Your message dated Sun, 29 May 2022 12:51:42 +0200 with message-id <1653821275@msgid.manchmal.in-ulm.de> and subject line Re: Bug#993957: (no subject) has caused the Debian Bug report #993957, regarding schroot: fails with non-existent subdirectory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 993957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993957 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- From: lkcl <lkcl@lkcl.net>
- Date: Wed, 08 Sep 2021 16:58:27 +0100
- Message-id: <163111670743.2781.1432040871731215799.reportbug@localhost>
Package: schroot Version: 1.6.10-12 Severity: important schroot 1.6.10 (04 May 2014) fails with a continuous attempt to read a non-existent subdirectory, /run/systemd/userdb, when operating a type "directory" schroot. a type "plain" does not have this same issue. creating the missing subdirectory manually "allows" the schroot to "proceed" without errors. please - do not summarily dismiss this bugreport "just because systemd is not installed". it is a *CHROOT*. it is *INAPPROPRIATE* to install systemd or expect systemd to be a critical dependency within a MINIMALIST chroot. -- System Information: (REMOVED DUE TO NOT BEING ON THE TARGET SYSTEM) Kernel: Linux 5.6.0-1-amd64 (SMP w/16 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- no debconf information openat(AT_FDCWD, "/run/systemd/userdb/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = -1 ENOENT (No such file or directory) openat(AT_FDCWD, "/run/systemd/userdb/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = -1 ENOENT (No such file or directory) rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 mmap(NULL, 34359742464, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f6239d9f000 munmap(0x7f6a39da0000, 17179873280) = 0 openat(AT_FDCWD, "/etc/group", O_RDONLY|O_CLOEXEC) = 5 lseek(5, 0, SEEK_CUR) = 0 fstat(5, {st_mode=S_IFREG|0644, st_size=660, ...}) = 0 read(5, "root:x:0:\ndaemon:x:1:\nbin:x:2:\ns"..., 4096) = 660 lseek(5, 0, SEEK_CUR) = 660 read(5, "", 4096) = 0 close(5) = 0 rt_sigprocmask(SIG_BLOCK, [HUP USR1 USR2 PIPE ALRM CHLD TSTP URG VTALRM PROF WINCH IO], [], 8) = 0 openat(AT_FDCWD, "/run/systemd/userdb/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = -1 ENOENT (No such file or directory) openat(AT_FDCWD, "/run/systemd/userdb/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = -1 ENOENT (No such file or directory) rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 mmap(NULL, 68719480832, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f5239d9e000 munmap(0x7f6239d9f000, 34359742464) = 0 openat(AT_FDCWD, "/etc/group", O_RDONLY|O_CLOEXEC) = 5 lseek(5, 0, SEEK_CUR) = 0 fstat(5, {st_mode=S_IFREG|0644, st_size=660, ...}) = 0 read(5, "root:x:0:\ndaemon:x:1:\nbin:x:2:\ns"..., 4096) = 660 lseek(5, 0, SEEK_CUR) = 660 read(5, "", 4096) = 0 close(5) = 0 rt_sigprocmask(SIG_BLOCK, [HUP USR1 USR2 PIPE ALRM CHLD TSTP URG VTALRM PROF WINCH IO], [], 8) = 0 openat(AT_FDCWD, "/run/systemd/userdb/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = -1 ENOENT (No such file or directory) openat(AT_FDCWD, "/run/systemd/userdb/", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = -1 ENOENT (No such file or directory) rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 mmap(NULL, 137438957568, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = -1 ENOMEM (Cannot allocate memory) brk(0x564c49ed1000) = 0x562c49ed1000 mmap(NULL, 137439088640, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = -1 ENOMEM (Cannot allocate memory) futex(0x7f723a5af1a0, FUTEX_WAKE_PRIVATE, 2147483647) = 0 munmap(0x7f5239d9e000, 68719480832) = 0 write(2, "E: ", 3) = 3 write(2, "std::bad_alloc", 14) = 14 write(2, "\n", 1) = 1 close(4) = 0 close(3) = 0 exit_group(1) = ? +++ exited with 1 +++
--- End Message ---
--- Begin Message ---
- To: lkcl <luke.leighton@gmail.com>
- Cc: 993957-done@bugs.debian.org
- Subject: Re: Bug#993957: (no subject)
- From: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
- Date: Sun, 29 May 2022 12:51:42 +0200
- Message-id: <1653821275@msgid.manchmal.in-ulm.de>
- In-reply-to: <[🔎] B77FF375-8147-4A79-928D-037A215B32B2@gmail.com>
- References: <163111670743.2781.1432040871731215799.reportbug@localhost> <[🔎] 1653752251@msgid.manchmal.in-ulm.de> <[🔎] B77FF375-8147-4A79-928D-037A215B32B2@gmail.com>
Control: tag 993957 unreproducible wontfix lkcl wrote... > (translation: i was not running systemd. sysvinit is still a > supported option in debian, apt-get install sysvinit, and it is > available via a grub boot menu option) No doubt about that, but my time is too precious for advocacy. And since I can neither understand nor reproduce the issue, there's nothing left to do here. ChristophAttachment: signature.asc
Description: PGP signature
--- End Message ---