From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6EC2714D2B7 for ; Mon, 13 Oct 2025 04:15:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.52 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760328916; cv=none; b=bPb+6g1nKwpcgr4pZ/zEFAttnzOzI5tYQUixs+sX3h4iRgbDWmWvxRdgtwxHX9RzvlK1nITmTCN1H/bd4c9r7jpY/zHrrJ+a80boJcoa5o5Ckp/VMe0+My8E2+zNKPeUOb9jb7DcrXSh+03uLBIl3/i9ILhf0a/5TSZlIcyM3Z0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760328916; c=relaxed/simple; bh=GIwQaiTj/5LG+RU8+Olm1P2KmF2g2ijoQR7LtNWSqm0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Zo2L6vquyiFI2wE8yy5ixn2plOt/qg9UbG/J/N8/07C9idi0vHAq7nLN/3BP4tDEsTZZ8cgrCdp59xIq97B3zexlQ01AIBs7PLGt6g3EtRYLjDSmml9ENxatfRzXafzFwr0M/uuGGIUltIYp44XbvB+lEsT7LWJHJsAY2r84Kwg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=P8jj0mbK; arc=none smtp.client-ip=209.85.128.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="P8jj0mbK" Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-46e6c8bc46eso22724905e9.3 for ; Sun, 12 Oct 2025 21:15:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1760328913; x=1760933713; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=colkYyZbzoORxyEYRGBidVhmHrro9mfSyhDk+5cS57k=; b=P8jj0mbKRJce8lpHjLn6fvZkpUMoo03H6bQO2WoMsHJ7pNZkPyKFcBPeRHGgyXmZ1t 1o4I23DBKO8ZyBp/V/CG/05Ksd6M9oS0vhoIp2Abp1cgePNPI4lMl1xA+xYVj3vpRhIN ZZcc7v7efLZ9oSpa+G0I8IpBoTadFXGTKWb07fvX/XjAFPTferEKgrayLBU0JtMpRPSx I6HhImhHVr6Z+9LUhzCEmPxkjgI1wGH/sfL5XOrSVI5FxDrtwRIr1cuHNJTdVDv+uSM8 0zMk8Gv2w0E0MlE6aiusshkoPh4gZO0ultt08Rce5Ycmju7p8ZB4byCCmbdDv/zmVhiD j/aA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760328913; x=1760933713; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=colkYyZbzoORxyEYRGBidVhmHrro9mfSyhDk+5cS57k=; b=G7NUhCrD54nvoKk5xHIhfwNKCTPWpbiwMbbY/JKhB4x2CjyUdcLSEv9wqLiw8h+CVS gVC4SkiJIfE0nLettMRNmbmanVxMIXxjCB3ygWkFJA4Q/oLfvK5cp0Wl7NZ2SfPsFT7Z 86iQXlNJAo050RM7TFz++uvOm9MrOKVog+wYcCxeKpIF5oIAHWvhAtx9Wu0vQYXOYCPs 13IlYBkUzgPbrXmiIcWWB9Xg1aDWWxDcTXUXSau3IWoP7cJOIk/R1xPdt9SS2lNeSADW OXM20X3+GPES+AxSbFQH2T3iVN6LGQbWHRwQlhbGwTfA80XgPnDAiN+HE13BZShXADXQ G6vw== X-Forwarded-Encrypted: i=1; AJvYcCUU3QjxeoQjcYQdT9rIDXZ+CRrxaOX3Z8fOuHueTt5jp8kIAbRrVHz/jYFHW1k19ZUSK3H4ll2eNy4=@vger.kernel.org X-Gm-Message-State: AOJu0Yy3V7Pkn8OeEnqVUTrv03nB++jpJH3nY26l428naPXzxYvolhLr jt7PI3DNAtBsij5ouVszucACOWZIaV0iI+/AhugaqjZaRVLO0ORkVS3Q X-Gm-Gg: ASbGncs5oQji9Yd5NDWky8Rgi4QOTZCtmVx+bFEV8lNSWsEa4EiAkm1DqFs52EydrVj nzCSR+JRn04ayRt2Kbvpv/SqXNtuH4+xofsr2TEoA+oRoUrCibGicmMY0q5vBkSX1Z3xalKuh6a Zvp1YFeM4SHKbc1/o2Z2rahJfj3grGhUb0xuhuxW5mt/klFAU5hZ1JMwMYS/NShjFlFjBZ+rZ0M oDkcT+6uCYtxz2IsM5AttfoTHXAlZDe/e1H98RY8B/JuJKSBa/ZjU9anuj7bunQUD7Ogd+D27Gd bgXq/x7hIfGcRNbsqbygwlu45e+arTSG9DT6+70iOQPnL+NdClvrrDLA9NHGu21F4Pw5y0IG/Ly H+pRg4hcKU47H8N+7Hw8h6M7eAek38ipNNQsWc2iZSA1R7rPyQWbkhQSYjwM= X-Google-Smtp-Source: AGHT+IECiVBvIpj/XkfavhhFkEhUHJSj2F77oaKYcZbnOL1gCKKAC8pproGszqhcGtZRZGjYUmGA5g== X-Received: by 2002:a05:600c:4584:b0:46f:b42e:e367 with SMTP id 5b1f17b1804b1-46fb42ee40cmr83475705e9.41.1760328912477; Sun, 12 Oct 2025 21:15:12 -0700 (PDT) Received: from localhost ([212.73.77.104]) by smtp.gmail.com with UTF8SMTPSA id 5b1f17b1804b1-46fb49c4027sm161997725e9.17.2025.10.12.21.15.11 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 12 Oct 2025 21:15:12 -0700 (PDT) From: Askar Safin To: luca.boccassi@gmail.com Cc: alx@kernel.org, brauner@kernel.org, cyphar@cyphar.com, linux-fsdevel@vger.kernel.org, linux-man@vger.kernel.org Subject: Re: [PATCH] man/man2/move_mount.2: document EINVAL on multiple instances Date: Mon, 13 Oct 2025 07:14:59 +0300 Message-ID: <20251013041459.148478-1-safinaskar@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-man@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Luca Boccassi : > I don't think so. This was in a mount namespace, so it was not shared, If it was not shared, then this seems like a bug. Please, say me reproduction steps, I will try to fix the bug. If you don't have reproduction steps, then, at very least, say something like "this happens at line xxx of this big program". Also, note that "unshare(CLONE_NEWNS)" and "unshare --mount" behave differently: if you do "unshare(CLONE_NEWNS)", then all shared mounts continue to be shared. But if you do "unshare --mount", then it internally does "unshare(CLONE_NEWNS)" and then equivalent of "mount --make-rprivate", i. e. makes all mounts inside new namespace private. > it was a new image, so not shared either, and '/' was not involved at When you make a new mount under existing shared mount, it becomes shared, too. (I just checked this.) Also, on systemd, all mounts (not only '/') are shared by default, I just checked this, too. -- Askar Safin