FS#61313 - [systemd] 240.0-3 -networkd.service not starting in unprivileged container
Attached to Project:
Arch Linux
Opened by ipp (n8V8r) - Tuesday, 08 January 2019, 23:10 GMT
Last edited by Dave Reisner (falconindy) - Thursday, 10 January 2019, 15:38 GMT
Opened by ipp (n8V8r) - Tuesday, 08 January 2019, 23:10 GMT
Last edited by Dave Reisner (falconindy) - Thursday, 10 January 2019, 15:38 GMT
|
Details
Description: After having upgraded systemd from 239.370-1 to
240.0-3 in an unprivileged lxc container networkd.service is
producing
>> systemd-networkd.service: Failed to set up mount namespacing: Permission denied Another arch guest on the same host and still with systemd 239.370-1 does not exhibit the issue. Steps to reproduce: * pacman -Suy * accept the update * restart lxc container |
This task depends upon
Closed by Dave Reisner (falconindy)
Thursday, 10 January 2019, 15:38 GMT
Reason for closing: Won't fix
Additional comments about closing: Not Arch's bug to fix. This is upstream in LXC+AA:
https://bugs.launchpad.net/ubuntu/+sourc e/apparmor/+bug/1811248
https://github.com/lxc/lxc/issues/2778
Thursday, 10 January 2019, 15:38 GMT
Reason for closing: Won't fix
Additional comments about closing: Not Arch's bug to fix. This is upstream in LXC+AA:
https://bugs.launchpad.net/ubuntu/+sourc e/apparmor/+bug/1811248
https://github.com/lxc/lxc/issues/2778
Looking at the https://github.com/systemd/systemd-stable/blob/3bf819c4ca718a6bc4b3b871cf52a0d1b518967d/src/core/execute.c#L2383 that to me looks like the code without 1beab8b0d0.
I suppose the suggestion to revert is meant for the package maintainer to see if that would fix it the issue.
No, it's meant for someone who actually suffers from the issue to revert it and see if it works. Then, if it does work, you can file a bug report upstream. Arch will not be reverting commits in systemd without a clear plan to make changes upstream.
Upstream is apparently aware https://github.com/systemd/systemd/commit/1beab8b0d0#commitcomment-30393464 and thus there is no point in filing another bug report if they do not care.
Well, suppose choices then either to prevent further systemd updates or switch to a distro without systemd.
How am I, as a maintainer, supposed to help people who report bugs if I can't reproduce the problem on my own? Fixing bugs is a team effort. Arch makes it *extremely* easy to checkout package sources, make modifications, and test those local changes.
> Upstream is apparently aware https://github.com/systemd/systemd/commit/1beab8b0d0#commitcomment-30393464 and thus there is no point in filing another bug report if they do not care.
That link seems to circle back to suggestions that this is problem of LXC and AppArmor. Is this an Arch *host* in addition to an Arch guest?
The host is ubuntu cosmic but that cannot be the issue since 239.370 in the Arch guest works perfectly fine.
I do not mind the team effort but how is it easy to checkout package sources, make modifications, and test those local changes? I do not want having to install any of these developer/compiler packages and jump to a lot of documentation and other hoops.
audit: type=1400 audit(1547125168.853:722): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="lxc-container-default-cgns" name="/" pid=8426 comm="(networkd)" flags="rw, rslave"
https://github.com/lxc/lxc/issues/2778