containers / youki

A container runtime written in Rust
https://containers.github.io/youki/
Apache License 2.0
6.23k stars 340 forks source link

Pass all of runc integration tests #1305

Open YJDoc2 opened 1 year ago

YJDoc2 commented 1 year ago

https://github.com/opencontainers/runc/blob/main/Makefile#L120

Currently following tests are failing : Some of the following might actually be passing but failing on my side because of incorrect setup. Will update the comment if someone can confirm a test is passing on their setup.

Complete errorlog in a comment below

YJDoc2 commented 1 year ago

Error log :

``` not ok 1 runc exec (cgroup v2, ro cgroupfs, new cgroupns) does not chown cgroup # (from function `requires' in file tests/integration/helpers.bash, line 471, # from function `setup' in test file tests/integration/cgroup_delegation.bats, line 10) # `requires root cgroups_v2 systemd' failed # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable not ok 2 runc exec (cgroup v2, rw cgroupfs, inherit cgroupns) does not chown cgroup # (from function `requires' in file tests/integration/helpers.bash, line 471, # from function `setup' in test file tests/integration/cgroup_delegation.bats, line 10) # `requires root cgroups_v2 systemd' failed # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable not ok 3 runc exec (cgroup v2, rw cgroupfs, new cgroupns) does chown cgroup # (from function `requires' in file tests/integration/helpers.bash, line 471, # from function `setup' in test file tests/integration/cgroup_delegation.bats, line 10) # `requires root cgroups_v2 systemd' failed # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 5 runc create (rootless + no limits + cgrouppath + no permission) fails with permission error # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/cgroups.bats, line 19) # `requires rootless rootless_no_cgroup' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable not ok 6 runc create (rootless + limits + no cgrouppath + no permission) fails with informative error # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/cgroups.bats, line 29) # `requires rootless rootless_no_cgroup' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 10 runc run (cgroup v1 + unified resources should fail) # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/cgroups.bats, line 123) # `requires root cgroups_v1' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 12 runc run (per-device io weight for bfq) # (in test file tests/integration/cgroups.bats, line 162) # `losetup -d "$dev"' failed # runc spec (status=0): # # 1+0 records in # 1+0 records out # 4096 bytes (4.1 kB, 4.0 KiB) copied, 0.000132139 s, 31.0 MB/s # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 16 runc exec (cgroup v1+hybrid joins correct cgroup) # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/cgroups.bats, line 287) # `requires root cgroups_hybrid' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 21 checkpoint and restore # (from function `simple_cr' in file tests/integration/checkpoint.bats, line 122, # in test file tests/integration/checkpoint.bats, line 130) # `simple_cr' failed # runc spec (status=0): # # runc run -d --console-socket /tmp/bats-run-55856/runc.85KIcp/tty/sock test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 58225, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.85KIcp/bundle", # "rootfs": "/tmp/bats-run-55856/runc.85KIcp/bundle/rootfs", # "created": "2022-10-26T04:53:17.396837292Z", # "owner": "" # } # runc checkpoint --work-path ./work-dir test_busybox (status=0): # # runc state test_busybox (status=1): # time="2022-10-26T04:53:17Z" level=error msg="container does not exist" # runc restore -d --work-path ./work-dir --console-socket /tmp/bats-run-55856/runc.85KIcp/tty/sock test_busybox (status=1): # time="2022-10-26T04:53:17Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" # (00.040123) pie: 1: `- skip pagemap # (00.040125) pie: 1: `- skip pagemap # (00.040127) pie: 1: `- skip pagemap # (00.040129) pie: 1: `- skip pagemap # (00.040131) pie: 1: `- skip pagemap # (00.040184) Error (criu/cr-restore.c:1492): 58322 stopped by signal 11: Segmentation fault # (00.040474) mnt: Switching to new ns to clean ghosts # (00.040829) Error (criu/cr-restore.c:2447): Restoring FAILED. not ok 22 checkpoint and restore (bind mount, destination is symlink) # (from function `simple_cr' in file tests/integration/checkpoint.bats, line 122, # in test file tests/integration/checkpoint.bats, line 141) # `simple_cr' failed # runc spec (status=0): # # runc run -d --console-socket /tmp/bats-run-55856/runc.MurrRT/tty/sock test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 58423, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.MurrRT/bundle", # "rootfs": "/tmp/bats-run-55856/runc.MurrRT/bundle/rootfs", # "created": "2022-10-26T04:53:18.091533401Z", # "owner": "" # } # runc checkpoint --work-path ./work-dir test_busybox (status=0): # # runc state test_busybox (status=1): # time="2022-10-26T04:53:18Z" level=error msg="container does not exist" # runc restore -d --work-path ./work-dir --console-socket /tmp/bats-run-55856/runc.MurrRT/tty/sock test_busybox (status=1): # time="2022-10-26T04:53:18Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" # (00.038533) pie: 1: `- skip pagemap # (00.038535) pie: 1: `- skip pagemap # (00.038537) pie: 1: `- skip pagemap # (00.038539) pie: 1: `- skip pagemap # (00.038541) pie: 1: `- skip pagemap # (00.038593) Error (criu/cr-restore.c:1492): 58492 stopped by signal 11: Segmentation fault # (00.038874) mnt: Switching to new ns to clean ghosts # (00.040717) Error (criu/cr-restore.c:2447): Restoring FAILED. not ok 23 checkpoint and restore (with --debug) # (from function `simple_cr' in file tests/integration/checkpoint.bats, line 122, # in test file tests/integration/checkpoint.bats, line 145) # `simple_cr --debug' failed # runc spec (status=0): # # runc run -d --console-socket /tmp/bats-run-55856/runc.Wp4ow5/tty/sock test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 58589, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.Wp4ow5/bundle", # "rootfs": "/tmp/bats-run-55856/runc.Wp4ow5/bundle/rootfs", # "created": "2022-10-26T04:53:18.805876553Z", # "owner": "" # } # runc --debug checkpoint --work-path ./work-dir test_busybox (status=0): # time="2022-10-26T04:53:18Z" level=debug msg="Using CRIU 31601" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1615" # time="2022-10-26T04:53:18Z" level=debug msg="Using CRIU in DUMP mode" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1659" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ImagesDirFd with value 8" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option Pid with value 58589" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LeaveRunning with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ExtUnixSk with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TcpEstablished with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option EvasiveDevices with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ShellJob with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option FileLocks with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LogLevel with value 4" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LogFile with value dump.log" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option Ps with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option NotifyScripts with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option Root with value /tmp/bats-run-55856/runc.Wp4ow5/bundle/rootfs" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ParentImg with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TrackMem with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option AutoDedup with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option WorkDirFd with value 9" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LinkRemap with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option Veths with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option CpuCap with value 4294967295" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ForceIrmap with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ExecCmd with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ExtMnt with value [key:\"/proc/kcore\" val:\"/dev/null\" key:\"/proc/keys\" val:\"/dev/null\" key:\"/proc/timer_list\" val:\"/dev/null\" key:\"/dev/null\" val:\"/dev/null\" key:\"/dev/random\" val:\"/dev/random\" key:\"/dev/full\" val:\"/dev/full\" key:\"/dev/tty\" val:\"/dev/tty\" key:\"/dev/zero\" val:\"/dev/zero\" key:\"/dev/urandom\" val:\"/dev/urandom\"]" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ManageCgroups with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option CgRoot with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option RstSibling with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option InheritFd with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option AutoExtMnt with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ExtSharing with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ExtMasters with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option SkipMnt with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option EnableFs with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option UnixSkIno with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ManageCgroupsMode with value IGNORE" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option GhostLimit with value 1048576" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option IrmapScanPaths with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option External with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option EmptyNs with value 1073741824" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option JoinNs with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option CgroupProps with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option CgroupPropsFile with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option CgroupDumpController with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option FreezeCgroup with value /sys/fs/cgroup/user.slice/user-1000.slice/test_busybox" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option Timeout with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TcpSkipInFlight with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option WeakSysctls with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LazyPages with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option StatusFd with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option OrphanPtsMaster with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option ConfigFile with value /etc/criu/runc.conf" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TcpClose with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LsmProfile with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TlsCacert with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TlsCacrl with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TlsCert with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TlsKey with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option Tls with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option TlsNoCnVerify with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option CgroupYard with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option PreDumpMode with value SPLICE" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option PidfdStoreSk with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option LsmMountContext with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option NetworkLock with value IPTABLES" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="CRIU option MntnsCompatMode with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:18Z" level=debug msg="notify: pre-dump\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # time="2022-10-26T04:53:18Z" level=debug msg="notify: network-lock\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # time="2022-10-26T04:53:18Z" level=debug msg="notify: post-dump\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # runc state test_busybox (status=1): # time="2022-10-26T04:53:19Z" level=error msg="container does not exist" # runc --debug restore -d --work-path ./work-dir --console-socket /tmp/bats-run-55856/runc.Wp4ow5/tty/sock test_busybox (status=1): # time="2022-10-26T04:53:19Z" level=debug msg="Using CRIU 31601" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1615" # time="2022-10-26T04:53:19Z" level=debug msg="Using CRIU in RESTORE mode" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1659" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ImagesDirFd with value 10" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option Pid with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LeaveRunning with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ExtUnixSk with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TcpEstablished with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option EvasiveDevices with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ShellJob with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option FileLocks with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LogLevel with value 4" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LogFile with value restore.log" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option Ps with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option NotifyScripts with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option Root with value /tmp/bats-run-55856/runc.Wp4ow5/state/test_busybox/criu-root" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ParentImg with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TrackMem with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option AutoDedup with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option WorkDirFd with value 11" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LinkRemap with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option Veths with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option CpuCap with value 4294967295" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ForceIrmap with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ExecCmd with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ExtMnt with value [key:\"/dev/null\" val:\"/dev/null\" key:\"/dev/null\" val:\"/dev/null\" key:\"/dev/random\" val:\"/dev/random\" key:\"/dev/full\" val:\"/dev/full\" key:\"/dev/tty\" val:\"/dev/tty\" key:\"/dev/zero\" val:\"/dev/zero\" key:\"/dev/urandom\" val:\"/dev/urandom\"]" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ManageCgroups with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option CgRoot with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option RstSibling with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option InheritFd with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option AutoExtMnt with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ExtSharing with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ExtMasters with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option SkipMnt with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option EnableFs with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option UnixSkIno with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ManageCgroupsMode with value IGNORE" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option GhostLimit with value 1048576" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option IrmapScanPaths with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option External with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option EmptyNs with value 1073741824" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option JoinNs with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option CgroupProps with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option CgroupPropsFile with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option CgroupDumpController with value []" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option FreezeCgroup with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option Timeout with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TcpSkipInFlight with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option WeakSysctls with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LazyPages with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option StatusFd with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option OrphanPtsMaster with value true" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option ConfigFile with value /etc/criu/runc.conf" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TcpClose with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LsmProfile with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TlsCacert with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TlsCacrl with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TlsCert with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TlsKey with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option Tls with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option TlsNoCnVerify with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option CgroupYard with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option PreDumpMode with value SPLICE" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option PidfdStoreSk with value 0" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option LsmMountContext with value " func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option NetworkLock with value IPTABLES" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="CRIU option MntnsCompatMode with value false" func="libcontainer.(*Container).criuSwrk()" file="libcontainer/container_linux.go:1675" # time="2022-10-26T04:53:19Z" level=debug msg="notify: pre-restore\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # time="2022-10-26T04:53:19Z" level=debug msg="notify: setup-namespaces\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # time="2022-10-26T04:53:19Z" level=debug msg="notify: post-setup-namespaces\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # time="2022-10-26T04:53:19Z" level=debug msg="notify: orphan-pts-master\n" func="libcontainer.(*Container).criuNotifications()" file="libcontainer/container_linux.go:1809" # time="2022-10-26T04:53:19Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" func="main.fatalWithCode()" file="utils.go:62" # (00.035093) pie: 1: `- skip pagemap # (00.035095) pie: 1: `- skip pagemap # (00.035097) pie: 1: `- skip pagemap # (00.035105) pie: 1: `- skip pagemap # (00.035107) pie: 1: `- skip pagemap # (00.035159) Error (criu/cr-restore.c:1492): 58659 stopped by signal 11: Segmentation fault # (00.035383) mnt: Switching to new ns to clean ghosts # (00.035638) Error (criu/cr-restore.c:2447): Restoring FAILED. not ok 24 checkpoint and restore (cgroupns) # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/checkpoint.bats, line 150) # `requires cgroups_v1 cgroupns' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 26 checkpoint --pre-dump and restore # (from function `fail' in file tests/integration/helpers.bash, line 337, # from function `runc_restore_with_pipes' in file tests/integration/checkpoint.bats, line 94, # in test file tests/integration/checkpoint.bats, line 200) # `runc_restore_with_pipes ./work-dir test_busybox' failed # runc spec (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 58937, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.dsk3za/bundle", # "rootfs": "/tmp/bats-run-55856/runc.dsk3za/bundle/rootfs", # "created": "2022-10-26T04:53:20.157015606Z", # "owner": "" # } # runc checkpoint --pre-dump --image-path ./parent-dir test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 58937, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.dsk3za/bundle", # "rootfs": "/tmp/bats-run-55856/runc.dsk3za/bundle/rootfs", # "created": "2022-10-26T04:53:20.157015606Z", # "owner": "" # } # runc checkpoint --parent-path ../parent-dir --work-path ./work-dir --image-path ./image-dir test_busybox (status=0): # # runc state test_busybox (status=1): # time="2022-10-26T04:53:20Z" level=error msg="container does not exist" # __runc restore test_busybox failed (status: 1) # time="2022-10-26T04:53:20Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" # CRIU log errors (if any): # ./work-dir/restore.log-(00.033443) pie: 1: vdso: Remap rt-vdso 0x2e000 -> 0x7ffd8db0c000 # ./work-dir/restore.log-(00.033451) pie: 1: vdso: Remap rt-vvar 0x2a000 -> 0x7ffd8db08000 # ./work-dir/restore.log-(00.033459) pie: 1: vdso: Using gettimeofday() on vdso at 0x7ffd8db0cbd0 # ./work-dir/restore.log-(00.033498) pie: 1: Restoring scheduler params 0.0.0 # ./work-dir/restore.log-(00.033510) pie: 1: 1: Restored # ./work-dir/restore.log:(00.033615) Error (criu/cr-restore.c:1492): 59029 stopped by signal 11: Segmentation fault # ./work-dir/restore.log-(00.033883) mnt: Switching to new ns to clean ghosts # ./work-dir/restore.log:(00.034233) Error (criu/cr-restore.c:2447): Restoring