To follow up on Geist's comments, I've seen it break RPATH as well.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
This OverlayFS bug is more importance that all of you noticed. It does
also break the RPATH library location mechanism and so many software
products like: LibreOffice and Java (jre-openjdk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Package changed: linux (Ubuntu) = linux-lowlatency (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To
** Tags added: overlayfs
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To manage notifications about this bug go
1079350 warzone2100
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To manage notifications about this bug go to:
Bug number 1079350
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To manage notifications about this bug go to:
This is not an issue in Wheezy with aufs.
purgatory:~# find /proc/self/exe -ls
8973200 lrwxrwxrwx 1 root root0 Sep 18 16:57
/proc/self/exe - /usr/bin/find
purgatory:~# grep usr /proc/mounts
/dev/mapper/nyso-usrext /run/shm/26975/usr ext4
Serge,
Applications should not be making use of /proc, so any bug related to an
application reading /proc and implicitly trusting it's contents is a separate
bug. However correcting inaccuracy in /proc is worthy of a bug report.
/sys is the file system for applications to be using as a
Seems to go along with (but perhaps not be a dup of) bug 959352.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To
This issue is responsible for:
Bug number 1027510 /usr/lib/jvm VS /lib/jvm under overlayfs.
Bug number 1030519 perlvar: EXECUTABLE_NAME or ^X broken under overlayfs.
Bug number 1030520 logwatch: Makes use of $^X, broken under overlayfs.
Bug number 1030530 start-stop-daemon: --exec option broken
I removed the bug watch on
https://bugzilla.mozilla.org/show_bug.cgi?id=763192 because this
originally was a pulseaudio bug. It would be prudent to open another
bug for Mozilla to track the fix for that package.
I'm also contemplating opening a new bug for the kernel aspect of this
bug, though
https://bugs.launchpad.net/ubuntu/+source/openjdk-7/+bug/1027510
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To
What is the status of this bug? Has the OverlayFS team been made aware
of the issue? Why can't the Importance be higher?
This seams to effect a number of packages, albeit these packages are
broken in there use of sefl/exe.
Is any one even reading these?
--
You received this bug notification
Yeah, its red for me,
lrwxrwxrwx 1 root root 0 Jun 11 10:27 /proc/21357/exe - /bin/tail
john@joran ~ uname -a
Linux joran.nextraweb.com 3.2.0-25-generic #40-Ubuntu SMP Wed May 23 20:30:51
UTC 2012 x86_64 x86_64 x86_64 GNU/Linux
--
You received this bug notification because you are a member
Mike, we are using /proc/self/exe to substitute the executable with a
newer version. We can stop using it, but it was the most secure way to
get the path for the executable (see https://mxr.mozilla.org/mozilla-
central/source/xpcom/build/BinaryPath.h#83 for the other opportunity).
--
You
I forgot ^/opt and the like.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To manage notifications about this bug
That's interesting. For self updating applications, well first of all
applications should not have access to modify there own source. Leaving
that aside as it's obviously working for you and your users are
presumably aware of the security risks.
Then I have to point out that the code you linked
Ohh, one added point is that you are only looking for overlayfs mounts:
lnk=$(readlink /proc/$(pgrep firefox)/exe); for ech in $(cut -f2,3 -d\
/proc/mounts | grep ' overlayfs$' | cut -f1 -d\ ); do [ -f $ech$lnk ] echo
$ech$lnk; done
/usr/lib/firefox/firefox
--
You received this bug
Came here while looking for a reason for an unlink failing in
https://bugzilla.mozilla.org/show_bug.cgi?id=763192
If so, its rather more important than medium, autoupdating software potentially
has the power to break itself
** Bug watch added: Mozilla Bugzilla #763192
John,
If so then the bug 763192 would be that it uses /proc/self/exe. Usage of the
exe link should be limited to checking to see if this PID is a running instance
of a daemon. I'm not sure I've ever seen another good use for the exe link,
but I can tell at a glace that 763192 isn't it.
In
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.5kernel[0] (Not a kernel in the daily directory) and install both the
linux-image and linux-image-extra .deb packages.
Once you've tested the
Joseph,
Any one running any kernel can test for this bug. Let me write a short shell
script that will do just that. I've tested this script on my box and it
revealed the bug.
(
set -e
mkdir -p /mnt/test /tmp/usr
mount none /mnt/test -t overlayfs -o lowerdir=/usr,upperdir=/tmp/usr
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1007089
Title:
overlayfs alters /proc/self/exe link(s), making result a dead link.
To manage notifications about this bug go to:
apport information
** Tags added: apport-collected staging
** Description changed:
I've had this issue with other Ubuntu kernels.
Problem A:
This is not so much a bug in PulseAudio, but it is effected by this bug.
arcadia:~# invoke-rc.d pulseaudio start * Starting system PulseAudio
Ohh, my. Yeah, it looks like PA is not starting for another reason.
Though this still looks like a bug in overlayfs that's causing a warning
from PA.
I have too many warnings on boot, that much is clear.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
apport information
** Description changed:
I've had this issue with other Ubuntu kernels.
Problem A:
This is not so much a bug in PulseAudio, but it is effected by this bug.
arcadia:~# invoke-rc.d pulseaudio start * Starting system PulseAudio Daemon
I've made changes to /etc/asound.conf and now PulseAudio is starting and
working. However I still get this warning:
arcadia:~# invoke-rc.d pulseaudio restart
* Stopping system PulseAudio Daemon[ OK ]
* Starting system PulseAudio Daemon
28 matches
Mail list logo