** Description changed:

  On Ubuntu 18.04 containers, systemd can FTBFS due to test-fs-util
  failing. When test-fs-util attempts to chmod a symbolic link, this can
  fail with EOPNOTSUPP depending on multiple factors (kernel versions,
  syscall support, underlying file system).
+ 
+ To fix and make systemd's behavior consistent, we backport the following 
chmod() and chown() related patches from upstream:
+   4dfaa528d451 fs-util: introduce fchmod_opath()
+   b8da477eaf6c fs-util: introduce fchmod_and_chown()
+   de321f522829 fs-util: beef up chmod_and_chown() a bit
+   30ff18d8a2cd fs-util: change chmod_and_chown() to not complain if stat data 
already matches
+   2dbb7e94af4f fs-util: rewrite chmod_and_chown()
+   71ec74d19332 fs-util: no need for fchmod_and_chown() to access 
/proc/self/fd directly
+   4b3b5bc71b79 tree-wide: port various places over to use chmod_and_chown()
+   f63383a31fa4 test-fs-util: don't validate mode of symlinks
+ 
+ This ensures the following:
+ - systemd will be aware and respect syscall behavior from chmod variants 
(e.g. fchmod on a symlink with O_PATH)
+ - systemd's touch_file() will not exhibit different chmod/chown behavior 
across different filesystems (e.g. ZFS vs ext4)
+ - systemd won't be hamstringed by libc changing the syscalls depending on 
what's available in the host kernel (e.g. fchmodat2())
+ - enforce that symlink permissions are disregarded (as per 
symlink(2)/POSIX.1-2001), even if we're using /proc/<pid>/fd/<num> for the 
symlink handle

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077176

Title:
  systemd FTBFS on bionic containers due to test-fs-util

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-pro/+bug/2077176/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to