** Description changed:

+ Many units shipped by systemd use credentials in some way by default now
+ (in v256). So this issue is now about much more than the original test
+ case failure.
+ 
+ For example,
+ 
+ root@oracular:~# apt policy systemd
+ systemd:
+   Installed: 256-1ubuntu1
+   Candidate: 256-1ubuntu1
+   Version table:
+  *** 256-1ubuntu1 100
+         100 http://archive.ubuntu.com/ubuntu oracular-proposed/main amd64 
Packages
+         100 /var/lib/dpkg/status
+      255.4-1ubuntu8 500
+         500 http://archive.ubuntu.com/ubuntu oracular/main amd64 Packages
+ root@oracular:~# for service in $(find /usr/lib/systemd/system -maxdepth 1 
-name "systemd-*.service"); do grep -q "Credential.*=" "$service" && echo 
"$service"; done
+ /usr/lib/systemd/system/systemd-sysusers.service
+ /usr/lib/systemd/system/systemd-resolved.service
+ /usr/lib/systemd/system/systemd-firstboot.service
+ /usr/lib/systemd/system/systemd-network-generator.service
+ /usr/lib/systemd/system/systemd-journald.service
+ /usr/lib/systemd/system/systemd-sysctl.service
+ /usr/lib/systemd/system/systemd-tmpfiles-setup-dev-early.service
+ /usr/lib/systemd/system/systemd-tmpfiles-setup-dev.service
+ /usr/lib/systemd/system/systemd-tmpfiles-setup.service
+ /usr/lib/systemd/system/systemd-udev-load-credentials.service
+ /usr/lib/systemd/system/systemd-tmpfiles-clean.service
+ /usr/lib/systemd/system/systemd-networkd.service
+ 
+ 
+ [Original Description]
+ 
  To demonstrate this, in an unprivileged LXD container, create the
  following unit (taken from the systemd test suite):
  
  $ cat > /etc/systemd/system/exec-set-credential.service << EOF
  # SPDX-License-Identifier: LGPL-2.1-or-later
  [Unit]
  Description=Test for SetCredential=
  
  [Service]
  ExecStart=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  ExecStartPost=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  ExecStop=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  ExecStopPost=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  Type=oneshot
  SetCredential=test-execute.set-credential:hoge
  EOF
  $ systemctl daemon-reload
  $ systemctl start exec-set-credential.service
  Job for exec-set-credential.service failed because the control process exited 
with error code.
  See "systemctl status exec-set-credential.service" and "journalctl -xeu 
exec-set-credential.service" for details.
  
  With debug logs enabled, we see:
  
