491a809050
Resolves: #1619292,#1954429,#1959826,#1960703,#1973210,#1973856,#1978639,#1982603,#1984299,#1989472
48 lines
1.9 KiB
Diff
48 lines
1.9 KiB
Diff
From d77095927682f5a6921d3825256743eb8f5e6e1b Mon Sep 17 00:00:00 2001
|
|
From: Jan Synacek <jsynacek@redhat.com>
|
|
Date: Tue, 15 May 2018 09:24:20 +0200
|
|
Subject: [PATCH] Avoid /tmp being mounted as tmpfs without the user's will
|
|
|
|
Ensure PrivateTmp doesn't require tmpfs through tmp.mount, but rather
|
|
adds an After relationship.
|
|
|
|
RHEL-only
|
|
|
|
Resolves: #1959826
|
|
|
|
(cherry picked from commit f58c5ced373c2532b5cc44ba2e0c3a28b41472f2)
|
|
---
|
|
src/core/unit.c | 7 +------
|
|
units/basic.target | 3 ++-
|
|
2 files changed, 3 insertions(+), 7 deletions(-)
|
|
|
|
diff --git a/src/core/unit.c b/src/core/unit.c
|
|
index 30afd5a776..d9cd0c229a 100644
|
|
--- a/src/core/unit.c
|
|
+++ b/src/core/unit.c
|
|
@@ -1266,12 +1266,7 @@ int unit_add_exec_dependencies(Unit *u, ExecContext *c) {
|
|
}
|
|
|
|
if (c->private_tmp) {
|
|
-
|
|
- /* FIXME: for now we make a special case for /tmp and add a weak dependency on
|
|
- * tmp.mount so /tmp being masked is supported. However there's no reason to treat
|
|
- * /tmp specifically and masking other mount units should be handled more
|
|
- * gracefully too, see PR#16894. */
|
|
- r = unit_add_two_dependencies_by_name(u, UNIT_AFTER, UNIT_WANTS, "tmp.mount", true, UNIT_DEPENDENCY_FILE);
|
|
+ r = unit_add_dependency_by_name(u, UNIT_AFTER, "tmp.mount", true, UNIT_DEPENDENCY_FILE);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
diff --git a/units/basic.target b/units/basic.target
|
|
index d8cdd5ac14..9eae0782a2 100644
|
|
--- a/units/basic.target
|
|
+++ b/units/basic.target
|
|
@@ -19,4 +19,5 @@ After=sysinit.target sockets.target paths.target slices.target tmp.mount
|
|
# require /var and /var/tmp, but only add a Wants= type dependency on /tmp, as
|
|
# we support that unit being masked, and this should not be considered an error.
|
|
RequiresMountsFor=/var /var/tmp
|
|
-Wants=tmp.mount
|
|
+# RHEL-only: Disable /tmp on tmpfs.
|
|
+#Wants=tmp.mount
|