Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754930Ab2KZQL0 (ORCPT ); Mon, 26 Nov 2012 11:11:26 -0500 Received: from mail-ia0-f174.google.com ([209.85.210.174]:44501 "EHLO mail-ia0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754099Ab2KZQLX (ORCPT ); Mon, 26 Nov 2012 11:11:23 -0500 MIME-Version: 1.0 X-Originating-IP: [94.21.63.42] In-Reply-To: <87boekzawt.fsf@xmission.com> References: <87obipehbt.fsf@tucsk.pomaz.szeredi.hu> <1353642304.2309.25.camel@perseus.themaw.net> <1353672540.6699.18.camel@perseus.themaw.net> <874nkgwfw0.fsf@tucsk.pomaz.szeredi.hu> <1353723813.2348.48.camel@perseus.themaw.net> <1353724641.2348.56.camel@perseus.themaw.net> <878v9rmcgc.fsf@xmission.com> <87lidqfx3u.fsf@xmission.com> <1353885956.2323.4.camel@perseus.themaw.net> <1353896968.2323.7.camel@perseus.themaw.net> <87boekzawt.fsf@xmission.com> Date: Mon, 26 Nov 2012 17:11:23 +0100 Message-ID: Subject: Re: [PATCH 1/2] autofs4: allow autofs to work outside the initial PID namespace From: Miklos Szeredi To: "Eric W. Biederman" Cc: Ian Kent , autofs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, sukadev@linux.vnet.ibm.com, serge.hallyn@canonical.com, Al Viro Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1168 Lines: 31 On Mon, Nov 26, 2012 at 3:38 PM, Eric W. Biederman wrote: > > So I don't know how much MS_UNBINDABLE helps over MS_PRIVATE. Both > prevent propogation of changes to other namespaces. I don't know how > much using MS_UNBINDABLE to also prevent bind mounts helps. MS_PRIVATE says ops on children (mount, unmount) won't be propageted, MS_UNBINDABLE says the mount itself won't be copied. I think it may make sense to introduce a new flag similar to MS_UNBINDABLE that applies to namespace cloning as well as bind mounting. It says: this mount is managed by some userspace entity (autofs) and copying it to the new namespace or to some other part of the tree makes no sense since a new instance of the userspace entity responsible for managing those mounts will need to be started in the new namespace as well. I can't think of any other sane solution to this issue. Thanks, Miklos > > Eric > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/