On mån, 2016-03-07 at 20:59 -0800, Andy Lutomirski wrote: > On Thu, May 28, 2015 at 12:42 PM, Eric W. Biederman > <ebiederm@xxxxxxxxxxxx> wrote: > > Andy Lutomirski <luto@xxxxxxxxxxxxxx> writes: > > > Apparently alexl is encountering some annoyances related to the > current workaround, and the workaround is certainly ugly. It works, but it introduces an extra namespace that gets exposed to the world, which is pretty ugly. For instance, entering the namespace becomes hard. I can setns() into the intermediate user+mount namespace without problems, but if i try to setns into the final user+mount ns (it gets its own implicit mount ns) i get EPERM. I'm not sure exactly why though... > Your proposal seems like it could break some use cases involving > fscaps on a mount or mount-like binary. > > What if we change it to use the owner of the userns that owns the > current mount ns? For anything that doesn't explicitly use > namespaces, this will be zero. For namespace users, it should do the > right thing. Any of these is fine with me. One nice thing would if i could somehow detect whether this was supported or not so that i can fall back on the old workaround. -- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Alexander Larsson Red Hat, Inc alexl@xxxxxxxxxx alexander.larsson@xxxxxxxxx He's an all-American guitar-strumming househusband with no name. She's a scantily clad impetuous former first lady who don't take no shit from nobody. They fight crime! -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html