Activity log for bug #2077176

Date Who What changed Old value New value Message
2024-08-16 14:20:41 Heitor Alves de Siqueira bug added bug
2024-08-16 14:21:48 Heitor Alves de Siqueira bug task added ubuntu-pro
2024-08-16 14:21:57 Heitor Alves de Siqueira nominated for series ubuntu-pro/18.04
2024-08-16 14:21:57 Heitor Alves de Siqueira bug task added ubuntu-pro/18.04
2024-08-16 14:31:03 Heitor Alves de Siqueira summary FTBFS on bionic containers due to test-fs-util systemd FTBFS on bionic containers due to test-fs-util
2024-08-22 14:25:49 Heitor Alves de Siqueira ubuntu-pro/18.04: status New In Progress
2024-08-22 14:25:50 Heitor Alves de Siqueira ubuntu-pro/18.04: assignee Heitor Alves de Siqueira (halves)
2024-08-22 14:25:53 Heitor Alves de Siqueira ubuntu-pro/18.04: importance Undecided High
2024-08-22 14:27:50 Heitor Alves de Siqueira systemd (Ubuntu): importance Undecided Medium
2024-08-22 14:40:51 Heitor Alves de Siqueira description On Ubuntu 18.04 containers, systemd can FTBFS due to test-fs-util failing. When test-fs-util attempts to chmod a symbolic link, this can fail with EOPNOTSUPP depending on multiple factors (kernel versions, syscall support, underlying file system). On Ubuntu 18.04 containers, systemd can FTBFS due to test-fs-util failing. When test-fs-util attempts to chmod a symbolic link, this can fail with EOPNOTSUPP depending on multiple factors (kernel versions, syscall support, underlying file system). To fix and make systemd's behavior consistent, we backport the following chmod() and chown() related patches from upstream: 4dfaa528d451 fs-util: introduce fchmod_opath() b8da477eaf6c fs-util: introduce fchmod_and_chown() de321f522829 fs-util: beef up chmod_and_chown() a bit 30ff18d8a2cd fs-util: change chmod_and_chown() to not complain if stat data already matches 2dbb7e94af4f fs-util: rewrite chmod_and_chown() 71ec74d19332 fs-util: no need for fchmod_and_chown() to access /proc/self/fd directly 4b3b5bc71b79 tree-wide: port various places over to use chmod_and_chown() f63383a31fa4 test-fs-util: don't validate mode of symlinks This ensures the following: - systemd will be aware and respect syscall behavior from chmod variants (e.g. fchmod on a symlink with O_PATH) - systemd's touch_file() will not exhibit different chmod/chown behavior across different filesystems (e.g. ZFS vs ext4) - systemd won't be hamstringed by libc changing the syscalls depending on what's available in the host kernel (e.g. fchmodat2()) - enforce that symlink permissions are disregarded (as per symlink(2)/POSIX.1-2001), even if we're using /proc/<pid>/fd/<num> for the symlink handle