mirror of
https://github.com/containers/podman.git
synced 2025-10-16 10:43:52 +08:00
rootless: don't bind mount /sys/fs/cgroup/systemd in systemd mode
it is not writeable by non-root users so there is no point in having access to it from a container. Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
This commit is contained in:
@ -360,19 +360,23 @@ func (c *Container) setupSystemd(mounts []spec.Mount, g generate.Generator) erro
|
||||
g.AddMount(tmpfsMnt)
|
||||
}
|
||||
|
||||
cgroupPath, err := c.CGroupPath()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
sourcePath := filepath.Join("/sys/fs/cgroup/systemd", cgroupPath)
|
||||
// rootless containers have no write access to /sys/fs/cgroup, so don't
|
||||
// add any mount into the container.
|
||||
if !rootless.IsRootless() {
|
||||
cgroupPath, err := c.CGroupPath()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
sourcePath := filepath.Join("/sys/fs/cgroup/systemd", cgroupPath)
|
||||
|
||||
systemdMnt := spec.Mount{
|
||||
Destination: "/sys/fs/cgroup/systemd",
|
||||
Type: "bind",
|
||||
Source: sourcePath,
|
||||
Options: []string{"bind", "private"},
|
||||
systemdMnt := spec.Mount{
|
||||
Destination: "/sys/fs/cgroup/systemd",
|
||||
Type: "bind",
|
||||
Source: sourcePath,
|
||||
Options: []string{"bind", "private"},
|
||||
}
|
||||
g.AddMount(systemdMnt)
|
||||
}
|
||||
g.AddMount(systemdMnt)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
Reference in New Issue
Block a user