Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up
Adding --no-canonicalize prevents user mounts #7294
Describe the problem you're observing
Reposted from #6437 (comment).
PR #6437 appears to prevent user-mode mounting of volumes.
Is it possible that the --no-canonicalize option could be used only when necessary? Or is there another solution to this that doesn't prevent user mounting?
Describe how to reproduce the problem
Include any warning/errors/backtraces from the system logs
I did not know
EDIT: i'm sorry if #6437 broke some functionality, but from the man page i thought this was a non-issue.
I would like to second what @loli10K has mentioned,
edit: FWIW, it actually is possible for users to mount (non-zfs) filesystems if the fstab entry has the "user" mount option set.
As well, the
There was also previously another problem due to the permissions on
@bunder2015 @loli10K it's definietly worth taking a second look at delegations for
For example, if I recall correctly while Linux does allow "user" mounts it only done so when:
Adding support for the second case might address most peoples concerns since it should allow delegations to work correctly in containers.
Perhaps we can symlink it from
This should have been addressed by the updated udev rules some time ago.
EDIT: I think this is a non-issue, you way want not to bother with these comments and jump to the last one.
I've been trying to find a solution to this problem, although I'm not an experienced filesystem developer.
I don't think that the
This actually looks hard to workaround in
EDIT: maybe this prefix could be a simple
It seems like the core of the problem is that the interface exposed by the
This actually seems to be a non-issue.
Also, I don't think this is related to #6865, as mounts in an user namespace can be done by the root user in that namespace (
I think that