New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
systemd-portabled: Failed to set up mount namespacing: File exists when using StateDirectory, LogsDirectory, etc #22264
Comments
|
I can confirm the issue with systemd-git 250.r497.gf223fd6add-1-arch too |
|
I just have uploaded the findomain-portabled.raw image in case that someone want to reproduce the issue without building anything. |
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 27, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264
|
Fix waiting in #22272 |
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 27, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 27, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 28, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 31, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264 (cherry picked from commit 3fa80e5)
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 31, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264 (cherry picked from commit 3fa80e5)
bluca
added a commit
to bluca/systemd
that referenced
this issue
Jan 31, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264 (cherry picked from commit 3fa80e5)
bluca
added a commit
to systemd/systemd-stable
that referenced
this issue
Feb 15, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd/systemd#22264 (cherry picked from commit 3fa80e5) Conflicts: test/units/testsuite-50.sh
bluca
added a commit
to bluca/systemd
that referenced
this issue
Mar 4, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264 (cherry picked from commit 3fa80e5)
bluca
added a commit
to bluca/systemd
that referenced
this issue
Oct 3, 2022
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264 (cherry picked from commit 3fa80e5)
bluca
added a commit
to bluca/systemd
that referenced
this issue
Apr 21, 2023
…ectory are used A bind mount is added directly from private on the host to the actual destination directory, no need for the symlinks (which cannot be created as the bind mount happens first and creates the target as an actual directory) Fixes systemd#22264 (cherry picked from commit 3fa80e5)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
systemd version the issue has been seen with
Used distribution
Linux kernel version used (
uname -a)Linux SecHackLabs 5.16.1-237-tkg-cfs-llvm #1 TKG SMP PREEMPT Wed, 19 Jan 2022 22:21:26 +0000 x86_64 GNU/LinuxCPU architecture issue was seen on
Expected behaviour you didn't see
StateDirectory=as explained in https://systemd.io/PORTABLE_SERVICES/Unexpected behaviour you saw
Failed to set up mount namespacing: File exists /usr/bin/$my_binarySteps to reproduce the problem
git clone https://github.com/Findomain/Findomain-Portable.git && cd Findomain-Portablemksquashfs rootfs/ findomain-portabled.raw -all-root -comp zstdsystemctl start findomain-portabled.servicejournalctl -r # To see the error message.Additional program output to the terminal or log subsystem illustrating the issue
unsquashfs -ll findomain-portabled.rawThe text was updated successfully, but these errors were encountered: