Detailed explanations of each major Droidspaces feature and how it works under the hood.
Linux namespaces are a kernel feature that partitions system resources so that each group of processes sees its own isolated set of resources. Droidspaces uses five namespaces to create isolated containers:
| Namespace | Flag | What It Isolates |
|---|---|---|
| PID | CLONE_NEWPID |
Process IDs. The container gets its own PID tree where init is PID 1. |
| MNT | CLONE_NEWNS |
Mount points. The container has its own filesystem view via pivot_root. |
| UTS | CLONE_NEWUTS |
Hostname and domain name. Each container can have its own hostname. |
| IPC | CLONE_NEWIPC |
System V IPC and POSIX message queues. Prevents cross-container IPC leaks. |
| Cgroup | CLONE_NEWCGROUP |
Cgroup root directory. Each container sees its own cgroup hierarchy. |
| Network | CLONE_NEWNET |
Network stack. Isolated interfaces, routing, and firewall (NAT/None modes). |
Droidspaces supports three networking modes that determine whether a network namespace (CLONE_NEWNET) is used:
-
Host Mode (
--net=host) - Default: Droidspaces deliberately does not unshare the network namespace. The container shares the host's network stack. This greatly simplifies setup: containers get internet access immediately without virtual bridges, NAT, or firewall rules. On Android, where networking is already complex (cellular, Wi-Fi, VPN), this avoids a whole category of connectivity issues. -
NAT Mode (
--net=nat): The container is placed in a private network namespace. It is connected to the host via a virtual bridge or veth pair, providing Pure Network Isolation while maintaining internet access through the host's upstream interfaces. Compatible with the vast majority of Android devices. -
None Mode (
--net=none): The container is placed in a private, air-gapped network namespace with only the loopback interface enabled for maximum security.
A chroot only changes the apparent root directory for a process. It provides no process isolation, no mount isolation, no hostname isolation, and no IPC isolation. Any process inside a chroot shares the host's PID space, can see and signal other processes, and cannot run an init system like systemd.
Droidspaces uses pivot_root instead of chroot, which is a stronger isolation mechanism. Combined with private mount propagation (MS_PRIVATE), the container's mount events are completely invisible to the host.
Without an init system, you're running individual processes in a chroot. You can't manage services, you can't use systemctl, you don't have journald for logging, and you don't have proper session management. It's a glorified shell.
Droidspaces boots a real init system. When systemd starts as PID 1 inside the container:
- Services are managed via
systemctl start/stop/enable - Logs are available via
journalctl - User sessions work properly with
login,su, andsudo - Targets and dependencies are resolved correctly
- Timer units, socket activation, and all other systemd features work
Three things are required for systemd to function inside a container:
-
PID 1: The init process must be PID 1. Droidspaces achieves this with a PID namespace (
CLONE_NEWPID) followed by a fork, making the container's init the first process in its namespace. -
Container detection: Systemd needs to know it's running inside a container. Droidspaces writes
droidspacesto/run/systemd/containerand sets thecontainer=droidspacesenvironment variable. -
Cgroup access: Systemd requires write access to its cgroup hierarchy to create scopes and slices. Droidspaces provides this through per-container cgroup trees (see Cgroup Isolation).
Droidspaces is theoretically compatible with any init system that can run as PID 1, including:
- systemd (most Linux distributions)
- OpenRC (Alpine Linux, Gentoo)
- runit (Void Linux, Devuan)
- s6-init (Alpine, various containers)
- SysVinit (Debian, Devuan)
The init binary is strictly expected at /sbin/init. If this binary is missing or not executable, Droidspaces will fail to boot the container to ensure that services and session management function as expected.
Volatile mode (--volatile or -V) creates an ephemeral container where all modifications are stored in RAM and discarded when the container stops. The original rootfs is never modified.
Droidspaces uses OverlayFS, a union filesystem built into the Linux kernel:
- Lower layer: The original rootfs (mounted read-only if using the rootfs.img mode)
- Upper layer: A tmpfs-backed directory that captures all writes
- Merged view: The container sees a unified filesystem where reads come from the lower layer and writes go to the upper layer
When the container stops, the upper layer (in RAM) is discarded. The original rootfs remains untouched.
