[Bug 651555] New: systemd: crazy mount table
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c0 Summary: systemd: crazy mount table Classification: openSUSE Product: openSUSE 11.4 Version: Factory Platform: x86-64 OS/Version: Other Status: NEW Severity: Normal Priority: P5 - None Component: Basesystem AssignedTo: kasievers@novell.com ReportedBy: crrodriguez@opensuse.org QAContact: qa@suse.de Found By: Development Blocker: No Boot factory using systemd, then execute "mount" mount /dev/sda2 on / type ext4 (rw,noatime,data=writeback,acl,user_xattr) proc on /proc type proc (rw) sysfs on /sys type sysfs (rw) devtmpfs on /dev type devtmpfs (rw,mode=0755) devpts on /dev/pts type devpts (rw,mode=0620,gid=5) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) securityfs on /sys/kernel/security type securityfs (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) debugfs on /sys/kernel/debug type debugfs (rw) tmpfs on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=755) tmpfs on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=775,gid=54) mqueue on /dev/mqueue type mqueue (rw) hugetlbfs on /dev/hugepages type hugetlbfs (rw) securityfs on /sys/kernel/security type securityfs (rw) It is mouting the same filesystems several times. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c1 Kay Sievers <kasievers@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO InfoProvider| |crrodriguez@opensuse.org --- Comment #1 from Kay Sievers <kasievers@novell.com> 2010-11-05 00:24:30 UTC --- Does /proc/mounts show the same insanity? -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c2 Cristian Rodríguez <crrodriguez@opensuse.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW InfoProvider|crrodriguez@opensuse.org | --- Comment #2 from Cristian Rodríguez <crrodriguez@opensuse.org> 2010-11-05 00:32:29 UTC --- (In reply to comment #1)
Does /proc/mounts show the same insanity?
Nope. cat /proc/mounts rootfs / rootfs rw 0 0 devtmpfs /dev devtmpfs rw,relatime,size=505364k,nr_inodes=126341,mode=755 0 0 tmpfs /dev/shm tmpfs rw,relatime 0 0 devpts /dev/pts devpts rw,relatime,gid=5,mode=620,ptmxmode=000 0 0 /dev/sda2 / ext4 rw,noatime,user_xattr,acl,barrier=1,data=writeback 0 0 proc /proc proc rw,relatime 0 0 sysfs /sys sysfs rw,relatime 0 0 tmpfs /sys/fs/cgroup tmpfs rw,nosuid,nodev,noexec,relatime,mode=755 0 0 cgroup /sys/fs/cgroup/systemd cgroup rw,nosuid,nodev,noexec,relatime,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd 0 0 cgroup /sys/fs/cgroup/cpuset cgroup rw,nosuid,nodev,noexec,relatime,cpuset 0 0 cgroup /sys/fs/cgroup/ns cgroup rw,nosuid,nodev,noexec,relatime,ns 0 0 cgroup /sys/fs/cgroup/cpu cgroup rw,nosuid,nodev,noexec,relatime,cpu 0 0 cgroup /sys/fs/cgroup/cpuacct cgroup rw,nosuid,nodev,noexec,relatime,cpuacct 0 0 cgroup /sys/fs/cgroup/memory cgroup rw,nosuid,nodev,noexec,relatime,memory 0 0 cgroup /sys/fs/cgroup/devices cgroup rw,nosuid,nodev,noexec,relatime,devices 0 0 cgroup /sys/fs/cgroup/freezer cgroup rw,nosuid,nodev,noexec,relatime,freezer 0 0 cgroup /sys/fs/cgroup/net_cls cgroup rw,nosuid,nodev,noexec,relatime,net_cls 0 0 cgroup /sys/fs/cgroup/blkio cgroup rw,nosuid,nodev,noexec,relatime,blkio 0 0 systemd-1 /dev/hugepages autofs rw,relatime,fd=26,pgrp=1,timeout=300,minproto=5,maxproto=5,direct 0 0 systemd-1 /sys/kernel/security autofs rw,relatime,fd=27,pgrp=1,timeout=300,minproto=5,maxproto=5,direct 0 0 systemd-1 /sys/kernel/debug autofs rw,relatime,fd=28,pgrp=1,timeout=300,minproto=5,maxproto=5,direct 0 0 systemd-1 /dev/mqueue autofs rw,relatime,fd=29,pgrp=1,timeout=300,minproto=5,maxproto=5,direct 0 0 systemd-1 /proc/sys/fs/binfmt_misc autofs rw,relatime,fd=30,pgrp=1,timeout=300,minproto=5,maxproto=5,direct 0 0 tmpfs /var/run tmpfs rw,nosuid,nodev,noexec,relatime,mode=755 0 0 tmpfs /var/lock tmpfs rw,nosuid,nodev,noexec,relatime,mode=775,gid=54 