FAILED. # grep: ./image-dir/*.log: No such file or directory # runc restore failed not ok 27 checkpoint --lazy-pages and restore # (from function `fail' in file tests/integration/helpers.bash, line 337, # from function `runc_restore_with_pipes' in file tests/integration/checkpoint.bats, line 94, # in test file tests/integration/checkpoint.bats, line 256) # `runc_restore_with_pipes ./image-dir test_busybox_restore --lazy-pages' failed # runc spec (status=0): # # uffd-noncoop is supported # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 59133, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.44A352/bundle", # "rootfs": "/tmp/bats-run-55856/runc.44A352/bundle/rootfs", # "created": "2022-10-26T04:53:20.757672936Z", # "owner": "" # } # Error (criu/uffd.c:1360): uffd: Restorer unexpectedly closed the connection # __runc restore test_busybox_restore failed (status: 1) # time="2022-10-26T04:53:21Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: image-dir/restore.log" # CRIU log errors (if any): # ./image-dir/restore.log-(00.037031) pie: 1: vdso: DT_STRSZ: 0x8b # ./image-dir/restore.log-(00.037032) pie: 1: vdso: DT_SYMENT: 0x18 # ./image-dir/restore.log-(00.037034) pie: 1: vdso: nbucket 0x3 nchain 0xd bucket 0x7ffc7dad6128 chain 0x7ffc7dad6134 # ./image-dir/restore.log-(00.037038) pie: 1: vdso: image [vdso] 0x7ffc7dad6000-0x7ffc7dad8000 [vvar] 0x7ffc7dad2000-0x7ffc7dad6000 # ./image-dir/restore.log-(00.037051) pie: 1: vdso: Runtime vdso/vvar matches dumpee, remap inplace # ./image-dir/restore.log:(00.037159) Error (criu/cr-restore.c:1492): 59198 stopped by signal 11: Segmentation fault # ./image-dir/restore.log-(00.037369) mnt: Switching to new ns to clean ghosts # ./image-dir/restore.log:(00.037648) Error (criu/cr-restore.c:2447): Restoring FAILED. # -- # ./image-dir/restore.log-(00.037031) pie: 1: vdso: DT_STRSZ: 0x8b # ./image-dir/restore.log-(00.037032) pie: 1: vdso: DT_SYMENT: 0x18 # ./image-dir/restore.log-(00.037034) pie: 1: vdso: nbucket 0x3 nchain 0xd bucket 0x7ffc7dad6128 chain 0x7ffc7dad6134 # ./image-dir/restore.log-(00.037038) pie: 1: vdso: image [vdso] 0x7ffc7dad6000-0x7ffc7dad8000 [vvar] 0x7ffc7dad2000-0x7ffc7dad6000 # ./image-dir/restore.log-(00.037051) pie: 1: vdso: Runtime vdso/vvar matches dumpee, remap inplace # ./image-dir/restore.log:(00.037159) Error (criu/cr-restore.c:1492): 59198 stopped by signal 11: Segmentation fault # ./image-dir/restore.log-(00.037369) mnt: Switching to new ns to clean ghosts # ./image-dir/restore.log:(00.037648) Error (criu/cr-restore.c:2447): Restoring FAILED. # runc restore failed not ok 28 checkpoint and restore in external network namespace # (in test file tests/integration/checkpoint.bats, line 303) # `[ "$status" -eq 0 ]' failed # runc spec (status=0): # # external_net_ns is supported # runc run -d --console-socket /tmp/bats-run-55856/runc.RLwxE9/tty/sock test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 59309, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.RLwxE9/bundle", # "rootfs": "/tmp/bats-run-55856/runc.RLwxE9/bundle/rootfs", # "created": "2022-10-26T04:53:21.521663982Z", # "owner": "" # } # runc checkpoint --work-path ./work-dir test_busybox (status=0): # # runc state test_busybox (status=1): # time="2022-10-26T04:53:21Z" level=error msg="container does not exist" # runc restore -d --work-path ./work-dir --console-socket /tmp/bats-run-55856/runc.RLwxE9/tty/sock test_busybox (status=1): # time="2022-10-26T04:53:21Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" # (00.042512) pie: 1: `- skip pagemap # (00.042514) pie: 1: `- skip pagemap # (00.042515) pie: 1: `- skip pagemap # (00.042517) pie: 1: `- skip pagemap # (00.042519) pie: 1: `- skip pagemap # (00.042574) Error (criu/cr-restore.c:1492): 59377 stopped by signal 11: Segmentation fault # (00.042926) mnt: Switching to new ns to clean ghosts # (00.043197) Error (criu/cr-restore.c:2447): Restoring FAILED. not ok 29 checkpoint and restore with container specific CRIU config # (in test file tests/integration/checkpoint.bats, line 357) # `[ "$status" -eq 0 ]' failed # runc spec (status=0): # # runc run -d --console-socket /tmp/bats-run-55856/runc.kWfLzK/tty/sock test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 59490, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.kWfLzK/bundle", # "rootfs": "/tmp/bats-run-55856/runc.kWfLzK/bundle/rootfs", # "created": "2022-10-26T04:53:22.073721657Z", # "annotations": { # "org.criu.config": "/tmp/runc-criu-7f6u7u.conf" # }, # "owner": "" # } # runc checkpoint --work-path ./work-dir test_busybox (status=0): # # grep: ./work-dir/dump.log: No such file or directory # runc state test_busybox (status=1): # time="2022-10-26T04:53:22Z" level=error msg="container does not exist" # runc restore -d --work-path ./work-dir --console-socket /tmp/bats-run-55856/runc.kWfLzK/tty/sock test_busybox (status=1): # time="2022-10-26T04:53:22Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" # grep: ./work-dir/restore.log: No such file or directory not ok 30 checkpoint and restore with nested bind mounts # (in test file tests/integration/checkpoint.bats, line 403) # `[ "$status" -eq 0 ]' failed # runc spec (status=0): # # runc run -d --console-socket /tmp/bats-run-55856/runc.Li7our/tty/sock test_busybox (status=0): # # runc state