-
Notifications
You must be signed in to change notification settings - Fork 246
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The mount attribute "userxattr" is added also for older kernels #863
Comments
@giuseppe PTAL |
I think this belongs to containers/storage. |
Yes, I think it was mentioned in #816 that this would break Ubuntu kernels |
Ubuntu kernels are not supported. It is not possible to create directly whiteout files and that breaks our tools. So it might have worked to some extend in the past, but it would break as soon as an image has a whiteout file |
could you check if the following patch fix the check and you don't need a custom config file? diff --git a/drivers/overlay/overlay.go b/drivers/overlay/overlay.go
index 254fd5fab..23c5d5064 100644
--- a/drivers/overlay/overlay.go
+++ b/drivers/overlay/overlay.go
@@ -539,6 +539,9 @@ func supportsOverlay(home string, homeMagic graphdriver.FsMagic, rootUID, rootGI
_ = idtools.MkdirAs(upperDir, 0700, rootUID, rootGID)
_ = idtools.MkdirAs(workDir, 0700, rootUID, rootGID)
flags := fmt.Sprintf("lowerdir=%s:%s,upperdir=%s,workdir=%s", lower1Dir, lower2Dir, upperDir, workDir)
+ if unshare.IsRootless() {
+ flags = fmt.Sprintf("%s,userxattr", flags)
+ }
if len(flags) < unix.Getpagesize() {
err := unix.Mount("overlay", mergedDir, "overlay", 0, flags)
if err == nil { |
Can't reproduce with v3.1, with or without the patch. Did something else change ? |
I think it could be cf4c912 |
Indeed it was, Now it gets mount_program |
So can we close this issue? |
yes let's close if it works also on Ubuntu |
It might have been an "upgrade problem" or somesuch, but user giving the mount_program explicitly would work in that case... The main message is that native rootless mounts doesn't work with those kernels, and it seems like new installs now know this. |
Is this a BUG REPORT or FEATURE REQUEST? (leave only one on its own line)
/kind bug
Description
Podman doesn't work, without a custom storage.conf to avoid automatic mount attributes
Since 6cb8896
Steps to reproduce the issue:
podman run -it fedora
Describe the results you received:
Describe the results you expected:
Additional information you deem important (e.g. issue happens only occasionally):
Linux 5.4
Output of
podman version
:Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide?
Yes
Additional environment details (AWS, VirtualBox, physical, etc.):
Ubuntu 20.04
The text was updated successfully, but these errors were encountered: