[Bug 1168389] New: transactional-update: umount of /proc failed
http://bugzilla.suse.com/show_bug.cgi?id=1168389 Bug ID: 1168389 Summary: transactional-update: umount of /proc failed Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: MicroOS Assignee: kubic-bugs@opensuse.org Reporter: kukuk@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Generating grub configuration file ... Found theme: /boot/grub2/themes/openSUSE/theme.txt Found linux image: /boot/vmlinuz-5.5.13-1-default Found initrd image: /boot/initrd-5.5.13-1-default done 2020-04-02 00:29 ERROR: umount of proc failed! umount: /.snapshots/45/snapshot/proc: target is busy. USER PID ACCESS COMMAND /.snapshots/45/snapshot/proc:kernel root mount /proc COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME systemd 1 root 10r REG 0,5 0 12745 /proc/1/mountinfo systemd 1 root 14r REG 0,5 0 4026532071 /proc/swaps systemd-j 487 root 10r REG 0,5 0 12987 /proc/sys/kernel/hostname lsof 27267 root 3r DIR 0,5 0 1 /proc lsof 27267 root 6r DIR 0,5 0 11695155 /proc/27267/fd -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 Thorsten Kukuk <kukuk@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|kubic-bugs@opensuse.org |iforster@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c1 Ignaz Forster <iforster@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CONFIRMED CC| |fvogt@suse.com --- Comment #1 from Ignaz Forster <iforster@suse.com> --- This message appears since transactional-update 2.21 and its switch to rbind mounts for /proc, and appears in connection with "autofs" mounts. In /proc we can find the following submount: systemd-1 on /proc/sys/fs/binfmt_misc type autofs Now if `umount -R` is called this will inadverently trigger the *mount* of the subvolume if it hasn't been mounted before; `umount` however did not see this coming and fails consequently. Fabian tried to fix this in https://github.com/karelzak/util-linux/pull/1002, let's see what upstream says about that patch. The umount is still successful by the way: transactional-update will try twice, and the second attempt succeeds as expected. I guess it would be a good idea to only print a warning if the first umount attempt fails, and only print the detailed error if the second attempt also fails... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c2 Fabian Vogt <fvogt@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|CONFIRMED |IN_PROGRESS CC| |iforster@suse.com Component|MicroOS |Basesystem Assignee|iforster@suse.com |sbrabec@suse.com --- Comment #2 from Fabian Vogt <fvogt@suse.com> --- Let's reassign this to the util-linux maintainer, maybe we can get a backport? Upstream hasn't responded yet, but as the PR is not even a day old let's give them some time. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c3 --- Comment #3 from Ignaz Forster <iforster@suse.com> --- Relaxed the messages in transactional-update a bit as a workaround: The big ERROR message and debugging output will now only be shown if the second attempt also fails, so that in this case only a warning is printed. For a real fix this still requires a modified util-linux version (especially as transactional-update now has a 30 second delay). -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c4 --- Comment #4 from Swamp Workflow Management <swamp@suse.de> --- This is an autogenerated message for OBS integration: This bug (1168389) was mentioned in https://build.opensuse.org/request/show/791674 Factory / transactional-update -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c5 Stanislav Brabec <sbrabec@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo? --- Comment #5 from Stanislav Brabec <sbrabec@suse.com> --- Do we need a backport for Tumbleweed only, or does the same affect older products? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c6 Ignaz Forster <iforster@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo? | --- Comment #6 from Ignaz Forster <iforster@suse.com> --- Good point: In general all of older distributions are affected, but it seems nobody noticed so far. But at least for SLE 15 SP2 / Leap 15.2 a backport would be required, as transactional-update will be updated to that new version which revealed that problem there. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c8 --- Comment #8 from Ignaz Forster <iforster@suse.com> --- A backport for SLE15-SP1 is required to be able to fix bug 1162320. I branched from SUSE:SLE-15-SP1:Update to add the patch, though I wasn't sure whether you wanted to backport the patch yourself. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c10 Ignaz Forster <iforster@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sbrabec@suse.com Flags| |needinfo?(sbrabec@suse.com) --- Comment #10 from Ignaz Forster <iforster@suse.com> --- https://build.suse.de/request/show/216008 was declined because there seems to be another pending, unreleased request, but I couldn't find the corresponding OBS package - could you have a look at that? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c11 --- Comment #11 from Stanislav Brabec <sbrabec@suse.com> --- Merged and backported to SLE15 and SLE12 SP5. https://build.suse.de/project/show/home:sbrabec:branches:util-linux-round11 Please test. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=1168389 http://bugzilla.suse.com/show_bug.cgi?id=1168389#c12 --- Comment #12 from Ignaz Forster <iforster@suse.com> --- Tested on SLE15 SP1 and confirmed that the fix is working as expected - thanks. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c14 --- Comment #14 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2020:2229-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1149911,1151708,1168235,1168389 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): util-linux-2.33.2-4.3.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): util-linux-2.33.2-4.3.1 SUSE Linux Enterprise Server 12-SP5 (src): python-libmount-2.33.2-4.3.1, util-linux-2.33.2-4.3.1, util-linux-systemd-2.33.2-4.