  $ journalctl -u exec-set-credential.service -b --no-pager
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Trying to 
enqueue job exec-set-credential.service/start/replace
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Installed new 
job exec-set-credential.service/start as 2740
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Enqueued job 
exec-set-credential.service/start as 2740
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Will spawn 
child (service_enter_start): /bin/sh
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed to set 
'trusted.invocation_id' xattr on control group 
/system.slice/exec-set-credential.service, ignoring: Operation not permitted
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed to 
remove 'trusted.delegate' xattr flag on control group 
/system.slice/exec-set-credential.service, ignoring: Operation not permitted
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed to 
remove 'trusted.survive_final_kill_signal' xattr flag on control group 
/system.slice/exec-set-credential.service, ignoring: Operation not permitted
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Passing 0 fds 
to service
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: About to 
execute: /bin/sh -x -c "test \"1031(cat 
/run/credentials/exec-set-credential.service/test-execute.set-credential)\" = 
\"hoge\""
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Forked /bin/sh 
as 2183
  Dec 14 19:24:24 noble (sh)[2183]: PR_SET_MM_ARG_START failed: Operation not 
permitted
  Dec 14 19:24:24 noble (sh)[2183]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble (sh)[2183]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Changed dead 
-> start
  Dec 14 19:24:24 noble systemd[1]: Starting exec-set-credential.service - Test 
for SetCredential=...
  Dec 14 19:24:24 noble (sh)[2183]: Successfully forked off '(sd-mkdcreds)' as 
PID 2184.
  Dec 14 19:24:24 noble (sd-[2184]: Changing mount propagation /dev 
(MS_REC|MS_SLAVE "")
  Dec 14 19:24:24 noble (sd-[2184]: Mounting ramfs (ramfs) on /dev/shm 
(MS_NOSUID|MS_NODEV|MS_NOEXEC|MS_NOSYMFOLLOW "mode=0700")...
  Dec 14 19:24:24 noble (sd-[2184]: Changing mount flags /dev/shm 
(MS_RDONLY|MS_NOSUID|MS_NODEV|MS_NOEXEC|MS_REMOUNT|MS_NOSYMFOLLOW|MS_BIND "")...
  Dec 14 19:24:24 noble (sd-[2184]: Failed to mount n/a (type n/a) on /dev/shm 
(MS_RDONLY|MS_NOSUID|MS_NODEV|MS_NOEXEC|MS_REMOUNT|MS_NOSYMFOLLOW|MS_BIND ""): 
Permission denied
  Dec 14 19:24:24 noble (sh)[2183]: (sd-mkdcreds) failed with exit status 1.
  Dec 14 19:24:24 noble (sh)[2183]: exec-set-credential.service: Failed to set 
up credentials: Protocol error
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Child 2183 
belongs to exec-set-credential.service.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Main process 
exited, code=exited, status=243/CREDENTIALS
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Will spawn 
child (service_enter_stop_post): /bin/sh
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: About to 
execute: /bin/sh -x -c "test \"1031(cat 
/run/credentials/exec-set-credential.service/test-execute.set-credential)\" = 
\"hoge\""
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Forked /bin/sh 
as 2186
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Changed start 
-> stop-post
  Dec 14 19:24:24 noble (sh)[2186]: PR_SET_MM_ARG_START failed: Operation not 
permitted
  Dec 14 19:24:24 noble (sh)[2186]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble (sh)[2186]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble sh[2186]: + test 1031(cat 
/run/credentials/exec-set-credential.service/test-execute.set-credential) = hoge
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Child 2186 
belongs to exec-set-credential.service.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Control 
process exited, code=exited, status=1/FAILURE
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Got final 
SIGCHLD for state stop-post.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed with 
result 'exit-code'.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Service will 
not restart (restart setting)
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Changed 
stop-post -> failed
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Job 2740 
exec-set-credential.service/start finished, result=failed
  Dec 14 19:24:24 noble systemd[1]: Failed to start exec-set-credential.service 
- Test for SetCredential=.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Unit entered 
failed state.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Consumed 23ms 
CPU time.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Releasing 
resources...

** Description changed:

  Many units shipped by systemd use credentials in some way by default now
  (in v256). So this issue is now about much more than the original test
  case failure.
  
