diff options
| author | K900 <me@0upti.me> | 2023-09-29 23:32:46 +0300 |
|---|---|---|
| committer | K900 <me@0upti.me> | 2023-09-29 23:32:46 +0300 |
| commit | ff1413aa34c525bf01145b40b99acfb7868ab285 (patch) | |
| tree | 64148d00bbc6f8e1d7ba099cfbf31123113db2f8 | |
| parent | f347f6c75fe861dfd8f4c277d2bafa4e343968b6 (diff) | |
fix: fix legacy (syschdemd) mode
Quoth man mount(2)
> EINVAL
>
> A bind operation (MS_BIND) was requested where source
> referred a mount namespace magic link (i.e., a
> /proc/pid/ns/mnt magic link or a bind mount to such a
> link) and the propagation type of the parent mount of
> target was MS_SHARED, but propagation of the requested
> bind mount could lead to a circular dependency that might
> prevent the mount namespace from ever being freed.
| -rw-r--r-- | modules/systemd/syschdemd/syschdemd.sh | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/modules/systemd/syschdemd/syschdemd.sh b/modules/systemd/syschdemd/syschdemd.sh index fa0ffe5..75f10aa 100644 --- a/modules/systemd/syschdemd/syschdemd.sh +++ b/modules/systemd/syschdemd/syschdemd.sh @@ -38,6 +38,8 @@ run_in_namespace() { } start_systemd() { + mount --bind --make-private $rundir $rundir + daemonize \ -o $rundir/stdout \ -e $rundir/stderr \ |
