Bug 844997
Summary: | bind mounted targets can not be removed after unmounting them | ||
---|---|---|---|
Product: | [Retired] oVirt | Reporter: | Fabian Deutsch <fdeutsch> |
Component: | ovirt-node | Assignee: | Mike Burns <mburns> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | unspecified | CC: | acathrow, dwalsh, dyasny, jboggs, lpoetter, mburns, mgoldboi, ovirt-bugs, ovirt-maint, systemd-maint |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | 2.6.0 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-02-13 13:38:07 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Fabian Deutsch
2012-08-01 12:33:05 UTC
Daniel, I'm adding your because you were driving this effort in F17. Have you got an idea why this problem appears or do you need more informations? If you run mount -rshared / Before mounting and starting ntpd does the problem go away? (In reply to comment #2) > If you run > > mount -rshared / > > Before mounting and starting ntpd does the problem go away? Yes, that solved it. Could you explain the problem and the solution? This says that All namespaces will share any mounts/unmounts that happen to the parent namespace on the / directory. I believe this should be the default. But as of right now it is not. Hi Dan, Is there an fstab option we can set to make that the default? I can't find any documentation on how to set that in any way other than with the --make-rshared mount option. thanks No, we have a bug report on this but it has been rejected. You either need an init script/unit file or we need to convince systemd to do this automatically. I wonder why systemd is not mounting / appropriately if they offer the PrivateTmp feature. Or is our use case a corner case? OK, we'll add this command to our early init script. Hmm, so in the long run we really should have the namespace inheritance options a mount option like any other, so that people can list them in fstab. However, I still believe that the default (which should apply when you have no fstab or no line for / in it) should be shared. Since the kernel default is private (and probably shouldnb't be changed) I think I'll just make systemd remount / shared unconditionally. That means that everybody who wants private mounts needs to either a) wait for the kernel to be fixed to accept the namespace inheritance options like any other options, b) write a little service on their own that does mount --make-private / to undo what systemd did. I agree the default should be shared and anyone needing private, should take care of that on their own. systemd in git will now mount the root file system "shared". This will soon enter Rawhide. patch for ovirt-node until this gets into fedora: http://gerrit.ovirt.org/#/c/6936/ This bug has been fixed in the 2.6.0 release of ovirt-node, which is now available on both ovirt.org and in Fedora 18 |