From: Zbigniew Jędrzejewski-Szmek Date: Fri, 11 Nov 2016 18:00:33 +0000 (-0500) Subject: units: disable /sys/fs/fuse/connections in private user namespaces (#4592) X-Git-Tag: v233~426 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=b878b618adb8467f60992b5933a46e109a0939ab;p=thirdparty%2Fsystemd.git units: disable /sys/fs/fuse/connections in private user namespaces (#4592) The mount fails, even though CAP_SYS_ADMIN is granted. Only file systems with FU_USERNS_MOUNT in .fs_flags may be mounted in userns, and the patch to add that fusectl was rejected [1]. It would be nice if we could check if the kernel has FU_USERNS_MOUNT for a given fs type, since this could change over time, but this information doesn't seem to be exported. So let's just skip this mount in userns to avoid an error during boot. [1] https://patchwork.kernel.org/patch/2828269/ --- diff --git a/units/sys-fs-fuse-connections.mount b/units/sys-fs-fuse-connections.mount index e940beb09f6..336b5f6277e 100644 --- a/units/sys-fs-fuse-connections.mount +++ b/units/sys-fs-fuse-connections.mount @@ -12,6 +12,7 @@ Documentation=http://www.freedesktop.org/wiki/Software/systemd/APIFileSystems DefaultDependencies=no ConditionPathExists=/sys/fs/fuse/connections ConditionCapability=CAP_SYS_ADMIN +ConditionVirtualization=!private-users After=systemd-modules-load.service Before=sysinit.target