diff options
author | Iago López Galeiras <iaguis@gmail.com> | 2015-10-15 12:13:13 +0200 |
---|---|---|
committer | Iago López Galeiras <iaguis@gmail.com> | 2015-10-20 10:19:23 +0200 |
commit | d167824896e583ffaca891b1c355ff852496ff66 (patch) | |
tree | 7a5e78bc85ee51a3b1639e8ffa75133eaff55ae8 /src/basic/util.h | |
parent | ec566e4c7cee67ec2c39475ef08f18a9f1b80efd (diff) |
nspawn: skip /sys-as-tmpfs if we don't use private-network
Since v3.11/7dc5dbc ("sysfs: Restrict mounting sysfs"), the kernel
doesn't allow mounting sysfs if you don't have CAP_SYS_ADMIN rights over
the network namespace.
So the mounting /sys as a tmpfs code introduced in
d8fc6a000fe21b0c1ba27fbfed8b42d00b349a4b doesn't work with user
namespaces if we don't use private-net. The reason is that we mount
sysfs inside the container and we're in the network namespace of the host
but we don't have CAP_SYS_ADMIN over that namespace.
To fix that, we mount /sys as a sysfs (instead of tmpfs) if we don't use
private network and ignore the /sys-as-a-tmpfs code if we find that /sys
is already mounted as sysfs.
Fixes #1555
Diffstat (limited to 'src/basic/util.h')
-rw-r--r-- | src/basic/util.h | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/src/basic/util.h b/src/basic/util.h index 6c63bc221f..ac74650ff6 100644 --- a/src/basic/util.h +++ b/src/basic/util.h @@ -365,6 +365,12 @@ char* getusername_malloc(void); int chmod_and_chown(const char *path, mode_t mode, uid_t uid, gid_t gid); int fchmod_and_fchown(int fd, mode_t mode, uid_t uid, gid_t gid); +typedef long statfs_f_type_t; + +bool is_fs_type(const struct statfs *s, statfs_f_type_t magic_value) _pure_; +int fd_check_fstype(int fd, statfs_f_type_t magic_value); +int path_check_fstype(const char *path, statfs_f_type_t magic_value); + bool is_temporary_fs(const struct statfs *s) _pure_; int fd_is_temporary_fs(int fd); |