Re: 3.0: user namespace problem with capabilities

From: Serge E. Hallyn
Date: Thu Jul 21 2011 - 09:40:42 EST

Quoting Arkadiusz Miskiewicz (a.miskiewicz@xxxxxxxxx):
> Hi,
> linux-vserver guys think that there is a problem with user namespace in
> upcoming 3.0
> "this is a mainline/upstream bug, which basically happens
> when unsharing the USER namespace. what happens is that
> all capabilities are dropped, and as result, the userspace
> tool cannot issue Linux-VServer syscall commands anymore
> (because of missing CAP_CONTEXT)"
> "this can be verified on vanilla linux-3.0 kernels with
> in the following way:
> gcc -o clone_newuser clone_newuser.c
> ./clone_newuser ls /root/
> assuming that /root does not have any right for 'other'
> this will result in a permission denied (when the USER
> namespace is compiled into the kernel)"
> Whole post:
> What's maintainers opinion on this?

See for details on what's
going on. See the recent patchset at
to see (and help speed up) the next steps. After that patchset, I
need to address passing userids in siginfos and other uid comparisons,
and then, at least, comes VFS support. The speed with which it can be
completed depends in part upon my time, and largely on the amount
of time reviewers have. This stuff is obviously highly critical
security-relevant code, and needs to be very well reviewed and tested
at each step.

(See also
for the email I sent to containers@, libvirt@, and other lists before
beginning to solicit NACKs in advance)

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at
Please read the FAQ at