Closed ntkme closed 3 years ago
is systemd available inside the container?
systemd
is running in the parent LXC container. systemd
(/sbin/init
) is also the start up command inside the child podman container. The same error happens if I switch to use just docker.io/library/alpine
.Did more tests, runc
works with either --cgroup-manager systemd
or --cgroup-manager cgroupfs
:
sudo podman --log-level DEBUG run --rm -it --privileged --runtime=runc --cgroup-manager systemd docker.io/library/alpine
sudo podman --log-level DEBUG run --rm -it --privileged --runtime=runc --cgroup-manager cgroupfs docker.io/library/alpine
crun
fails with either --cgroup-manager systemd
or --cgroup-manager cgroupfs
:
sudo podman --log-level DEBUG run --rm -it --privileged --runtime=/usr/local/bin/crun --cgroup-manager systemd docker.io/library/alpine
INFO[0000] podman filtering at log level debug DEBU[0000] Called run.PersistentPreRunE(podman --log-level DEBUG run --rm -it --privileged --runtime=/usr/local/bin/crun --cgroup-manager systemd docker.io/library/alpine) DEBU[0000] Reading configuration file "/usr/share/containers/containers.conf" DEBU[0000] Merged system config "/usr/share/containers/containers.conf": &{Containers:{Devices:[] Volumes:[] ApparmorProfile:containers-default-0.33.4 Annotations:[] CgroupNS:host Cgroups:enabled DefaultCapabilities:[CHOWN DAC_OVERRIDE FOWNER FSETID KILL NET_BIND_SERVICE SETFCAP SETGID SETPCAP SETUID SYS_CHROOT] DefaultSysctls:[net.ipv4.ping_group_range=0 0] DefaultUlimits:[] DefaultMountsFile: DNSServers:[] DNSOptions:[] DNSSearches:[] EnableKeyring:true EnableLabeling:false Env:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin TERM=xterm] EnvHost:false HTTPProxy:true Init:false InitPath: IPCNS:private LogDriver:k8s-file LogSizeMax:-1 NetNS:bridge NoHosts:false PidsLimit:2048 PidNS:private SeccompProfile:/usr/share/containers/seccomp.json ShmSize:65536k TZ: Umask:0022 UTSNS:private UserNS:host UserNSSize:65536} Engine:{ImageBuildFormat:oci CgroupCheck:false CgroupManager:systemd ConmonEnvVars:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin] ConmonPath:[/usr/libexec/podman/conmon /usr/local/libexec/podman/conmon /usr/local/lib/podman/conmon /usr/bin/conmon /usr/sbin/conmon /usr/local/bin/conmon /usr/local/sbin/conmon /run/current-system/sw/bin/conmon] DetachKeys:ctrl-p,ctrl-q EnablePortReservation:true Env:[] EventsLogFilePath:/run/libpod/events/events.log EventsLogger:journald HooksDir:[/usr/share/containers/oci/hooks.d] ImageDefaultTransport:docker:// InfraCommand: InfraImage:k8s.gcr.io/pause:3.2 InitPath:/usr/libexec/podman/catatonit LockType:shm MultiImageArchive:false Namespace: NetworkCmdPath: NetworkCmdOptions:[] NoPivotRoot:false NumLocks:2048 OCIRuntime:crun OCIRuntimes:map[crun:[/usr/bin/crun /usr/sbin/crun /usr/local/bin/crun /usr/local/sbin/crun /sbin/crun /bin/crun /run/current-system/sw/bin/crun] kata:[/usr/bin/kata-runtime /usr/sbin/kata-runtime /usr/local/bin/kata-runtime /usr/local/sbin/kata-runtime /sbin/kata-runtime /bin/kata-runtime /usr/bin/kata-qemu /usr/bin/kata-fc] runc:[/usr/bin/runc /usr/sbin/runc /usr/local/bin/runc /usr/local/sbin/runc /sbin/runc /bin/runc /usr/lib/cri-o-runc/sbin/runc /run/current-system/sw/bin/runc]] PullPolicy:missing Remote:false RemoteURI: RemoteIdentity: ActiveService: ServiceDestinations:map[] RuntimePath:[] RuntimeSupportsJSON:[crun runc] RuntimeSupportsNoCgroups:[crun] RuntimeSupportsKVM:[kata kata-runtime kata-qemu kata-fc] SetOptions:{StorageConfigRunRootSet:false StorageConfigGraphRootSet:false StorageConfigGraphDriverNameSet:false StaticDirSet:false VolumePathSet:false TmpDirSet:false} SignaturePolicyPath:/etc/containers/policy.json SDNotify:false StateType:3 StaticDir:/var/lib/containers/storage/libpod StopTimeout:10 TmpDir:/run/libpod VolumePath:/var/lib/containers/storage/volumes VolumePlugins:map[]} Network:{CNIPluginDirs:[/usr/libexec/cni /usr/lib/cni /usr/local/lib/cni /opt/cni/bin] DefaultNetwork:podman NetworkConfigDir:/etc/cni/net.d/}} DEBU[0000] Reading configuration file "/etc/containers/containers.conf" DEBU[0000] Merged system config "/etc/containers/containers.conf": &{Containers:{Devices:[] Volumes:[] ApparmorProfile:containers-default-0.33.4 Annotations:[] CgroupNS:host Cgroups:enabled DefaultCapabilities:[CHOWN DAC_OVERRIDE FOWNER FSETID KILL NET_BIND_SERVICE SETFCAP SETGID SETPCAP SETUID SYS_CHROOT] DefaultSysctls:[net.ipv4.ping_group_range=0 0] DefaultUlimits:[] DefaultMountsFile: DNSServers:[] DNSOptions:[] DNSSearches:[] EnableKeyring:false EnableLabeling:false Env:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin TERM=xterm] EnvHost:false HTTPProxy:true Init:false InitPath: IPCNS:private LogDriver:k8s-file LogSizeMax:-1 NetNS:bridge NoHosts:false PidsLimit:2048 PidNS:private SeccompProfile:/usr/share/containers/seccomp.json ShmSize:65536k TZ: Umask:0022 UTSNS:private UserNS:host UserNSSize:65536} Engine:{ImageBuildFormat:oci CgroupCheck:false CgroupManager:systemd ConmonEnvVars:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin] ConmonPath:[/usr/libexec/podman/conmon /usr/local/libexec/podman/conmon /usr/local/lib/podman/conmon /usr/bin/conmon /usr/sbin/conmon /usr/local/bin/conmon /usr/local/sbin/conmon /run/current-system/sw/bin/conmon] DetachKeys:ctrl-p,ctrl-q EnablePortReservation:true Env:[] EventsLogFilePath:/run/libpod/events/events.log EventsLogger:journald HooksDir:[/usr/share/containers/oci/hooks.d] ImageDefaultTransport:docker:// InfraCommand: InfraImage:k8s.gcr.io/pause:3.2 InitPath:/usr/libexec/podman/catatonit LockType:shm MultiImageArchive:false Namespace: NetworkCmdPath: NetworkCmdOptions:[] NoPivotRoot:false NumLocks:2048 OCIRuntime:runc OCIRuntimes:map[crun:[/usr/bin/crun /usr/sbin/crun /usr/local/bin/crun /usr/local/sbin/crun /sbin/crun /bin/crun /run/current-system/sw/bin/crun] kata:[/usr/bin/kata-runtime /usr/sbin/kata-runtime /usr/local/bin/kata-runtime /usr/local/sbin/kata-runtime /sbin/kata-runtime /bin/kata-runtime /usr/bin/kata-qemu /usr/bin/kata-fc] runc:[/usr/bin/runc /usr/sbin/runc /usr/local/bin/runc /usr/local/sbin/runc /sbin/runc /bin/runc /usr/lib/cri-o-runc/sbin/runc /run/current-system/sw/bin/runc]] PullPolicy:missing Remote:false RemoteURI: RemoteIdentity: ActiveService: ServiceDestinations:map[] RuntimePath:[] RuntimeSupportsJSON:[crun runc] RuntimeSupportsNoCgroups:[crun] RuntimeSupportsKVM:[kata kata-runtime kata-qemu kata-fc] SetOptions:{StorageConfigRunRootSet:false StorageConfigGraphRootSet:false StorageConfigGraphDriverNameSet:false StaticDirSet:false VolumePathSet:false TmpDirSet:false} SignaturePolicyPath:/etc/containers/policy.json SDNotify:false StateType:3 StaticDir:/var/lib/containers/storage/libpod StopTimeout:10 TmpDir:/run/libpod VolumePath:/var/lib/containers/storage/volumes VolumePlugins:map[]} Network:{CNIPluginDirs:[/usr/libexec/cni /usr/lib/cni /usr/local/lib/cni /opt/cni/bin] DefaultNetwork:podman NetworkConfigDir:/etc/cni/net.d/}} DEBU[0000] Using conmon: "/usr/bin/conmon" DEBU[0000] Initializing boltdb state at /var/lib/containers/storage/libpod/bolt_state.db DEBU[0000] Using graph driver DEBU[0000] Using graph root /var/lib/containers/storage DEBU[0000] Using run root /run/containers/storage DEBU[0000] Using static dir /var/lib/containers/storage/libpod DEBU[0000] Using tmp dir /run/libpod DEBU[0000] Using volume path /var/lib/containers/storage/volumes DEBU[0000] Set libpod namespace to "" INFO[0000] [graphdriver] using prior storage driver: btrfs DEBU[0000] Initializing event backend journald DEBU[0000] using runtime "/usr/bin/crun" DEBU[0000] using runtime "/usr/bin/runc" INFO[0000] Error initializing configured OCI runtime kata: no valid executable found for OCI runtime kata: invalid argument DEBU[0000] using runtime "/usr/local/bin/crun" INFO[0000] Found CNI network podman (type=ptp) at /etc/cni/net.d/87-podman-ptp.conflist DEBU[0000] Default CNI network name podman is unchangeable INFO[0000] Setting parallel job count to 25 DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]docker.io/library/alpine:latest" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]docker.io/library/alpine:latest" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]@6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] exporting opaque data as blob "sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]docker.io/library/alpine:latest" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]@6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] exporting opaque data as blob "sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] using systemd mode: false DEBU[0000] No hostname set; container's hostname will default to runtime default DEBU[0000] Loading default seccomp profile DEBU[0000] Allocated lock 0 for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]@6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] exporting opaque data as blob "sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] created container "7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8" DEBU[0000] container "7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8" has work directory "/var/lib/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata" DEBU[0000] container "7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8" has run directory "/run/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata" DEBU[0000] Handling terminal attach DEBU[0000] Made network namespace at /run/netns/cni-fe83ba9c-2274-ab28-7722-363c7b8edf72 for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] mounted container "7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8" at "/var/lib/containers/storage/btrfs/subvolumes/2a344a119fc233b0963ff55105ef469f7bc65aadffa337e95021d41a64cfeb81" DEBU[0000] Created root filesystem for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 at /var/lib/containers/storage/btrfs/subvolumes/2a344a119fc233b0963ff55105ef469f7bc65aadffa337e95021d41a64cfeb81 INFO[0000] Got pod network &{Name:dazzling_hermann Namespace:dazzling_hermann ID:7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 NetNS:/run/netns/cni-fe83ba9c-2274-ab28-7722-363c7b8edf72 Networks:[{Name:podman Ifname:eth0}] RuntimeConfig:map[podman:{IP: MAC: PortMappings:[] Bandwidth:IpRanges:[]}] Aliases:map[]} INFO[0000] About to add CNI network podman (type=ptp) DEBU[0000] [0] CNI result: &{0.4.0 [{Name:veth27f3acf4 Mac:7a:28:49:f9:c0:14 Sandbox:} {Name:eth0 Mac:d2:9b:c9:9e:0f:a7 Sandbox:/run/netns/cni-fe83ba9c-2274-ab28-7722-363c7b8edf72}] [{Version:4 Interface:0xc000130b38 Address:{IP:172.16.16.83 Mask:ffffff00} Gateway:172.16.16.1}] [{Dst:{IP:0.0.0.0 Mask:00000000} GW: }] {[] [] []}} DEBU[0000] Workdir "/" resolved to host path "/var/lib/containers/storage/btrfs/subvolumes/2a344a119fc233b0963ff55105ef469f7bc65aadffa337e95021d41a64cfeb81" DEBU[0000] /etc/system-fips does not exist on host, not mounting FIPS mode subscription DEBU[0000] Setting CGroups for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 to machine.slice:libpod:7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] reading hooks from /usr/share/containers/oci/hooks.d DEBU[0000] Created OCI spec for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 at /var/lib/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata/config.json DEBU[0000] /usr/bin/conmon messages will be logged to syslog DEBU[0000] running conmon: /usr/bin/conmon args="[--api-version 1 -c 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 -u 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 -r /usr/local/bin/crun -b /var/lib/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata -p /run/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata/pidfile -n dazzling_hermann --exit-dir /run/libpod/exits --socket-dir-path /run/libpod/socket -s -l k8s-file:/var/lib/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata/ctr.log --log-level debug --syslog -t --no-new-keyring --conmon-pidfile /run/containers/storage/btrfs-containers/7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8/userdata/conmon.pid --exit-command /usr/bin/podman --exit-command-arg --root --exit-command-arg /var/lib/containers/storage --exit-command-arg --runroot --exit-command-arg /run/containers/storage --exit-command-arg --log-level --exit-command-arg debug --exit-command-arg --cgroup-manager --exit-command-arg systemd --exit-command-arg --tmpdir --exit-command-arg /run/libpod --exit-command-arg --runtime --exit-command-arg /usr/local/bin/crun --exit-command-arg --events-backend --exit-command-arg journald --exit-command-arg --syslog --exit-command-arg container --exit-command-arg cleanup --exit-command-arg --rm --exit-command-arg 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8]" INFO[0000] Running conmon under slice machine.slice and unitName libpod-conmon-7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8.scope DEBU[0000] Received: -1 DEBU[0000] Cleaning up container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] Tearing down network namespace at /run/netns/cni-fe83ba9c-2274-ab28-7722-363c7b8edf72 for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 INFO[0000] Got pod network &{Name:dazzling_hermann Namespace:dazzling_hermann ID:7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 NetNS:/run/netns/cni-fe83ba9c-2274-ab28-7722-363c7b8edf72 Networks:[{Name:podman Ifname:}] RuntimeConfig:map[podman:{IP: MAC: PortMappings:[] Bandwidth: IpRanges:[]}] Aliases:map[]} INFO[0000] About to del CNI network podman (type=ptp) DEBU[0000] unmounted container "7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8" DEBU[0000] Removing container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] Removing all exec sessions for container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] Cleaning up container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 DEBU[0000] Network is already cleaned up, skipping... DEBU[0000] Container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 storage is already unmounted, skipping... DEBU[0000] Container 7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8 storage is already unmounted, skipping... DEBU[0000] ExitCode msg: "creating cgroup directory `/sys/fs/cgroup/machine.slice/libpod-7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8.scope`: no such file or directory: oci not found" Error: creating cgroup directory `/sys/fs/cgroup/machine.slice/libpod-7b844e8928936172c0319e274723585860dcae226172a0268929dae31aac22a8.scope`: No such file or directory: OCI not found
sudo podman --log-level DEBUG run --rm -it --privileged --runtime=/usr/local/bin/crun --cgroup-manager cgroupfs docker.io/library/alpine
INFO[0000] podman filtering at log level debug DEBU[0000] Called run.PersistentPreRunE(podman --log-level DEBUG run --rm -it --privileged --runtime=/usr/local/bin/crun --cgroup-manager cgroupfs docker.io/library/alpine) DEBU[0000] Reading configuration file "/usr/share/containers/containers.conf" DEBU[0000] Merged system config "/usr/share/containers/containers.conf": &{Containers:{Devices:[] Volumes:[] ApparmorProfile:containers-default-0.33.4 Annotations:[] CgroupNS:host Cgroups:enabled DefaultCapabilities:[CHOWN DAC_OVERRIDE FOWNER FSETID KILL NET_BIND_SERVICE SETFCAP SETGID SETPCAP SETUID SYS_CHROOT] DefaultSysctls:[net.ipv4.ping_group_range=0 0] DefaultUlimits:[] DefaultMountsFile: DNSServers:[] DNSOptions:[] DNSSearches:[] EnableKeyring:true EnableLabeling:false Env:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin TERM=xterm] EnvHost:false HTTPProxy:true Init:false InitPath: IPCNS:private LogDriver:k8s-file LogSizeMax:-1 NetNS:bridge NoHosts:false PidsLimit:2048 PidNS:private SeccompProfile:/usr/share/containers/seccomp.json ShmSize:65536k TZ: Umask:0022 UTSNS:private UserNS:host UserNSSize:65536} Engine:{ImageBuildFormat:oci CgroupCheck:false CgroupManager:systemd ConmonEnvVars:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin] ConmonPath:[/usr/libexec/podman/conmon /usr/local/libexec/podman/conmon /usr/local/lib/podman/conmon /usr/bin/conmon /usr/sbin/conmon /usr/local/bin/conmon /usr/local/sbin/conmon /run/current-system/sw/bin/conmon] DetachKeys:ctrl-p,ctrl-q EnablePortReservation:true Env:[] EventsLogFilePath:/run/libpod/events/events.log EventsLogger:journald HooksDir:[/usr/share/containers/oci/hooks.d] ImageDefaultTransport:docker:// InfraCommand: InfraImage:k8s.gcr.io/pause:3.2 InitPath:/usr/libexec/podman/catatonit LockType:shm MultiImageArchive:false Namespace: NetworkCmdPath: NetworkCmdOptions:[] NoPivotRoot:false NumLocks:2048 OCIRuntime:crun OCIRuntimes:map[crun:[/usr/bin/crun /usr/sbin/crun /usr/local/bin/crun /usr/local/sbin/crun /sbin/crun /bin/crun /run/current-system/sw/bin/crun] kata:[/usr/bin/kata-runtime /usr/sbin/kata-runtime /usr/local/bin/kata-runtime /usr/local/sbin/kata-runtime /sbin/kata-runtime /bin/kata-runtime /usr/bin/kata-qemu /usr/bin/kata-fc] runc:[/usr/bin/runc /usr/sbin/runc /usr/local/bin/runc /usr/local/sbin/runc /sbin/runc /bin/runc /usr/lib/cri-o-runc/sbin/runc /run/current-system/sw/bin/runc]] PullPolicy:missing Remote:false RemoteURI: RemoteIdentity: ActiveService: ServiceDestinations:map[] RuntimePath:[] RuntimeSupportsJSON:[crun runc] RuntimeSupportsNoCgroups:[crun] RuntimeSupportsKVM:[kata kata-runtime kata-qemu kata-fc] SetOptions:{StorageConfigRunRootSet:false StorageConfigGraphRootSet:false StorageConfigGraphDriverNameSet:false StaticDirSet:false VolumePathSet:false TmpDirSet:false} SignaturePolicyPath:/etc/containers/policy.json SDNotify:false StateType:3 StaticDir:/var/lib/containers/storage/libpod StopTimeout:10 TmpDir:/run/libpod VolumePath:/var/lib/containers/storage/volumes VolumePlugins:map[]} Network:{CNIPluginDirs:[/usr/libexec/cni /usr/lib/cni /usr/local/lib/cni /opt/cni/bin] DefaultNetwork:podman NetworkConfigDir:/etc/cni/net.d/}} DEBU[0000] Reading configuration file "/etc/containers/containers.conf" DEBU[0000] Merged system config "/etc/containers/containers.conf": &{Containers:{Devices:[] Volumes:[] ApparmorProfile:containers-default-0.33.4 Annotations:[] CgroupNS:host Cgroups:enabled DefaultCapabilities:[CHOWN DAC_OVERRIDE FOWNER FSETID KILL NET_BIND_SERVICE SETFCAP SETGID SETPCAP SETUID SYS_CHROOT] DefaultSysctls:[net.ipv4.ping_group_range=0 0] DefaultUlimits:[] DefaultMountsFile: DNSServers:[] DNSOptions:[] DNSSearches:[] EnableKeyring:false EnableLabeling:false Env:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin TERM=xterm] EnvHost:false HTTPProxy:true Init:false InitPath: IPCNS:private LogDriver:k8s-file LogSizeMax:-1 NetNS:bridge NoHosts:false PidsLimit:2048 PidNS:private SeccompProfile:/usr/share/containers/seccomp.json ShmSize:65536k TZ: Umask:0022 UTSNS:private UserNS:host UserNSSize:65536} Engine:{ImageBuildFormat:oci CgroupCheck:false CgroupManager:systemd ConmonEnvVars:[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin] ConmonPath:[/usr/libexec/podman/conmon /usr/local/libexec/podman/conmon /usr/local/lib/podman/conmon /usr/bin/conmon /usr/sbin/conmon /usr/local/bin/conmon /usr/local/sbin/conmon /run/current-system/sw/bin/conmon] DetachKeys:ctrl-p,ctrl-q EnablePortReservation:true Env:[] EventsLogFilePath:/run/libpod/events/events.log EventsLogger:journald HooksDir:[/usr/share/containers/oci/hooks.d] ImageDefaultTransport:docker:// InfraCommand: InfraImage:k8s.gcr.io/pause:3.2 InitPath:/usr/libexec/podman/catatonit LockType:shm MultiImageArchive:false Namespace: NetworkCmdPath: NetworkCmdOptions:[] NoPivotRoot:false NumLocks:2048 OCIRuntime:runc OCIRuntimes:map[crun:[/usr/bin/crun /usr/sbin/crun /usr/local/bin/crun /usr/local/sbin/crun /sbin/crun /bin/crun /run/current-system/sw/bin/crun] kata:[/usr/bin/kata-runtime /usr/sbin/kata-runtime /usr/local/bin/kata-runtime /usr/local/sbin/kata-runtime /sbin/kata-runtime /bin/kata-runtime /usr/bin/kata-qemu /usr/bin/kata-fc] runc:[/usr/bin/runc /usr/sbin/runc /usr/local/bin/runc /usr/local/sbin/runc /sbin/runc /bin/runc /usr/lib/cri-o-runc/sbin/runc /run/current-system/sw/bin/runc]] PullPolicy:missing Remote:false RemoteURI: RemoteIdentity: ActiveService: ServiceDestinations:map[] RuntimePath:[] RuntimeSupportsJSON:[crun runc] RuntimeSupportsNoCgroups:[crun] RuntimeSupportsKVM:[kata kata-runtime kata-qemu kata-fc] SetOptions:{StorageConfigRunRootSet:false StorageConfigGraphRootSet:false StorageConfigGraphDriverNameSet:false StaticDirSet:false VolumePathSet:false TmpDirSet:false} SignaturePolicyPath:/etc/containers/policy.json SDNotify:false StateType:3 StaticDir:/var/lib/containers/storage/libpod StopTimeout:10 TmpDir:/run/libpod VolumePath:/var/lib/containers/storage/volumes VolumePlugins:map[]} Network:{CNIPluginDirs:[/usr/libexec/cni /usr/lib/cni /usr/local/lib/cni /opt/cni/bin] DefaultNetwork:podman NetworkConfigDir:/etc/cni/net.d/}} DEBU[0000] Using conmon: "/usr/bin/conmon" DEBU[0000] Initializing boltdb state at /var/lib/containers/storage/libpod/bolt_state.db DEBU[0000] Using graph driver DEBU[0000] Using graph root /var/lib/containers/storage DEBU[0000] Using run root /run/containers/storage DEBU[0000] Using static dir /var/lib/containers/storage/libpod DEBU[0000] Using tmp dir /run/libpod DEBU[0000] Using volume path /var/lib/containers/storage/volumes DEBU[0000] Set libpod namespace to "" INFO[0000] [graphdriver] using prior storage driver: btrfs DEBU[0000] Initializing event backend journald DEBU[0000] using runtime "/usr/bin/crun" DEBU[0000] using runtime "/usr/bin/runc" INFO[0000] Error initializing configured OCI runtime kata: no valid executable found for OCI runtime kata: invalid argument DEBU[0000] using runtime "/usr/local/bin/crun" INFO[0000] Found CNI network podman (type=ptp) at /etc/cni/net.d/87-podman-ptp.conflist DEBU[0000] Default CNI network name podman is unchangeable INFO[0000] Setting parallel job count to 25 DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]docker.io/library/alpine:latest" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]docker.io/library/alpine:latest" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]@6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] exporting opaque data as blob "sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]docker.io/library/alpine:latest" DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]@6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] exporting opaque data as blob "sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] using systemd mode: false DEBU[0000] No hostname set; container's hostname will default to runtime default DEBU[0000] Loading default seccomp profile DEBU[0000] Allocated lock 0 for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] parsed reference into "[btrfs@/var/lib/containers/storage+/run/containers/storage]@6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] exporting opaque data as blob "sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec" DEBU[0000] created container "5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e" DEBU[0000] container "5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e" has work directory "/var/lib/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata" DEBU[0000] container "5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e" has run directory "/run/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata" DEBU[0000] Handling terminal attach DEBU[0000] mounted container "5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e" at "/var/lib/containers/storage/btrfs/subvolumes/9a8aba20cae02e1dda2eefc10b5005174d4101767346ef52ba02b576613c95fc" DEBU[0000] Made network namespace at /run/netns/cni-5e0e72a2-e795-a918-5204-6a628b6f8117 for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] Created root filesystem for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e at /var/lib/containers/storage/btrfs/subvolumes/9a8aba20cae02e1dda2eefc10b5005174d4101767346ef52ba02b576613c95fc INFO[0000] Got pod network &{Name:wizardly_cori Namespace:wizardly_cori ID:5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e NetNS:/run/netns/cni-5e0e72a2-e795-a918-5204-6a628b6f8117 Networks:[{Name:podman Ifname:eth0}] RuntimeConfig:map[podman:{IP: MAC: PortMappings:[] Bandwidth:IpRanges:[]}] Aliases:map[]} INFO[0000] About to add CNI network podman (type=ptp) DEBU[0000] [0] CNI result: &{0.4.0 [{Name:vetheba2b6a4 Mac:66:fb:54:bd:c5:d3 Sandbox:} {Name:eth0 Mac:2a:d2:ea:a8:34:fb Sandbox:/run/netns/cni-5e0e72a2-e795-a918-5204-6a628b6f8117}] [{Version:4 Interface:0xc0000d4258 Address:{IP:172.16.16.82 Mask:ffffff00} Gateway:172.16.16.1}] [{Dst:{IP:0.0.0.0 Mask:00000000} GW: }] {[] [] []}} DEBU[0000] Workdir "/" resolved to host path "/var/lib/containers/storage/btrfs/subvolumes/9a8aba20cae02e1dda2eefc10b5005174d4101767346ef52ba02b576613c95fc" DEBU[0000] /etc/system-fips does not exist on host, not mounting FIPS mode subscription DEBU[0000] Setting CGroup path for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e to /libpod_parent/libpod-5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] reading hooks from /usr/share/containers/oci/hooks.d DEBU[0000] Created OCI spec for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e at /var/lib/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata/config.json DEBU[0000] /usr/bin/conmon messages will be logged to syslog DEBU[0000] running conmon: /usr/bin/conmon args="[--api-version 1 -c 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e -u 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e -r /usr/local/bin/crun -b /var/lib/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata -p /run/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata/pidfile -n wizardly_cori --exit-dir /run/libpod/exits --socket-dir-path /run/libpod/socket -l k8s-file:/var/lib/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata/ctr.log --log-level debug --syslog -t --no-new-keyring --conmon-pidfile /run/containers/storage/btrfs-containers/5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e/userdata/conmon.pid --exit-command /usr/bin/podman --exit-command-arg --root --exit-command-arg /var/lib/containers/storage --exit-command-arg --runroot --exit-command-arg /run/containers/storage --exit-command-arg --log-level --exit-command-arg debug --exit-command-arg --cgroup-manager --exit-command-arg cgroupfs --exit-command-arg --tmpdir --exit-command-arg /run/libpod --exit-command-arg --runtime --exit-command-arg /usr/local/bin/crun --exit-command-arg --events-backend --exit-command-arg journald --exit-command-arg --syslog --exit-command-arg container --exit-command-arg cleanup --exit-command-arg --rm --exit-command-arg 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e]" WARN[0000] Failed to add conmon to cgroupfs sandbox cgroup: error creating cgroup path for debug: mkdir /sys/fs/cgroup/debug/libpod_parent: read-only file system DEBU[0000] Received: -1 DEBU[0000] Cleaning up container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] Tearing down network namespace at /run/netns/cni-5e0e72a2-e795-a918-5204-6a628b6f8117 for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e INFO[0000] Got pod network &{Name:wizardly_cori Namespace:wizardly_cori ID:5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e NetNS:/run/netns/cni-5e0e72a2-e795-a918-5204-6a628b6f8117 Networks:[{Name:podman Ifname:}] RuntimeConfig:map[podman:{IP: MAC: PortMappings:[] Bandwidth: IpRanges:[]}] Aliases:map[]} INFO[0000] About to del CNI network podman (type=ptp) DEBU[0000] unmounted container "5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e" DEBU[0000] Removing container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] Removing all exec sessions for container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] Cleaning up container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e DEBU[0000] Network is already cleaned up, skipping... DEBU[0000] Container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e storage is already unmounted, skipping... DEBU[0000] Container 5d85917f227c25802b2f4962fbaf74bec800ffc0a48176f39ccbc39672089d5e storage is already unmounted, skipping... DEBU[0000] ExitCode msg: "writing file `devices.allow`: operation not permitted: oci permission denied" Error: writing file `devices.allow`: Operation not permitted: OCI permission denied
I think in the second comment you meant crun fails.
@giuseppe PTAL
Do you have a recipe for how I can reproduce locally? Is the host running LXC on Ubuntu?
This environment is marketed by Google as "Linux on Chromebook", it looks like below:
└── Chrome OS host
└── Chrome OS virtual machine (termina)
└── LXC container - Debian running systemd (penguin)
└── `sudo podman --runtime crun run`
I don't have Ubuntu to test whether is can be reproduced there. So I collected some information about this environment below. Please let me know if there is anything also you want to see.
(termina) chronos@localhost ~ $ uname -r
5.4.99-12983-g8b7876ab9f5e
(termina) chronos@localhost ~ $ lxc version
Client version: 3.17
Server version: 3.17
(termina) chronos@localhost ~ $ lxc config show penguin --expanded
architecture: x86_64 config: boot.autostart: "false" boot.host_shutdown_timeout: "9" image.architecture: amd64 image.description: Debian buster amd64 (20210206_14:16) image.os: Debian image.release: buster image.serial: "20210206_14:16" image.type: squashfs raw.idmap: |- both 1000 1000 both 655360 655360 both 665357 665357 both 1001 1001 security.nesting: "true" security.syscalls.blacklist: keyctl errno 38 volatile.base_image: 89260331cf49c476c9cf40b3d38f86c594ff5baba022981c4d44309b95b7c5a5 volatile.eth0.host_name: veth290cadd0 volatile.eth0.hwaddr: 00:16:3e:30:d1:67 volatile.eth0.name: eth0 volatile.idmap.base: "0" volatile.idmap.current: '[{"Isuid":true,"Isgid":false,"Hostid":1000000,"Nsid":0,"Maprange":1000},{"Isuid":true,"Isgid":true,"Hostid":1000,"Nsid":1000,"Maprange":1},{"Isuid":true,"Isgid":true,"Hostid":1001,"Nsid":1001,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1001002,"Nsid":1002,"Maprange":654358},{"Isuid":true,"Isgid":true,"Hostid":655360,"Nsid":655360,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1655361,"Nsid":655361,"Maprange":9996},{"Isuid":true,"Isgid":true,"Hostid":665357,"Nsid":665357,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1665358,"Nsid":665358,"Maprange":999334642},{"Isuid":false,"Isgid":true,"Hostid":1000000,"Nsid":0,"Maprange":1000},{"Isuid":true,"Isgid":true,"Hostid":1000,"Nsid":1000,"Maprange":1},{"Isuid":true,"Isgid":true,"Hostid":1001,"Nsid":1001,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1001002,"Nsid":1002,"Maprange":654358},{"Isuid":true,"Isgid":true,"Hostid":655360,"Nsid":655360,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1655361,"Nsid":655361,"Maprange":9996},{"Isuid":true,"Isgid":true,"Hostid":665357,"Nsid":665357,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1665358,"Nsid":665358,"Maprange":999334642}]' volatile.idmap.next: '[{"Isuid":true,"Isgid":false,"Hostid":1000000,"Nsid":0,"Maprange":1000},{"Isuid":true,"Isgid":true,"Hostid":1000,"Nsid":1000,"Maprange":1},{"Isuid":true,"Isgid":true,"Hostid":1001,"Nsid":1001,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1001002,"Nsid":1002,"Maprange":654358},{"Isuid":true,"Isgid":true,"Hostid":655360,"Nsid":655360,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1655361,"Nsid":655361,"Maprange":9996},{"Isuid":true,"Isgid":true,"Hostid":665357,"Nsid":665357,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1665358,"Nsid":665358,"Maprange":999334642},{"Isuid":false,"Isgid":true,"Hostid":1000000,"Nsid":0,"Maprange":1000},{"Isuid":true,"Isgid":true,"Hostid":1000,"Nsid":1000,"Maprange":1},{"Isuid":true,"Isgid":true,"Hostid":1001,"Nsid":1001,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1001002,"Nsid":1002,"Maprange":654358},{"Isuid":true,"Isgid":true,"Hostid":655360,"Nsid":655360,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1655361,"Nsid":655361,"Maprange":9996},{"Isuid":true,"Isgid":true,"Hostid":665357,"Nsid":665357,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1665358,"Nsid":665358,"Maprange":999334642}]' volatile.last_state.idmap: '[{"Isuid":true,"Isgid":false,"Hostid":1000000,"Nsid":0,"Maprange":1000},{"Isuid":true,"Isgid":true,"Hostid":1000,"Nsid":1000,"Maprange":1},{"Isuid":true,"Isgid":true,"Hostid":1001,"Nsid":1001,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1001002,"Nsid":1002,"Maprange":654358},{"Isuid":true,"Isgid":true,"Hostid":655360,"Nsid":655360,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1655361,"Nsid":655361,"Maprange":9996},{"Isuid":true,"Isgid":true,"Hostid":665357,"Nsid":665357,"Maprange":1},{"Isuid":true,"Isgid":false,"Hostid":1665358,"Nsid":665358,"Maprange":999334642},{"Isuid":false,"Isgid":true,"Hostid":1000000,"Nsid":0,"Maprange":1000},{"Isuid":true,"Isgid":true,"Hostid":1000,"Nsid":1000,"Maprange":1},{"Isuid":true,"Isgid":true,"Hostid":1001,"Nsid":1001,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1001002,"Nsid":1002,"Maprange":654358},{"Isuid":true,"Isgid":true,"Hostid":655360,"Nsid":655360,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1655361,"Nsid":655361,"Maprange":9996},{"Isuid":true,"Isgid":true,"Hostid":665357,"Nsid":665357,"Maprange":1},{"Isuid":false,"Isgid":true,"Hostid":1665358,"Nsid":665358,"Maprange":999334642}]' volatile.last_state.power: RUNNING devices: /dev/dri/card0: major: "226" minor: "0" mode: "0666" path: /dev/dri/card0 type: unix-char /dev/dri/renderD128: major: "226" minor: "128" mode: "0666" path: /dev/dri/renderD128 type: unix-char /dev/kvm: major: "10" minor: "232" mode: "0666" path: /dev/kvm type: unix-char /dev/snd/controlC0: major: "116" minor: "0" mode: "0666" path: /dev/snd/controlC0 type: unix-char /dev/snd/pcmC0D0c: major: "116" minor: "24" mode: "0666" path: /dev/snd/pcmC0D0c type: unix-char /dev/snd/pcmC0D0p: major: "116" minor: "16" mode: "0666" path: /dev/snd/pcmC0D0p type: unix-char /dev/snd/pcmC0D1c: major: "116" minor: "25" mode: "0666" path: /dev/snd/pcmC0D1c type: unix-char /dev/snd/seq: major: "116" minor: "1" mode: "0666" path: /dev/snd/seq type: unix-char /dev/snd/timer: major: "116" minor: "33" mode: "0666" path: /dev/snd/timer type: unix-char container_token: path: /dev/.container_token required: "false" source: /run/tokens/penguin_token type: disk cros_containers: path: /opt/google/cros-containers source: /opt/google/cros-containers type: disk cros_milestone: path: /dev/.cros_milestone source: /run/cros_milestone type: disk eth0: nictype: bridged parent: lxdbr0 type: nic external: path: /mnt/external source: /mnt/external type: disk fuse: mode: "0666" source: /dev/fuse type: unix-char host-ip: path: /dev/.host_ip source: /run/host_ip type: disk root: path: / pool: default type: disk shared: path: /mnt/chromeos source: /mnt/shared type: disk ssh_authorized_keys: path: /dev/.ssh/ssh_authorized_keys required: "false" source: /run/sshd/penguin/authorized_keys type: disk ssh_host_key: path: /dev/.ssh/ssh_host_key required: "false" source: /run/sshd/penguin/ssh_host_key type: disk sshd_config: path: /dev/.ssh/sshd_config source: /usr/share/container_sshd_config type: disk tun: mode: "0666" source: /dev/net/tun type: unix-char usb: mode: "0666" type: usb wl0: mode: "0666" source: /dev/wl0 type: unix-char ephemeral: false profiles: - default stateful: false description: ""
thanks, I wonder if cgroups are usable at all.
When you run a container with runc and you specify some limits (e.g. --memory 100M
) does it work correctly?
Could you show me the output for these commands in the LXC container:
With sudo
, runc
works with --memory=100M
but shows a warning about cgroup:
sudo podman run --rm -it --runtime=runc --memory=100M docker.io/library/alpine
Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.
/ #
Without sudo
, runc
fails with --memory=100M
:
$ podman run --rm -it --runtime=runc --memory=100M docker.io/library/alpine
Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.
