-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding --no-canonicalize prevents user mounts #7294
Comments
I did not know
EDIT: i'm sorry if #6437 broke some functionality, but from the man page i thought this was a non-issue. |
I would like to second what @loli10K has mentioned, edit: FWIW, it actually is possible for users to mount (non-zfs) filesystems if the fstab entry has the "user" mount option set. As well, the There was also previously another problem due to the permissions on |
@bunder2015 @loli10K it's definietly worth taking a second look at delegations for For example, if I recall correctly while Linux does allow "user" mounts it only done so when:
Adding support for the second case might address most peoples concerns since it should allow delegations to work correctly in containers.
Perhaps we can symlink it from
This should have been addressed by the updated udev rules some time ago. |
Unfortunately legacy mount points won't work here since users can't edit /etc/fstab (without sudo/etc, at least). However I just had a thought, the mount binary is setuid root, could we potentially leverage that for our use outside of containers? |
EDIT: I think this is a non-issue, you way want not to bother with these comments and jump to the last one. I've been trying to find a solution to this problem, although I'm not an experienced filesystem developer. I don't think that the This means that another solution has to be found for #1791 (presumably) and #6429. I understand that both of these issues are caused by the canonicalization of the device path.
|
After reading This actually looks hard to workaround in EDIT: maybe this prefix could be a simple It seems like the core of the problem is that the interface exposed by the |
This actually seems to be a non-issue. Also, I don't think this is related to #6865, as mounts in an user namespace can be done by the root user in that namespace ( I think that |
@pstch thanks for digging in to this one. Since I originally opened this one I'm happy to close it out as a non-issue. |
System information
Describe the problem you're observing
Reposted from #6437 (comment).
PR #6437 appears to prevent user-mode mounting of volumes.
Is it possible that the --no-canonicalize option could be used only when necessary? Or is there another solution to this that doesn't prevent user mounting?
Describe how to reproduce the problem
Include any warning/errors/backtraces from the system logs
None
The text was updated successfully, but these errors were encountered: