-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bindfs and namespaces #10
Comments
Strange, when I try it on Ubuntu 13.10, I get a "Transport endpoint is not connected" instead of "Permission denied". I don't know much about namespaces but I wouldn't be terribly surprised if FUSE didn't support them properly yet. Sorry I can't be of more help :( Based on a quick grep for |
Appreciate the quick response. I'll check back if I find anything of note. |
|
FUSE uses /dev/fuse as the channel between kernel and user for the mounts. |
Hi - I'm wondering how the following can be achieved using
bindfs
.An important note to what follows, I have
unshare
setuid:All of the commands that follow are run as an unprivileged user.
In terminal 1:
In another terminal, terminal 2:
If I try something similar with
bindfs
I get the following.Terminal 1's commands succeed:
But then in terminal 2:
I think this may be related to the fact that the mount that succeeded in terminal 1 is visible to both, despite the call to
unshare
:Am I doing something wrong here?
Is there an option equivalent to the
-n
onmount -n
whereby the mount is created without writing to/etc/mtab
?Thanks
The text was updated successfully, but these errors were encountered: