[Bug 1846367] Re: udev /dev/null incorrect permissions after package auto upgrades
Dan Streetman
1846367 at bugs.launchpad.net
Wed Jun 30 22:34:33 UTC 2021
please reopen if this is still an issue
** Changed in: systemd (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1846367
Title:
udev /dev/null incorrect permissions after package auto upgrades
Status in systemd package in Ubuntu:
Invalid
Bug description:
I've been attempting to determine root cause of this problem for
months.
Symptom is group/other permissions being dropped from all /dev/*
files.
This only occurs on some machines, so some machine udev updates work,
some machines quietly fail.
Looks like the problem relates to...
1) APT /etc/apt/apt.conf.d/10periodic APT::Periodic::Update-Package-
Lists == 1, which triggers auto upgrades for critical packages.
2) This triggers the udev package run as an unattended/automatic
upgrade.
3) When udev package updates, /var/log/dpkg.log shows no errors.
4) /dev/* files have group/other permissions stripped.
5) LXD containers become unstable, as containers /dev points to
machine /dev.
Temp fix is change /etc/apt/apt.conf.d/10periodic - APT::Periodic
::Update-Package-Lists == 0 to disable all unattended upgrades.
Someone let me know where I can find APT/DPKG logs detailing exactly
what post install hook scripts run for udev, so I can look for errors.
Or if log verbosity has to be increased for this level of logging, let
me know how to increase verbosity, so next time udev updates, I can
provide logging detail sufficient to generate a fix for this problem.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1846367/+subscriptions
More information about the foundations-bugs
mailing list