0 0 mqueue /dev/mqueue mqueue rw,relatime 0 0 hugetlbfs /dev/hugepages hugetlbfs rw,relatime 0 0 securityfs /sys/kernel/security securityfs rw,relatime 0 0 -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c3 Kay Sievers <kasievers@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|systemd: crazy mount table |systemd: /etc/mtab as | |regular file not properly | |supported --- Comment #3 from Kay Sievers <kasievers@novell.com> 2010-11-05 14:01:16 UTC --- Oh, it's /etc/mtab going crazy. We should just make it a symlink: $ ls -l /etc/mtab lrwxrwxrwx 1 root root 12 2010-09-29 11:46 /etc/mtab -> /proc/mounts We will need to add stuff to clean it up at bootup, if people still want it for some reason. The long-term plan is to kill it entirely, even in util-lunux's mount(8). -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c4 Kay Sievers <kasievers@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO CC| |aj@novell.com, | |ro@novell.com InfoProvider| |ro@novell.com --- Comment #4 from Kay Sievers <kasievers@novell.com> 2010-11-10 01:32:53 UTC --- Systemd will not support /etc/mtab being a regular file. It needs to be replaced by a symlink to /proc/self/mounts. With todays setups, mirroring volatile kernel state in a regular file in the filesystem can not work reliably. There are a few uncommon features missing without /etc/mtab, and util-linux is currently working on moving the information which is not available from the kernel, like 'user umounts' to a private file which can't be read by other applications than mount. We will need to find out which package will create the /etc/mtab symlink now. As a first step /etc/init.d/boot.rootfsck needs to stop deleting a /etc/mtab, if it's a symlink. /etc/init.d/boot.rootfsck is not used when systemd boots the box, but any sysv bootup will delete this valid setup. Ruediger, could you please get rid of the rm? Thanks. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c5 Ruediger Oertel <ro@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW InfoProvider|ro@novell.com | --- Comment #5 from Ruediger Oertel <ro@novell.com> 2010-11-10 10:30:32 UTC --- leaving /etc/mtab alone if it's a symlink (there are however really some info missing in /proc/self/mounts like for loop mounts and possibly others, so I hope util-linux will have a solution real soon) -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c6 --- Comment #6 from Kay Sievers <kasievers@novell.com> 2010-11-10 18:07:14 UTC --- Thanks for the fix t o the init script. Util-linux will use: /dev/.mount/utab and: /dev/.mount/utab.lock file with flock() release u-l-ng 2.19 in December, there will be usable (but experimental) libmount will all basic features + experimental version of mount(8). The official mount(8) will be updated in the next major release 2.20 next year -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c7 Kay Sievers <kasievers@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO InfoProvider| |aj@novell.com Summary|systemd: /etc/mtab as |systemd: /etc/mtab as |regular file not properly |regular file not supported |supported | --- Comment #7 from Kay Sievers <kasievers@novell.com> 2010-11-10 18:52:51 UTC --- AJ any idea from where to create the /etc/mtab symlink? In which package? From systemd.rpm? Long-term, util-linux will do that for everybody, but for now, we might not want to change systems which run sysv? -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=651555 https://bugzilla.novell.com/show_bug.cgi?id=651555#c8 Kay Sievers <kasievers@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |CLOSED InfoProvider|aj@novell.com | Resolution| |FIXED --- Comment #8 from Kay Sievers <kasievers@novell.com> 2010-11-11 07:24:06 UTC --- systemd.rpm replaces /etc/mtab now with a symlink -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com