On Wed, Dec 11, 2013 at 09:37:57AM -0500, Phillip Susi wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Forwarding report from > https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/712892 > > It seems that the kernel has a bug where it silently ignores the > MS_RDONLY flag when creating a bind mount. mount issues a warning Yes, this is known issue. > that the mount point appears to be read-write even though you I think that libmount based mount does not warn about it (mistake?). > requested read only. The reporter suggests a patch to automatically > attempt to remount with MS_RDONLY before issuing this warning to work > around the kernel bug. What do you think? Well, it means that the kernel disadvantage will never be fixed ;-) It would be relatively simple to fix it, because libmount already support "additional mounts" to implement things like mount --make-private /dev/sda1 /mnt (kernel does not allow to use propagation flags for regular mount operation). I'll try it tomorrow. The problem is that all these userspace hacks does not atomic... Karel -- Karel Zak <kzak@xxxxxxxxxx> http://karelzak.blogspot.com -- To unsubscribe from this list: send the line "unsubscribe util-linux" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html