By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: OPEN_TREE_NAMESPACE To Provide A Security & Performance Win For Dealing With Containers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > OPEN_TREE_NAMESPACE To Provide A Security & Performance Win For Dealing With Containers
Computing

OPEN_TREE_NAMESPACE To Provide A Security & Performance Win For Dealing With Containers

News Room
Last updated: 2026/01/19 at 2:52 PM
News Room Published 19 January 2026
Share
OPEN_TREE_NAMESPACE To Provide A Security & Performance Win For Dealing With Containers
SHARE

A new feature expected to be merged for the upcoming Linux 7.0 kernel cycle is adding an OPEN_TREE_NAMESPACE flag for the open_tree() system call. This OPEN_TREE_NAMESPACE option can provide a nice performance win with added security benefits if you are dealing a lot with containerized workloads on Linux.

Microsoft engineer Christian Brauner developed the OPEN_TREE_NAMESPACE functionality for open_tree() to make launching containers less wasteful around copying mounts that are ultimately unnecessary and to then be immediately destroyed. Brauner elaborated in the late December patch series:

“When creating containers the setup usually involves using CLONE_NEWNS via clone3() or unshare(). This copies the caller’s complete mount namespace. The runtime will also assemble a new rootfs and then use pivot_root() to switch the old mount tree with the new rootfs. Afterward it will recursively umount the old mount tree thereby getting rid of all mounts.

On a basic system here where the mount table isn’t particularly large this still copies about 30 mounts. Copying all of these mounts only to get rid of them later is pretty wasteful.

This is exacerbated if intermediary mount namespaces are used that only exist for a very short amount of time and are immediately destroyed again causing a ton of mounts to be copied and destroyed needlessly.

With a large mount table and a system where thousands or ten-thousands of namespaces are spawned in parallel this quickly becomes a bottleneck increasing contention on the semaphore.

Extend open_tree() with a new OPEN_TREE_NAMESPACE flag. Similar to OPEN_TREE_CLONE only the indicated mount tree is copied. Instead of returning a file descriptor referring to that mount tree OPEN_TREE_NAMESPACE will cause open_tree() to return a file descriptor to a new mount namespace. In that new mount namespace the copied mount tree has been mounted on top of a copy of the real rootfs.

The caller can setns() into that mount namespace and perform any additionally setup such as move_mount()ing detached mounts in there.

This allows OPEN_TREE_NAMESPACE to function as a combined unshare(CLONE_NEWNS) and pivot_root().”

In testing out the new functionality, it was found to be around 40% faster:

“With the older pivot_root() based method, I can create about 73k “containers” in 60s. With the newer open_tree() method, I can create about 109k in the same time. So it seems like the new method is roughly 40% faster than the older scheme (and a lot less syscalls too).”

Beyond OPEN_TREE_NAMESPACE being less wasteful and better efficiency, there are also expected security benefits too for blocking attacks if the container root manages to get unmounted in trying to access the underlying mounts.

OPEN_TREE_NAMESPACE

The OPEN_TREE_NAMESPACE patches as of a few days ago have been queued into vfs/vfs.git’s vfs-7.0.namespace Git branch. With the code now there, it will presumably be sent in for the upcoming Linux 6.20~7.0 kernel merge window barring any last minute issues.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Blackout warning issued over powerful solar storm and chance of Northern Lights Blackout warning issued over powerful solar storm and chance of Northern Lights
Next Article Zayo expands network across Iberian Peninsula | Computer Weekly Zayo expands network across Iberian Peninsula | Computer Weekly
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Today's NYT Connections: Sports Edition Hints, Answers for Jan. 20 #484
Today's NYT Connections: Sports Edition Hints, Answers for Jan. 20 #484
News
Grubhub Confirms New Data Breach, Hackers Reportedly Demand Ransom
Grubhub Confirms New Data Breach, Hackers Reportedly Demand Ransom
News
How to use an iPhone to take pictures of the Aurora Borealis
How to use an iPhone to take pictures of the Aurora Borealis
News
Best gaming monitor deal: Save 30% on the 49-inch Samsung G9 curved monitor
Best gaming monitor deal: Save 30% on the 49-inch Samsung G9 curved monitor
News

You Might also Like

New Patches From Valve Bring AMDGPU Power Management Improvements For Old GCN 1.0 GPUs
Computing

New Patches From Valve Bring AMDGPU Power Management Improvements For Old GCN 1.0 GPUs

3 Min Read
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
Computing

Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

7 Min Read
Washington lawmakers target ‘addictive’ social media feeds in revived push for youth safeguards
Computing

Washington lawmakers target ‘addictive’ social media feeds in revived push for youth safeguards

9 Min Read
How Shell Foundation and 500 Global structure risk in African climate tech
Computing

How Shell Foundation and 500 Global structure risk in African climate tech

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?