- Testing: Install packages, modify configurations, and verify changes without committing anything
- Development: Spin up a clean environment for each build
- Security: Guaranteed clean state on every boot
- Experimentation: Break things without consequences
# Volatile container from a directory
droidspaces --name=test --rootfs=/path/to/rootfs --volatile start
# Volatile container from an image
droidspaces --name=test --rootfs-img=/path/to/rootfs.img --volatile startMost Android devices use f2fs for the /data partition. OverlayFS on many Android kernels does not support f2fs as a lower directory. This means volatile mode with a directory rootfs on f2fs will fail.
Workaround: Use a rootfs image (--rootfs-img) instead. The ext4 loop mount provides a compatible lower directory for OverlayFS.
Droidspaces detects this incompatibility at runtime and provides a clear diagnostic message.
Caution
Enabling Hardware Access Mode (--hw-access) exposes all host devices, including raw block devices, directly to the container. If a malicious process or accidental command targets these devices, it could permanently destroy your partition table, wipe your SD card, or brick your device. The developer(s) of Droidspaces is not responsible for any data loss or hardware damage that occurs as a result of using this feature. Use at your own risk.
The --hw-access flag exposes the host's hardware devices to the container by mounting devtmpfs instead of a private tmpfs at /dev.
This gives the container access to:
- GPU (for hardware-accelerated graphics via Turnip + Zink, Panfrost/Native GPU Acceleration in desktop for Intel and AMD)
- Cameras
- Sensors
- USB devices
- Block Devices (Partitions and physical disks)
Hardware access mode grants the container visibility to all host devices. The container can interact with the GPU, USB controllers, and other hardware directly. Only use this mode when you trust the container's contents and need hardware access.
Starting with systemd 258, the container detection logic was hardened. systemd now checks whether /sys is mounted read-only to determine if it's running in a container versus a physical machine. If /sys is read-write, systemd assumes it has full hardware authority and attempts to attach services (like getty) to physical TTYs (tty1-tty6). Since these do not exist in the isolated container environment, the services fail to start, leaving the console without a login prompt.
Note
This information is based on current developer understanding of systemd's behavior in Droidspaces and may require further verification.
Droidspaces handles this with a "dynamic hole-punching" technique:
- Pinning Subsystems: All
/syssubdirectories are self-bind-mounted to preserve read-write access to individual hardware subsystems. - Read-Only Remount: The top-level
/sysis remounted read-only. - Container Identification: systemd detects the read-only
/sys, correctly identifies the container environment, and falls back to container-native console management. - Hardware Access: Individual hardware subsystems remain fully accessible via the pinned sub-mounts created in step 1.
droidspaces --name=gpu-test --rootfs=/path/to/rootfs --hw-access startWhen --hw-access is enabled, Droidspaces automatically:
- Scans host GPU devices - Before
pivot_root, it probes ~40 known GPU device paths (/dev/dri/*,/dev/mali*,/dev/kgsl-3d0,/dev/nvidia*, etc.) and collects their group IDs viastat(). Dangerous nodes like/dev/dri/card*are explicitly skipped to prevent host kernel panics, as these nodes are restricted to the host's display manager. - Creates matching groups - After
pivot_root, it appends entries likegpu_<GID>:x:<GID>:rootto the container's/etc/group. The container's root user is automatically added to each group. - Idempotent restarts - On container restart, existing groups are detected and skipped (no duplicate entries).
This eliminates the need for manual groupadd/usermod commands inside the container, while ensuring the host's kernel stability by avoiding restricted hardware paths.
For GUI application support, Droidspaces automatically bind-mounts the X11 socket directory:
- Android (Termux X11): Detects and mounts
/data/data/com.termux/files/usr/tmp/.X11-unix - Desktop Linux: Mounts
/tmp/.X11-unixvia/proc/1/root/tmp/.X11-unix
Tip
X11 support can be enabled independently using the --termux-x11 (-X) flag. This is the recommended way to use GUI applications on Android if you do not need full GPU/hardware access, as it preserves a higher level of isolation.
After starting the container, set DISPLAY=:0 inside the container to use the X11 display.
| Family | Device Paths |
|---|---|
| DRI (Intel, AMD, Mesa) | /dev/dri/renderD128-130, /dev/dri/card0-2 |
| NVIDIA (Proprietary) | /dev/nvidia*, /dev/nvidia-uvm*, /dev/nvidia-caps/* |
| ARM Mali | /dev/mali, /dev/mali0, /dev/mali1 |
| Qualcomm Adreno | /dev/kgsl-3d0, /dev/kgsl, /dev/genlock |
| AMD Compute | /dev/kfd |
| PowerVR | /dev/pvr_sync |
| NVIDIA Tegra | /dev/nvhost-ctrl, /dev/nvhost-gpu, /dev/nvmap |
| DMA Heaps | /dev/dma_heap/system, /dev/dma_heap/linux,cma, /dev/dma_heap/reserved, /dev/dma_heap/qcom,system |
| Sync | /dev/sw_sync |
Bind mounts allow you to map a directory from the host filesystem into the container at a specified location. The host directory becomes visible and writable inside the container.
