Am 27.01.2015 um 19:02 schrieb Lennart Poettering:
Merged this one too, made some changes first howver. I reworked this
to use our chmod_and_chown() helper, and removed the bit that checks
whether the mount point actually was a mount point after umount2(). I
really prefer if we can just check
On Fri, 23.01.15 15:26, Christian Seiler (christ...@iwakd.de) wrote:
In containers without CAP_SYS_ADMIN, it is not possible to mount tmpfs
(or any filesystem for that matter) on top of /run/user/$UID.
Previously, logind just failed in such a situation.
Now, logind will resort to
In containers without CAP_SYS_ADMIN, it is not possible to mount tmpfs
(or any filesystem for that matter) on top of /run/user/$UID.
Previously, logind just failed in such a situation.
Now, logind will resort to chown+chmod of the directory instead. This
allows logind still to work in those