On Fri, Oct 25, 2013 at 12:35:04AM -0500, Serge Hallyn wrote:
> Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
> > On Thu 2013-10-24 (15:11), Serge Hallyn wrote:
> > 
> > > If your kernel is new enough (check whether /proc/self/ns/mnt exists)
> > > you could lxc-attach into the container with the -e flag to keep
> > > elevated privileges, and do the remount.
> > 
> > Ubuntu 12.04:
> > 
> > root@vms3:~# l /proc/self/ns/mnt
> > l: /proc/self/ns/mnt - No such file or directory
> > 
> > root@vms3:~# uname -a
> > Linux vms3 3.2.0-55-generic #85-Ubuntu SMP Wed Oct 2 12:29:27 UTC 2013 
> > x86_64 x86_64 x86_64 GNU/Linux
> > 
> > What is "new enough"?

>= 3.8

> > 
> > So, from the host system, a remount is not possible?
> 
> Correct.  The container is in a private mount namespace,
> and you cannot enter it.  You can view it somewhat through
> /proc/$pid/root, but you can't mount under that because
> you'd be trying to mix two vfsmounts belonging to different
> mount namespaces.
> 
> -serge

-- 
Stéphane Graber
Ubuntu developer
http://www.ubuntu.com

Attachment: signature.asc
Description: Digital signature

------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to