  For example,
  
  root@oracular:~# apt policy systemd
  systemd:
-   Installed: 256-1ubuntu1
-   Candidate: 256-1ubuntu1
-   Version table:
-  *** 256-1ubuntu1 100
-         100 http://archive.ubuntu.com/ubuntu oracular-proposed/main amd64 
Packages
-         100 /var/lib/dpkg/status
-      255.4-1ubuntu8 500
-         500 http://archive.ubuntu.com/ubuntu oracular/main amd64 Packages
+   Installed: 256-1ubuntu1
+   Candidate: 256-1ubuntu1
+   Version table:
+  *** 256-1ubuntu1 100
+         100 http://archive.ubuntu.com/ubuntu oracular-proposed/main amd64 
Packages
+         100 /var/lib/dpkg/status
+      255.4-1ubuntu8 500
+         500 http://archive.ubuntu.com/ubuntu oracular/main amd64 Packages
  root@oracular:~# for service in $(find /usr/lib/systemd/system -maxdepth 1 
-name "systemd-*.service"); do grep -q "Credential.*=" "$service" && echo 
"$service"; done
  /usr/lib/systemd/system/systemd-sysusers.service
  /usr/lib/systemd/system/systemd-resolved.service
  /usr/lib/systemd/system/systemd-firstboot.service
  /usr/lib/systemd/system/systemd-network-generator.service
  /usr/lib/systemd/system/systemd-journald.service
  /usr/lib/systemd/system/systemd-sysctl.service
  /usr/lib/systemd/system/systemd-tmpfiles-setup-dev-early.service
  /usr/lib/systemd/system/systemd-tmpfiles-setup-dev.service
  /usr/lib/systemd/system/systemd-tmpfiles-setup.service
  /usr/lib/systemd/system/systemd-udev-load-credentials.service
  /usr/lib/systemd/system/systemd-tmpfiles-clean.service
  /usr/lib/systemd/system/systemd-networkd.service
+ 
+ root@oracular:~# systemctl status systemd-sysusers.service 
systemd-resolved.service systemd-firstboot.service 
systemd-network-generator.service systemd-journald.service 
systemd-sysctl.service systemd-tmpfiles-setup-dev-early.service 
systemd-tmpfiles-setup-dev.service systemd-tmpfiles-setup.service 
systemd-udev-load-credentials.service systemd-tmpfiles-clean.service 
systemd-networkd.service
+ ○ systemd-sysusers.service - Create System Users
+      Loaded: loaded (/usr/lib/systemd/system/systemd-sysusers.service; static)
+      Active: inactive (dead)
+   Condition: start condition unmet at Mon 2024-06-24 18:58:48 UTC; 1min 0s ago
+              ├─ ConditionNeedsUpdate=|/etc was not met
+              └─ ConditionCredential=|sysusers.extra was not met
+        Docs: man:sysusers.d(5)
+              man:systemd-sysusers.service(8)
+ 
+ × systemd-resolved.service - Network Name Resolution
+      Loaded: loaded (/usr/lib/systemd/system/systemd-resolved.service; 
enabled; preset: enabled)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:49 UTC; 
59s ago
+  Invocation: b1aaa662750f48868fe3388e4524c462
+        Docs: man:systemd-resolved.service(8)
+              man:org.freedesktop.resolve1(5)
+              https://systemd.io/WRITING_NETWORK_CONFIGURATION_MANAGERS
+              https://systemd.io/WRITING_RESOLVER_CLIENTS
+     Process: 258 ExecStart=/usr/lib/systemd/systemd-resolved (code=exited, 
status=243/CREDENTIALS)
+    Main PID: 258 (code=exited, status=243/CREDENTIALS)
+ 
+ ○ systemd-firstboot.service - First Boot Wizard
+      Loaded: loaded (/usr/lib/systemd/system/systemd-firstboot.service; 
static)
+      Active: inactive (dead)
+   Condition: start condition unmet at Mon 2024-06-24 18:58:48 UTC; 59s ago
+              └─ ConditionFirstBoot=yes was not met
+        Docs: man:systemd-firstboot(1)
+ 
+ ○ systemd-network-generator.service - Generate network units from Kernel 
command line
+      Loaded: loaded 
(/usr/lib/systemd/system/systemd-network-generator.service; disabled; preset: 
enabled)
+      Active: inactive (dead)
+        Docs: man:systemd-network-generator.service(8)
+ 
+ × systemd-journald.service - Journal Service
+      Loaded: loaded (/usr/lib/systemd/system/systemd-journald.service; static)
+     Drop-In: /usr/lib/systemd/system/systemd-journald.service.d
+              └─nice.conf
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:48 UTC; 
1min 0s ago
+  Invocation: 7caace7a15c749f3a86fb15fcfb94dff
+ TriggeredBy: × systemd-journald-dev-log.socket
+              × systemd-journald.socket
+              ○ systemd-journald-audit.socket
+        Docs: man:systemd-journald.service(8)
+              man:journald.conf(5)
+     Process: 124 ExecStart=/usr/lib/systemd/systemd-journald (code=exited, 
status=243/CREDENTIALS)
+    Main PID: 124 (code=exited, status=243/CREDENTIALS)
+    FD Store: 0 (limit: 4224)
+ 
+ × systemd-sysctl.service - Apply Kernel Variables
+      Loaded: loaded (/usr/lib/systemd/system/systemd-sysctl.service; static)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:48 UTC; 
1min 0s ago
+  Invocation: 5e90310a27b043ceae80c96e35c41451
+        Docs: man:systemd-sysctl.service(8)
+              man:sysctl.d(5)
+     Process: 97 ExecStart=/usr/lib/systemd/systemd-sysctl (code=exited, 
status=243/CREDENTIALS)
+    Main PID: 97 (code=exited, status=243/CREDENTIALS)
+ 
+ × systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in 
/dev gracefully
+      Loaded: loaded 
(/usr/lib/systemd/system/systemd-tmpfiles-setup-dev-early.service; static)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:48 UTC; 
1min 0s ago
+  Invocation: 78e3c68cfa9a4a7982950b08c0f1385f
+        Docs: man:tmpfiles.d(5)
+              man:systemd-tmpfiles(8)
+     Process: 73 ExecStart=systemd-tmpfiles --prefix=/dev --create --boot 
--graceful (code=exited, status=243/CREDENTIALS)
+    Main PID: 73 (code=exited, status=243/CREDENTIALS)
+ 
+ × systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev
+      Loaded: loaded 
(/usr/lib/systemd/system/systemd-tmpfiles-setup-dev.service; static)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:48 UTC; 
1min 0s ago
+  Invocation: 46458c7b6e134ef8be299900db7cc288
+        Docs: man:tmpfiles.d(5)
+              man:systemd-tmpfiles(8)
+     Process: 98 ExecStart=systemd-tmpfiles --prefix=/dev --create --boot 
(code=exited, status=243/CREDENTIALS)
+    Main PID: 98 (code=exited, status=243/CREDENTIALS)
+ 
+ × systemd-tmpfiles-setup.service - Create Volatile Files and Directories
+      Loaded: loaded (/usr/lib/systemd/system/systemd-tmpfiles-setup.service; 
static)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:48 UTC; 
1min 0s ago
+  Invocation: f4e64afdc8774170a9b29b8cf2919f46
+        Docs: man:tmpfiles.d(5)
+              man:systemd-tmpfiles(8)
+     Process: 147 ExecStart=systemd-tmpfiles --create --remove --boot 
--exclude-prefix=/dev (code=exited, status=243/CREDENTIALS)
+    Main PID: 147 (code=exited, status=243/CREDENTIALS)
+ 
+ × systemd-udev-load-credentials.service - Load udev Rules from Credentials
+      Loaded: loaded 
(/usr/lib/systemd/system/systemd-udev-load-credentials.service; disabled; 
preset: enabled)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:48 UTC; 
1min 0s ago
+  Invocation: cb5a1f43cde248de80fcf701b4b5d381
+        Docs: man:udevadm(8)
+              man:udev(7)
+              man:systemd.system-credentials(7)
+     Process: 75 ExecStart=udevadm control --load-credentials (code=exited, 
status=243/CREDENTIALS)
+    Main PID: 75 (code=exited, status=243/CREDENTIALS)
+ 
+ ○ systemd-tmpfiles-clean.service - Cleanup of Temporary Directories
+      Loaded: loaded (/usr/lib/systemd/system/systemd-tmpfiles-clean.service; 
static)
+      Active: inactive (dead)
+ TriggeredBy: ● systemd-tmpfiles-clean.timer
+        Docs: man:tmpfiles.d(5)
+              man:systemd-tmpfiles(8)
+ 
+ × systemd-networkd.service - Network Configuration
+      Loaded: loaded (/usr/lib/systemd/system/systemd-networkd.service; 
enabled; preset: enabled)
+      Active: failed (Result: exit-code) since Mon 2024-06-24 18:58:49 UTC; 
59s ago
+  Invocation: 5d960369ea944d5cbac4382e42ded1d0
+ TriggeredBy: × systemd-networkd.socket
+        Docs: man:systemd-networkd.service(8)
+              man:org.freedesktop.network1(5)
+     Process: 280 ExecStart=/usr/lib/systemd/systemd-networkd (code=exited, 
status=243/CREDENTIALS)
+    Main PID: 280 (code=exited, status=243/CREDENTIALS)
+    FD Store: 0 (limit: 512)
  
  
  [Original Description]
  
  To demonstrate this, in an unprivileged LXD container, create the
  following unit (taken from the systemd test suite):
  
  $ cat > /etc/systemd/system/exec-set-credential.service << EOF
  # SPDX-License-Identifier: LGPL-2.1-or-later
  [Unit]
  Description=Test for SetCredential=
  
  [Service]
  ExecStart=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  ExecStartPost=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  ExecStop=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  ExecStopPost=/bin/sh -x -c 'test "$$(cat %d/test-execute.set-credential)" = 
"hoge"'
  Type=oneshot
  SetCredential=test-execute.set-credential:hoge
  EOF
  $ systemctl daemon-reload
  $ systemctl start exec-set-credential.service
  Job for exec-set-credential.service failed because the control process exited 
with error code.
  See "systemctl status exec-set-credential.service" and "journalctl -xeu 
exec-set-credential.service" for details.
  
  With debug logs enabled, we see:
  
  $ journalctl -u exec-set-credential.service -b --no-pager
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Trying to 
enqueue job exec-set-credential.service/start/replace
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Installed new 
job exec-set-credential.service/start as 2740
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Enqueued job 
exec-set-credential.service/start as 2740
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Will spawn 
child (service_enter_start): /bin/sh
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed to set 
'trusted.invocation_id' xattr on control group 
/system.slice/exec-set-credential.service, ignoring: Operation not permitted
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed to 
remove 'trusted.delegate' xattr flag on control group 
/system.slice/exec-set-credential.service, ignoring: Operation not permitted
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed to 
remove 'trusted.survive_final_kill_signal' xattr flag on control group 
/system.slice/exec-set-credential.service, ignoring: Operation not permitted
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Passing 0 fds 
to service
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: About to 
execute: /bin/sh -x -c "test \"1031(cat 
/run/credentials/exec-set-credential.service/test-execute.set-credential)\" = 
\"hoge\""
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Forked /bin/sh 
as 2183
  Dec 14 19:24:24 noble (sh)[2183]: PR_SET_MM_ARG_START failed: Operation not 
permitted
  Dec 14 19:24:24 noble (sh)[2183]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble (sh)[2183]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Changed dead 
-> start
  Dec 14 19:24:24 noble systemd[1]: Starting exec-set-credential.service - Test 
for SetCredential=...
  Dec 14 19:24:24 noble (sh)[2183]: Successfully forked off '(sd-mkdcreds)' as 
PID 2184.
  Dec 14 19:24:24 noble (sd-[2184]: Changing mount propagation /dev 
(MS_REC|MS_SLAVE "")
  Dec 14 19:24:24 noble (sd-[2184]: Mounting ramfs (ramfs) on /dev/shm 
(MS_NOSUID|MS_NODEV|MS_NOEXEC|MS_NOSYMFOLLOW "mode=0700")...
  Dec 14 19:24:24 noble (sd-[2184]: Changing mount flags /dev/shm 
(MS_RDONLY|MS_NOSUID|MS_NODEV|MS_NOEXEC|MS_REMOUNT|MS_NOSYMFOLLOW|MS_BIND "")...
  Dec 14 19:24:24 noble (sd-[2184]: Failed to mount n/a (type n/a) on /dev/shm 
(MS_RDONLY|MS_NOSUID|MS_NODEV|MS_NOEXEC|MS_REMOUNT|MS_NOSYMFOLLOW|MS_BIND ""): 
Permission denied
  Dec 14 19:24:24 noble (sh)[2183]: (sd-mkdcreds) failed with exit status 1.
  Dec 14 19:24:24 noble (sh)[2183]: exec-set-credential.service: Failed to set 
up credentials: Protocol error
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Child 2183 
belongs to exec-set-credential.service.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Main process 
exited, code=exited, status=243/CREDENTIALS
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Will spawn 
child (service_enter_stop_post): /bin/sh
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: About to 
execute: /bin/sh -x -c "test \"1031(cat 
/run/credentials/exec-set-credential.service/test-execute.set-credential)\" = 
\"hoge\""
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Forked /bin/sh 
as 2186
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Changed start 
-> stop-post
  Dec 14 19:24:24 noble (sh)[2186]: PR_SET_MM_ARG_START failed: Operation not 
permitted
  Dec 14 19:24:24 noble (sh)[2186]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble (sh)[2186]: Found cgroup2 on /sys/fs/cgroup/, full 
unified hierarchy
  Dec 14 19:24:24 noble sh[2186]: + test 1031(cat 
/run/credentials/exec-set-credential.service/test-execute.set-credential) = hoge
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Child 2186 
belongs to exec-set-credential.service.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Control 
process exited, code=exited, status=1/FAILURE
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Got final 
SIGCHLD for state stop-post.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Failed with 
result 'exit-code'.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Service will 
not restart (restart setting)
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Changed 
stop-post -> failed
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Job 2740 
exec-set-credential.service/start finished, result=failed
  Dec 14 19:24:24 noble systemd[1]: Failed to start exec-set-credential.service 
- Test for SetCredential=.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Unit entered 
failed state.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Consumed 23ms 
CPU time.
  Dec 14 19:24:24 noble systemd[1]: exec-set-credential.service: Releasing 
resources...

** Also affects: systemd via
   https://github.com/canonical/lxd/issues/13631
   Importance: Unknown
       Status: Unknown

** No longer affects: systemd

** Also affects: lxd (Ubuntu)
   Importance: Undecided
       Status: New

** Also affects: lxd via
   https://github.com/canonical/lxd/issues/13631
   Importance: Unknown
       Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2046486

Title:
  units with credentials fail in LXD containers

To manage notifications about this bug go to:
https://bugs.launchpad.net/lxd/+bug/2046486/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to