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c15 --- Comment #15 from Swamp Workflow Management <swamp@suse.de> --- SUSE-RU-2020:2278-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1149911,1151708,1168235,1168389 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): util-linux-systemd-2.33.1-4.8.1 SUSE Linux Enterprise Module for Server Applications 15-SP1 (src): util-linux-systemd-2.33.1-4.8.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): util-linux-2.33.1-4.8.1, util-linux-systemd-2.33.1-4.8.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): util-linux-2.33.1-4.8.1, util-linux-systemd-2.33.1-4.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c16 --- Comment #16 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-RU-2020:1249-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1149911,1151708,1168235,1168389 CVE References: JIRA References: Sources used: openSUSE Leap 15.1 (src): python3-libmount-2.33.1-lp151.3.6.1, util-linux-2.33.1-lp151.3.6.1, util-linux-systemd-2.33.1-lp151.3.6.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c17 --- Comment #17 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-RU-2020:1250-1: An update that has four recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1149911,1151708,1168235,1168389 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): python3-libmount-2.33.1-lp152.5.3.1, util-linux-2.33.1-lp152.5.3.1, util-linux-systemd-2.33.1-lp152.5.3.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c21 Stanislav Brabec <sbrabec@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(sbrabec@suse.com) | --- Comment #21 from Stanislav Brabec <sbrabec@suse.com> --- Assuming that this bug is fixed and fixes are released. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c22 Stanislav Brabec <sbrabec@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|IN_PROGRESS |RESOLVED Resolution|--- |FIXED --- Comment #22 from Stanislav Brabec <sbrabec@suse.com> --- Closing. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c26 --- Comment #26 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:3463-1: An update that solves one vulnerability and has 19 fixes is now available. Category: security (moderate) Bug References: 1081947,1082293,1084671,1085196,1106214,1122417,1125886,1135534,1135708,1151708,1168235,1168389,1169006,1174942,1175514,1175623,1178236,1178554,1178825,1188921 CVE References: CVE-2021-37600 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 8 (src): python-libmount-2.29.2-3.24.1, util-linux-2.29.2-3.24.1, util-linux-systemd-2.29.2-3.24.1 SUSE OpenStack Cloud 8 (src): python-libmount-2.29.2-3.24.1, util-linux-2.29.2-3.24.1, util-linux-systemd-2.29.2-3.24.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): python-libmount-2.29.2-3.24.1, util-linux-2.29.2-3.24.1, util-linux-systemd-2.29.2-3.24.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): python-libmount-2.29.2-3.24.1, util-linux-2.29.2-3.24.1, util-linux-systemd-2.29.2-3.24.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): python-libmount-2.29.2-3.24.1, util-linux-2.29.2-3.24.1, util-linux-systemd-2.29.2-3.24.1 HPE Helion Openstack 8 (src): python-libmount-2.29.2-3.24.1, util-linux-2.29.2-3.24.1, util-linux-systemd-2.29.2-3.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c28 --- Comment #28 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-RU-2021:1476-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1133891,1149131,1162320,1168389,1192078 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): transactional-update-2.22-lp152.2.6.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c34 --- Comment #34 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:1108-1: An update that solves one vulnerability and has 13 fixes is now available. Category: security (important) Bug References: 1084671,1151708,1168235,1168389,1169006,1172427,1174942,1175514,1175623,1178236,1178554,1178825,1188921,1194642 CVE References: CVE-2021-37600 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15 (src): util-linux-2.31.1-150000.9.18.2, util-linux-systemd-2.31.1-150000.9.18.2 SUSE Linux Enterprise Server 15-LTSS (src): util-linux-2.31.1-150000.9.18.2, util-linux-systemd-2.31.1-150000.9.18.2 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): util-linux-2.31.1-150000.9.18.2, util-linux-systemd-2.31.1-150000.9.18.2 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): util-linux-2.31.1-150000.9.18.2, util-linux-systemd-2.31.1-150000.9.18.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c35 --- Comment #35 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:1103-1: An update that solves one vulnerability and has 23 fixes is now available. Category: security (important) Bug References: 1038841,1081947,1082293,1084671,1085196,1106214,1116347,1122417,1125886,1135534,1135708,1151708,1168235,1168389,1169006,1172427,1174942,1175514,1175623,1178236,1178554,1178825,1188921,1194642 CVE References: CVE-2021-37600 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): python-libmount-2.28-44.35.1, util-linux-2.28-44.35.1, util-linux-systemd-2.28-44.35.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1168389 https://bugzilla.suse.com/show_bug.cgi?id=1168389#c36 --- Comment #36 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:1105-1: An update that solves one vulnerability and has 21 fixes is now available. Category: security (important) Bug References: 1081947,1082293,1084671,1085196,1106214,1122417,1125886,1135534,1135708,1151708,1168235,1168389,1169006,1172427,1174942,1175514,1175623,1178236,1178554,1178825,1188921,1194642 CVE References: CVE-2021-37600 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): python-libmount-2.29.2-9.17.1, util-linux-2.29.2-9.17.1, util-linux-systemd-2.29.2-9.17.1 SUSE OpenStack Cloud 9 (src): python-libmount-2.29.2-9.17.1, util-linux-2.29.2-9.17.1, util-linux-systemd-2.29.2-9.17.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): python-libmount-2.29.2-9.17.1, util-linux-2.29.2-9.17.1, util-linux-systemd-2.29.2-9.17.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): python-libmount-2.29.2-9.17.1, util-linux-2.29.2-9.17.1, util-linux-systemd-2.29.2-9.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (2)
-
bugzilla_noreply@novell.com
-
bugzilla_noreply@suse.com