# Single mount
--bind-mount=/host/path:/container/path
-B /host/path:/container/path
# Multiple mounts (comma-separated)
-B /src1:/dst1,/src2:/dst2,/src3:/dst3
# Multiple mounts (chained)
-B /src1:/dst1 -B /src2:/dst2
# Mix and match
-B /src1:/dst1,/src2:/dst2 -B /src3:/dst3- Destination must be an absolute path
- Path traversal (
..) in destinations is rejected for security
If the destination directory doesn't exist inside the rootfs, Droidspaces creates it automatically using mkdir -p.
If a host source path doesn't exist or a mount fails, Droidspaces issues a warning and skips the entry rather than failing the entire boot. This allows containers to start even if optional bind sources are temporarily unavailable.
Droidspaces validates bind mount targets with two protections:
- Pre-mount: Uses
lstat()to ensure the target inside the rootfs is not a symlink - Post-mount: Uses
realpath()via theis_subpath()helper to verify the mounted path cannot escape the container root
Droidspaces provides three distinct networking modes to balance ease-of-use with advanced isolation.
The container shares the host's network namespace.
- Pros: Zero configuration, instant internet access, works with all Android VPNs/hotspots.
- Cons: No port isolation; services inside the container bind to host ports directly.
The container is placed in a private network namespace (CLONE_NEWNET) and connected to the host via a virtual bridge (ds-br0) or a direct veth pair.
- Deterministic IP: Each container is assigned a unique IP in the
172.28.0.0/16range, derived from its PID. - Embedded DHCP: Droidspaces includes a minimal, built-in DHCP server to automatically configure the container's
eth0. - Pure Isolation: The container cannot see or interact with the host's network interfaces directly.
- Mandatory Upstream: You must specify which host interfaces provide internet access via
--upstream(e.g.,--upstream wlan0,rmnet0). Wildcards are also supported (e.g.,rmnet*,wlan0,v4-rmnet_data*).
Important
NAT mode is IPv4 only. If your upstream interface lacks an IPv4 address (IPv6-only network), internet access will not work. See IPv4 NAT Quirks for a workaround.
The container gets a private network namespace with only the loopback (lo) interface enabled.
- Use Case: Maximum security for offline tasks.
In NAT mode, you can expose container services to the host or local network using the --port flag. Supported formats:
# Forward host port 8080 to container port 80
--port 8080:80
# Symmetric shorthand (host 8080 -> container 8080)
--port 8080
# Forward host range to container range (must be same size)
--port 1000-2000:1000-2000
# Mix and match with explicit protocols
--port 2222:22/tcp --port 5000-5050:5000-5050/udpOn Android, the connection often hops between Wi-Fi and Mobile Data. Droidspaces includes a Route Monitor that tracks your declared --upstream interfaces. If your active interface changes (e.g., you walk out of Wi-Fi range), the monitor automatically updates the kernel's policy routing to keep the container connected without a restart.
Directory-based rootfs setups are simple but have limitations:
- File permissions may not be preserved correctly on some filesystems (especially f2fs on Android)
- OverlayFS may not be compatible with the underlying filesystem
- Built-in Integrity Checking: Images can be verified with
e2fsckat runtime. - Portability: Your entire container is encapsulated in a single
.imgfile. This makes it incredibly easy to back up, share, or travel with across the world. Just copy the file to any device with Droidspaces, and it's ready to boot.
Ext4 images solve these problems. The image file contains a complete ext4 filesystem that's loop-mounted at runtime, providing consistent behavior regardless of the host filesystem.
When you use --rootfs-img:
- Filesystem check: Droidspaces runs
e2fsck -f -yon the image to ensure integrity - SELinux context: On Android, applies the
vold_data_fileSELinux context to prevent silent I/O denials - Loop mount: The image is mounted at
/mnt/Droidspaces/<name> - Retry logic: On kernel 4.14, mounts may fail due to stale loop device state. Droidspaces retries up to 3 times with
sync()and settle delays.