Error: OCI runtime error: container_linux.go:367: starting container process caused: process_linux.go:495: container init caused: process_linux.go:458: setting cgroup config for procHooks process caused: cannot set memory limit: container could not join or create cgroup
$ cat /proc/self/mountinfo
119 64 0:44 /lxd/storage-pools/default/containers/penguin/rootfs / rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=267,subvol=/lxd/storage-pools/default/containers/penguin
120 119 0:55 / /dev rw,relatime - tmpfs none rw,size=492k,mode=755,uid=1000000,gid=1000000
121 119 0:54 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw
122 119 0:56 / /sys rw,relatime - sysfs sysfs rw
123 121 0:47 /proc/cpuinfo /proc/cpuinfo rw,nosuid,nodev,relatime - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other
124 121 0:47 /proc/diskstats /proc/diskstats rw,nosuid,nodev,relatime - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other
125 121 0:47 /proc/meminfo /proc/meminfo rw,nosuid,nodev,relatime - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other
126 121 0:47 /proc/stat /proc/stat rw,nosuid,nodev,relatime - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other
127 121 0:47 /proc/uptime /proc/uptime rw,nosuid,nodev,relatime - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other
128 120 0:6 /full /dev/full rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
129 120 0:6 /null /dev/null rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
130 120 0:6 /random /dev/random rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
131 120 0:6 /tty /dev/tty rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
132 120 0:6 /urandom /dev/urandom rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
133 120 0:6 /zero /dev/zero rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
134 120 0:6 /fuse /dev/fuse rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
135 120 0:6 /net/tun /dev/net/tun rw,nosuid,noexec,relatime - devtmpfs devtmpfs rw,size=3378976k,nr_inodes=844744,mode=755
136 121 0:5 /sys/fs/binfmt_misc /proc/sys/fs/binfmt_misc rw,nosuid,nodev,noexec,relatime - proc proc rw
137 122 0:24 /fs/fuse/connections /sys/fs/fuse/connections rw,nosuid,nodev,noexec,relatime - sysfs sys rw
138 122 0:24 /kernel/debug /sys/kernel/debug rw,nosuid,nodev,noexec,relatime - sysfs sys rw
139 122 0:24 /kernel/security /sys/kernel/security rw,nosuid,nodev,noexec,relatime - sysfs sys rw
140 120 0:54 / /dev/.lxc/proc rw,relatime - proc proc rw
141 120 0:56 / /dev/.lxc/sys rw,relatime - sysfs sys rw
142 120 0:52 / /dev/lxd rw,relatime - tmpfs tmpfs rw,size=100k,mode=755
143 120 0:51 /penguin /dev/.lxd-mounts rw,relatime master:1 - tmpfs tmpfs rw,size=100k,mode=711
144 120 0:27 /tokens/penguin_token /dev/.container_token rw,nosuid,nodev,noexec,relatime - tmpfs run rw,mode=755
145 120 0:27 /cros_milestone /dev/.cros_milestone rw,nosuid,nodev,noexec,relatime - tmpfs run rw,mode=755
146 120 0:27 /host_ip /dev/.host_ip rw,nosuid,nodev,noexec,relatime - tmpfs run rw,mode=755
147 120 0:27 /sshd/penguin/authorized_keys /dev/.ssh/ssh_authorized_keys rw,nosuid,nodev,noexec,relatime - tmpfs run rw,mode=755
148 120 0:27 /sshd/penguin/ssh_host_key /dev/.ssh/ssh_host_key rw,nosuid,nodev,noexec,relatime - tmpfs run rw,mode=755
149 120 259:0 /usr/share/container_sshd_config /dev/.ssh/sshd_config ro,relatime - ext4 /dev/root ro
150 119 0:43 / /mnt/chromeos rw,nosuid,nodev,relatime - 9p 9p rw,sync,dirsync,access=any,trans=fd,rfd=26,wfd=26
151 119 0:26 / /mnt/external rw,nosuid,nodev,noexec,relatime - tmpfs tmpfs rw,mode=755
152 119 254:0 / /opt/google/cros-containers ro,relatime - ext4 /dev/vda ro
153 120 0:44 /lxd/devices/penguin/unix.-dev-dri-card0.dev-dri-card0 /dev/dri/card0 rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
154 120 0:44 /lxd/devices/penguin/unix.-dev-dri-renderD128.dev-dri-renderD128 /dev/dri/renderD128 rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
155 120 0:44 /lxd/devices/penguin/unix.-dev-kvm.dev-kvm /dev/kvm rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
156 120 0:44 /lxd/devices/penguin/unix.-dev-snd-controlC0.dev-snd-controlC0 /dev/snd/controlC0 rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
157 120 0:44 /lxd/devices/penguin/unix.-dev-snd-pcmC0D0c.dev-snd-pcmC0D0c /dev/snd/pcmC0D0c rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
158 120 0:44 /lxd/devices/penguin/unix.-dev-snd-pcmC0D0p.dev-snd-pcmC0D0p /dev/snd/pcmC0D0p rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
159 120 0:44 /lxd/devices/penguin/unix.-dev-snd-pcmC0D1c.dev-snd-pcmC0D1c /dev/snd/pcmC0D1c rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
160 120 0:44 /lxd/devices/penguin/unix.-dev-snd-seq.dev-snd-seq /dev/snd/seq rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
161 120 0:44 /lxd/devices/penguin/unix.-dev-snd-timer.dev-snd-timer /dev/snd/timer rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
162 134 0:44 /lxd/devices/penguin/unix.fuse.dev-fuse /dev/fuse rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
163 135 0:44 /lxd/devices/penguin/unix.tun.dev-net-tun /dev/net/tun rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
164 120 0:44 /lxd/devices/penguin/unix.wl0.dev-wl0 /dev/wl0 rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
165 120 0:44 /lxd/devices/penguin/unix.usb.dev-bus-usb-001-001 /dev/bus/usb/001/001 rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
166 120 0:44 /lxd/devices/penguin/unix.usb.dev-bus-usb-002-001 /dev/bus/usb/002/001 rw,relatime - btrfs /dev/vdb rw,discard,space_cache,user_subvol_rm_allowed,subvolid=5,subvol=/
167 120 0:29 /0 /dev/console rw,nosuid,noexec,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666
65 120 0:57 / /dev/pts rw,nosuid,noexec,relatime - devpts devpts rw,gid=1000005,mode=620,ptmxmode=666,max=1024
66 120 0:57 /ptmx /dev/ptmx rw,nosuid,noexec,relatime - devpts devpts rw,gid=1000005,mode=620,ptmxmode=666,max=1024
55 120 0:58 / /dev/shm rw,nosuid,nodev - tmpfs tmpfs rw,uid=1000000,gid=1000000
56 119 0:59 / /run rw,nosuid,nodev - tmpfs tmpfs rw,size=1352588k,nr_inodes=819200,mode=755,uid=1000000,gid=1000000
57 56 0:60 / /run/lock rw,nosuid,nodev,noexec,relatime - tmpfs tmpfs rw,size=5120k,uid=1000000,gid=1000000
58 122 0:61 / /sys/fs/cgroup ro,nosuid,nodev,noexec - tmpfs tmpfs ro,size=4096k,nr_inodes=1024,mode=755,uid=1000000,gid=1000000
59 58 0:42 / /sys/fs/cgroup/systemd rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,name=systemd
60 58 0:35 / /sys/fs/cgroup/devices rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,devices
61 58 0:39 / /sys/fs/cgroup/net_cls,net_prio rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,net_cls,net_prio
62 58 0:36 / /sys/fs/cgroup/freezer rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,freezer
63 58 0:40 / /sys/fs/cgroup/perf_event rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,perf_event
67 58 0:33 / /sys/fs/cgroup/cpu,cpuacct rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,cpu,cpuacct
68 58 0:41 / /sys/fs/cgroup/pids rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,pids
69 58 0:32 / /sys/fs/cgroup/blkio rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,blkio
71 58 0:37 / /sys/fs/cgroup/hugetlb rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,hugetlb
72 58 0:38 / /sys/fs/cgroup/memory rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,memory
73 58 0:34 / /sys/fs/cgroup/cpuset rw,nosuid,nodev,noexec,relatime - cgroup cgroup rw,cpuset
74 120 0:53 / /dev/mqueue rw,nosuid,nodev,noexec,relatime - mqueue mqueue rw
278 56 0:62 / /run/user/1000 rw,nosuid,nodev,relatime - tmpfs tmpfs rw,size=676292k,nr_inodes=169073,mode=700,uid=1000,gid=1000
428 56 0:59 /netns /run/netns rw,nosuid,nodev shared:150 - tmpfs tmpfs rw,size=1352588k,nr_inodes=819200,mode=755,uid=1000000,gid=1000000
$ ls -l /sys/fs/cgroup
total 0
drwxrwxr-x 6 nobody root 0 May 24 01:07 blkio
lrwxrwxrwx 1 root root 11 May 22 14:57 cpu -> cpu,cpuacct
lrwxrwxrwx 1 root root 11 May 22 14:57 cpuacct -> cpu,cpuacct
drwxrwxr-x 6 nobody root 0 May 24 01:07 cpu,cpuacct
drwxrwxr-x 3 nobody root 0 May 24 01:07 cpuset
drwxr-xr-x 2 root root 40 May 22 14:57 debug
drwxrwxr-x 6 nobody root 0 May 24 01:07 devices
drwxrwxr-x 3 nobody root 0 May 24 01:07 freezer
drwxrwxr-x 3 nobody root 0 May 24 01:07 hugetlb
drwxrwxr-x 6 nobody root 0 May 24 01:07 memory
lrwxrwxrwx 1 root root 16 May 22 14:57 net_cls -> net_cls,net_prio
drwxrwxr-x 3 nobody root 0 May 24 01:07 net_cls,net_prio
lrwxrwxrwx 1 root root 16 May 22 14:57 net_prio -> net_cls,net_prio
drwxrwxr-x 3 nobody root 0 May 24 01:07 perf_event
drwxrwxr-x 6 nobody root 0 May 24 01:07 pids
drwxrwxr-x 7 nobody root 0 May 24 01:07 systemd
$ cat /proc/cgroups
#subsys_name hierarchy num_cgroups enabled
cpuset 3 5 1
cpu 2 10 1
cpuacct 2 10 1
blkio 1 10 1
memory 7 32 1
devices 4 22 1
freezer 5 5 1
net_cls 8 5 1
perf_event 9 5 1
net_prio 8 5 1
hugetlb 6 5 1
pids 10 25 1
debug 0 1 1
thanks!
Can you also show me cat /proc/self/cgroup
?
$ cat /proc/self/cgroup
11:name=systemd:/user.slice/user-1000.slice/user@1000.service/app.slice/cros-garcon.service
10:pids:/user.slice/user-1000.slice/user@1000.service
9:perf_event:/
8:net_cls,net_prio:/
7:memory:/user.slice/user-1000.slice/user@1000.service
6:hugetlb:/
5:freezer:/
4:devices:/user.slice
3:cpuset:/
2:cpu,cpuacct:/user.slice
1:blkio:/user.slice
0::/
are you able to try a patch? Does the following patch solve the issue you are seeing?
diff --git a/src/libcrun/cgroup.c b/src/libcrun/cgroup.c
index b30cd27..24279a2 100644
--- a/src/libcrun/cgroup.c
+++ b/src/libcrun/cgroup.c
@@ -1014,6 +1014,9 @@ systemd_finalize (struct libcrun_cgroup_args *args, libcrun_error_t *err)
subpath = strchr (subsystem, ':') + 1;
*(subpath - 1) = '\0';
+ if (subsystem[0] == '\0')
+ continue;
+
if (strcmp (subpath, *path))
{
ret = enter_cgroup_subsystem (pid, subsystem, *path, true, err);
I think we're one step forward, with the patch now --cgroup-manager systemd
fails the same way as --cgroup-manager cgroupfs
:
$ sudo podman run --rm -it --privileged --runtime=/usr/local/bin/crun docker.io/library/alpine
Error: writing file `devices.allow`: Operation not permitted: OCI permission denied
can you show me the output for cat /proc/self/uid_map
and cat /proc/self/gid_map
?
if the output is different than 0 0 4294967295
please try with this patch:
diff --git a/src/libcrun/cgroup.c b/src/libcrun/cgroup.c
index b30cd27..c3cc6dc 100644
--- a/src/libcrun/cgroup.c
+++ b/src/libcrun/cgroup.c
@@ -1014,6 +1014,9 @@ systemd_finalize (struct libcrun_cgroup_args *args, libcrun_error_t *err)
subpath = strchr (subsystem, ':') + 1;
*(subpath - 1) = '\0';
+ if (subsystem[0] == '\0')
+ continue;
+
if (strcmp (subpath, *path))
{
ret = enter_cgroup_subsystem (pid, subsystem, *path, true, err);
@@ -2729,10 +2732,31 @@ static int
write_devices_resources (int dirfd, bool cgroup2, runtime_spec_schema_defs_linux_device_cgroup **devs, size_t devs_len,
libcrun_error_t *err)
{
+ int ret;
+
if (cgroup2)
- return write_devices_resources_v2 (dirfd, devs, devs_len, err);
+ ret = write_devices_resources_v2 (dirfd, devs, devs_len, err);
+ else
+ ret = write_devices_resources_v1 (dirfd, devs, devs_len, err);
+ if (UNLIKELY (ret < 0))
+ {
+ libcrun_error_t tmp_err = NULL;
+ int rootless;
+
+ rootless = is_rootless (&tmp_err);
+ if (UNLIKELY (rootless < 0))
+ {
+ crun_error_release (&tmp_err);
+ return ret;
+ }
- return write_devices_resources_v1 (dirfd, devs, devs_len, err);
+ if (rootless)
+ {
+ crun_error_release (err);
+ ret = 0;
+ }
+ }
+ return ret;
}
/* use for cgroupv2 files with .min, .max, .low, or .high suffix */
@giuseppe The patch worked!
The uid and gid map both looked like below:
0 1000000 1000
1000 1000 1
1001 1001 1
1002 1001002 654358
655360 655360 1
655361 1655361 9996
665357 665357 1
665358 1665358 999334642
thanks for confirming it!
Opened a PR
After manually building
crun
with patch #676, now I'm seeing a different error for nested root podman --privileged container under LXC. Again, the same command with--runtime=runc
works fine.sudo podman --log-level DEBUG run --rm -it --privileged --runtime=/usr/local/bin/crun --cgroup-manager systemd ghcr.io/ntkme/systemd-podman
strace.log
The error is coming from here:
https://github.com/containers/crun/blob/4cc7fa1124cce75dc26e12186d9cbeabded2b710/src/libcrun/cgroup.c#L536-L546