I have enclosed a patch that allows rbinds across any two namespaces. NOTE: currenly bind from foriegn namespace to current namespace is allowed. This patch now allows: binds/rbinds from any namespace to any other namespace, under the assumption that if a process has access to a namespace, it ought to have permission to manipulate that namespace. The patch incorporates ideas from Miklos and Jamie, and is dependent on Miklos's 'fix race in mark_mounts_for_expiry' patch to function correctly. Also it depends on Miklos's 'fix bind mount from foreign namespace' patch, because without that patch umounts would fail. Though we have not come up with any security reason towards why this functionality should not be allowed, I am sure it may open up some concerns. RP