# Image-based container (--name is mandatory)
droidspaces --name=ubuntu --rootfs-img=/path/to/rootfs.img start
# Volatile mode with image (image mounted read-only)
droidspaces --name=ubuntu --rootfs-img=/path/to/rootfs.img --volatile startDroidspaces creates per-container cgroup trees at /sys/fs/cgroup/droidspaces/<name> on the host. Combined with the cgroup namespace, each container sees its own clean cgroup hierarchy.
Note: Cgroup isolation is not available in --force-cgroupv1 mode.
systemd relies heavily on cgroups for:
- Creating service scopes and slices
- Resource accounting (CPU, memory per service)
- Process tracking (knowing which processes belong to which service)
- Clean shutdown (killing all processes in a service's cgroup)
Without proper cgroup isolation, systemd cannot function. Multiple containers would collide in the cgroup hierarchy, and service management would fail.
Before creating the cgroup namespace, Droidspaces moves the monitor process into the container-specific cgroup. This ensures that when unshare(CLONE_NEWCGROUP) is called, the new namespace's root maps to the container's subtree.
Droidspaces supports both cgroup versions:
- Cgroup v2 (unified): Used by modern distributions. Mounted as a single hierarchy.
- Cgroup v1 (legacy): Used by older distributions. Droidspaces handles comounted controllers (e.g.,
cpu,cpuacct) and creates symlinks for secondary names in older kernels or--force-cgroupv1mode.
On legacy Android kernels (3.18, 4.4, or 4.9), the host system may either lack Cgroup v2 support entirely or provide a partial implementation without the essential controllers (CPU, memory, etc.) required by modern systemd. This inconsistency often causes systemd to misidentify the environment, leading to critical boot failures.
The --force-cgroupv1 flag acts as an expert escape hatch. It instructs Droidspaces to strictly utilize the legacy v1 hierarchy even if v2 appears available on the host. This ensures maximum stability and compatibility for distributions using modern systemd versions on older kernel infrastructure.
When entering a container with enter or run, the process must be in the container's host-side cgroup before joining namespaces. Otherwise, systemd-logind and sd-pam inside the container cannot map the process to a valid session, causing su and sudo to hang. Droidspaces handles this automatically by attaching to the container's cgroup before any setns() call.
Droidspaces includes sophisticated BPF-based seccomp filters to resolve critical Android kernel conflicts:
Android's File-Based Encryption stores filesystem keys in the kernel's session keyring. When systemd attempts to create new session keyrings, the process loses access to the host's encryption keys, causing ENOKEY errors.
Solution: On legacy kernels (< 5.0), Droidspaces automatically intercepts keyring syscalls (keyctl, add_key, request_key) returning ENOSYS, forcing systemd to use the existing keyring.
On certain devices with legacy kernels (notably 4.14.113, common on 2019-2020 Android devices), systemd's service sandboxing triggers a race condition in the kernel's VFS layer (grab_super() bug). This causes systemd to hang, systemctl to freeze, and potential device lockups. 4.9 and 4.19 kernels are largely unaffected.
The Fix: You can manually enable the Deadlock Shield (in the Android App config or via --block-nested-namespaces CLI). This intercepts unshare and clone namespace requests with EPERM, preventing systemd from triggering the deadlock.
Because the Deadlock Shield is now strictly an opt-in toggle rather than a hard-coded blanket ban:
- Native Support: Users on all kernels can now run Docker, Podman, and LXC natively out-of-the-box.
- The Trade-off: If your device requires the Deadlock Shield to boot systemd, enabling it will intentionally block the namespace creations required by Docker/Podman.
Tip
Legacy Kernel Networking: When running Docker/Podman inside Droidspaces on legacy kernels, modern nftables may fail to route traffic. We recommend using Droidspaces' NAT mode and switching your container's networking stack to iptables-legacy and ip6tables-legacy.
Droidspaces includes several sophisticated subsystems designed specifically to handle the "opinionated" nature of the Android Linux kernel.
Standard Linux distributions use udevadm trigger to "coldplug" hardware devices during boot. On many Android devices, triggering all devices simultaneously causes the kernel to deadlock or panic because Android's own hardware drivers (which are already running) do not expect another manager to re-trigger them.
The Solution: Droidspaces masks the standard udev trigger services and installs a Safe Udev Trigger. This service only triggers a strictly defined subset of subsystems (usb, block, input, tty) that are safe to re-scan. This enables the container to see new USB drives or keyboards without risking a system crash.