On Thu, Sep 1, 2016 at 4:24 PM arnaud gaboury <arnaud.gabo...@gmail.com>
wrote:

> On Thu, Sep 1, 2016 at 2:02 PM Lennart Poettering <lenn...@poettering.net>
> wrote:
>
>> On Thu, 01.09.16 10:47, arnaud gaboury (arnaud.gabo...@gmail.com) wrote:
>>
>> > I have been moving directories and files between my host and my
>> container
>> > many times since more than one year with no issues. Host is Archlinux
>> and
>> > container Fedora 24 (upgrade to 24 is quite recent: no more than 2
>> months).
>> >
>> > I moved a directory today from host to container and this let me, for
>> the
>> > first time, with a directory in the container owned by 65534:65534.
>> > <The UID 65534 is commonly reserved for *nobody*, a user with no system
>> > privileges, as opposed to an ordinary (i.e., *non-privileged*) user.
>> This
>> > UID is often used for individuals accessing the system remotely via FTP
>> or
>> > HTTP[0] >
>>
>> Uh, oh. My gues is this: you are using user namespaces (wich is the
>> default these days if you use systemd-nspawn@.service), and I nevre
>> updated the copy logic in machined to deal with that...
>>
>
I rebuilt my kernel with removing user namespace (as it is set):
 # CONFIG_USER_NS is not set

Here was my container output:
------------------------------------------------
[poisonivy@thetradinghall]/% ls -al
total 16K
dr-xr-xr-x   1 363397120 363397120  198 Sep  1 15:18 ./
dr-xr-xr-x   1 363397120 363397120  198 Sep  1 15:18 ../
dr-xr-xr-x   1 363397120 363397120    0 Feb  3  2016 boot/
drwxrwxr-x   1 363397120 363397120   62 Aug 26 19:59 db/
drwxr-xr-x   7 root      root       440 Sep  1 17:33 dev/
drwxr-xr-x   1 363397120 363397120 4.1K Sep  1 15:34 etc/
drwxr-xr-x   1 363397120 363397120   76 Feb  3  2016 home/
drwxrwxrwx   1 363397120 363397120    0 Aug 28 13:47 keybase/
drwxr-xr-x   1 363397120 363397120    0 Feb  3  2016 media/
drwxr-xr-x   1 363397120 363397120    0 Feb  3  2016 mnt/
drwxr-xr-x   1 363397120 363397120   56 Feb  3  2016 opt/
dr-xr-xr-x 376 root      root         0 Sep  1 17:33 proc/
dr-xr-x---   1 363397120 363397120  378 Sep  1 15:32 root/
drwxr-xr-x  32 root      root       800 Sep  1 17:34 run/
drwxr-xr-x   1 root      root         6 Mar  3 17:43 share/
drwxr-xr-x   1 363397120 363397120    0 Feb  3  2016 srv/
drwxrwxr-x   1 363397120 363397130  242 Sep  1 16:34 storage/
drwxr-xr-x   9 root      root       180 Sep  1 17:33 sys/
drwxrwxrwt  11 root      root       220 Sep  1 17:39 tmp/
drwxr-xr-x   1 363397120 363397120  100 Dec 14  2015 usr/
drwxr-xr-x   1 363397120 363397120  194 Mar 19 18:29 var/
-rw-r--r--   1 363397120 363397120    0 Sep  1 15:18 .autorelabel
lrwxrwxrwx   1 363397120 363397120    7 Feb  3  2016 bin -> usr/bin/
lrwxrwxrwx   1 363397120 363397120    7 Feb  3  2016 lib -> usr/lib/
lrwxrwxrwx   1 363397120 363397120    9 Feb  3  2016 lib64 -> usr/lib64/
lrwxrwxrwx   1 root      root         8 Feb  3  2016 sbin -> usr/sbin/
-----------------------------------------------------------------------------

Back with user namespace set to Y, output is correct (except the nobody
story).


> Or in other words, it's a bug in machined.
>>
>> I filed a github issue to keep track of this, so that we can get this
>> fixed:
>>
>> https://github.com/systemd/systemd/issues/4078
>
>
> Thank you for opening the issue. I have been reading quite a lot about
> this on the past few hours. Most of such issues arise with NTFS, which is
> not my case
> # mount
> /dev/sdb1 on / type btrfs
> (rw,noatime,compress=lzo,ssd,space_cache,autodefrag,subvolid=266,subvol=/rootvol)
> ...........
>
>  if it can help, from container:
> -----------------------------------------------
> root@thetradinghall ➤➤ / # lsattr
> ---------------- ./usr
> lsattr: Inappropriate ioctl for device While reading flags on ./run
> ---------------- ./boot
> lsattr: Inappropriate ioctl for device While reading flags on ./dev
> ---------------- ./home
> ---------------- ./media
> ---------------- ./mnt
> ---------------- ./opt
> lsattr: Inappropriate ioctl for device While reading flags on ./proc
> ---------------- ./root
> ---------------- ./srv
> lsattr: Inappropriate ioctl for device While reading flags on ./sys
> lsattr: Inappropriate ioctl for device While reading flags on ./tmp
> ---------------- ./etc
> ---------------- ./var
> ---------------- ./db
> ---------------- ./storage
> ---------------- ./share
> lsattr: Operation not supported While reading flags on ./sbin
> ---------------- ./keybase
> lsattr: Operation not supported While reading flags on ./bin
> lsattr: Operation not supported While reading flags on ./lib
> lsattr: Operation not supported While reading flags on ./lib64
> -----------------------------------------
>
> This issue is new and have been able to cp/mv from host to container and
> preserve file/folders attributes until now. Something in my recent upgrades
> have done these changes.
>
>
>> Lennart
>>
>> --
>> Lennart Poettering, Red Hat
>>
>
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to