]> xenbits.xensource.com Git - libvirt.git/commit
kbase: Document QEMU private mount NS limitations
authorMichal Privoznik <mprivozn@redhat.com>
Mon, 5 Sep 2022 10:37:16 +0000 (12:37 +0200)
committerMichal Privoznik <mprivozn@redhat.com>
Mon, 12 Sep 2022 10:05:07 +0000 (12:05 +0200)
commitd3397885d589c25b8962ae221fd0a71ced5597cb
treebb229915fa8a9a4118306e1e7a9a0fd11a7c5130
parentf14f8dff9330ed51d817f190a2ee9ac76dfac00b
kbase: Document QEMU private mount NS limitations

There are two points I've taken for granted:

  1) the mount points are set before starting a guest,
  2) the / and its submounts are marked as shared, so that mount
     events propagate into child namespaces when assumption 1) is
     not held.

But what's obvious to me might not be obvious to our users.
Document these known limitations.

Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=2123196
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Martin Kletzander <mkletzan@redhat.com>
docs/kbase/qemu-passthrough-security.rst