked filesystem like wrapfs and teach it to
map UIDs and GIDs. I'll have to take a look.
Cheers,
Chris.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists