Bug 927331 - Can you add ConditionCapabilities=CAP_MKNOD to LVM Units so we can run them easier within a container
Summary: Can you add ConditionCapabilities=CAP_MKNOD to LVM Units so we can run them e...
Keywords:
Status: CLOSED DUPLICATE of bug 961052
Alias: None
Product: Fedora
Classification: Fedora
Component: lvm2
Version: 19
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: LVM and device-mapper development team
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-03-25 16:54 UTC by Daniel Walsh
Modified: 2013-05-15 18:16 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-05-14 13:12:02 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Daniel Walsh 2013-03-25 16:54:14 UTC
Secure containers are blocking the mknod, to prevent easy breakout.  The problem is we are having a difficult time preventing lvm unit files from firing off and generating some ugly messages about not being allowed to mknod.  If you added this flag to your unit file, systemd would not attempt to launch theme when mknod has been removed.

Comment 1 Peter Rajnoha 2013-05-14 13:12:02 UTC
Well, normal unit files can be disabled if they are not intended for use. As for the problem with lvm2-activation-generator, this should be resolved now with bug #961052 - lvm2-2.02.98-9.fc19.

*** This bug has been marked as a duplicate of bug 961052 ***

Comment 2 Lennart Poettering 2013-05-15 18:16:00 UTC
One of the goals here is to make Fedora/RHEL boot on bare metal, in a VM and in a container cleanly without any changes on disk, with the same image, and cleanly. That's why manually disabling services sucks, because then the image that boots in a container won't boot on bare metal anymore.


Note You need to log in before you can comment on or make changes to this bug.