test_busybox (status=0): # { # "ociVersion": "1.0.2-dev", # "id": "test_busybox", # "pid": 59661, # "status": "running", # "bundle": "/tmp/bats-run-55856/runc.Li7our/bundle", # "rootfs": "/tmp/bats-run-55856/runc.Li7our/bundle/rootfs", # "created": "2022-10-26T04:53:22.610288998Z", # "owner": "" # } # runc checkpoint --work-path ./work-dir test_busybox (status=0): # # runc state test_busybox (status=1): # time="2022-10-26T04:53:22Z" level=error msg="container does not exist" # runc restore -d --work-path ./work-dir --console-socket /tmp/bats-run-55856/runc.Li7our/tty/sock test_busybox (status=1): # time="2022-10-26T04:53:22Z" level=error msg="criu failed: type NOTIFY errno 0\nlog file: work-dir/restore.log" # (00.033959) pie: 1: `- skip pagemap # (00.033961) pie: 1: `- skip pagemap # (00.033963) pie: 1: `- skip pagemap # (00.033965) pie: 1: `- skip pagemap # (00.033967) pie: 1: `- skip pagemap # (00.033995) Error (criu/cr-restore.c:1492): 59729 stopped by signal 11: Segmentation fault # (00.034254) mnt: Switching to new ns to clean ghosts # (00.034497) Error (criu/cr-restore.c:2447): Restoring FAILED. -- not ok 36 runc create sets up user before chdir to cwd if needed # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/cwd.bats, line 34) # `requires rootless rootless_idmap' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 46 runc delete --force in cgroupv1 with subcgroups # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/delete.bats, line 76) # `requires cgroups_v1 root cgroupns' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 53 runc exec vs systemctl daemon-reload # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/dev.bats, line 131) # `requires systemd root' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 71 runc exec --cgroup sub-cgroups [v1] # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/exec.bats, line 191) # `requires root cgroups_v1' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 88 runc run [rw bind mount of a ro fuse sshfs mount] # (from function `setup' in test file tests/integration/mounts_sshfs.bats, line 15) # `if ! $sshfs -o ro rootless@localhost: "$DIR"; then' failed # /tmp/bats-run-55856/bats.66381.src: line 15: sshfs: command not found # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable # fusermount: failed to unmount /tmp/bats-run-55856/fuse-sshfs: Invalid argument # umount: /tmp/bats-run-55856/fuse-sshfs: not mounted. -- not ok 123 runc run [seccomp] (SCMP_ACT_NOTIFY old kernel) # (from function `setup' in test file tests/integration/seccomp-notify-compat.bats, line 6) # `if [[ "$KERNEL_MAJOR" -gt 5 || ("$KERNEL_MAJOR" -eq 5 && "$KERNEL_MINOR" -ge 6) ]]; then' failed # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable -- not ok 160 update cpu period in a pod cgroup with pod limit set # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/update.bats, line 394) # `requires cgroups_v1' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable # rmdir: failed to remove '/sys/fs/cgroup//runc-cgroups-integration-test': Device or resource busy -- not ok 164 update cpuset cpus range via v2 unified map # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/update.bats, line 563) # `requires systemd cgroups_v2 more_than_8_core cgroups_cpuset' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable # rmdir: failed to remove '/sys/fs/cgroup//runc-cgroups-integration-test': Device or resource busy not ok 165 update rt period and runtime # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/update.bats, line 589) # `requires cgroups_v1 cgroups_rt no_systemd' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable # rmdir: failed to remove '/sys/fs/cgroup//runc-cgroups-integration-test': Device or resource busy -- not ok 171 userns with bind mount before a cgroupfs mount # (from function `requires' in file tests/integration/helpers.bash, line 471, # in test file tests/integration/userns.bats, line 72) # `requires cgroups_v1' failed # runc spec (status=0): # # /usr/lib/bats-core/test_functions.bash: line 57: BATS_TEARDOWN_STARTED: unbound variable ```
utam0k commented 1 year ago

@YJDoc2 Thanks for creating the issue. Please ignore the tests related checkpoint in this issue.

utam0k commented 1 year ago

@higuruchi Do you have interested in this with @YJDoc2 ? If you are busy, please feel free to tell me know ;)

higuruchi commented 1 year ago

@utam0k After 3 weeks, I will have some spare time, so I would like to try it !.

lengrongfu commented 1 year ago

@YJDoc2 Hi,How did you execute this integration test, can you give more specific steps?

utam0k commented 1 year ago

@YJDoc2 May I ask you to address the comment? https://github.com/containers/youki/issues/1305#issuecomment-1458260294

YJDoc2 commented 1 year ago

@lengrongfu Apologies, I missed the comment completely :sweat: :sweat: @utam0k Thanks for pinging me :pray: I'll comment the steps for running the tests later today. Apologies again :pray:

utam0k commented 1 year ago

@YJDoc2 If you are busy, please it on TODO on README or something

YJDoc2 commented 1 year ago

@lengrongfu , so the way I did it was :

In case you want to run it locally and not through vagrant, it might be possible, but you'll need to install go locally, as well as replace the usual runc binary with youki binary (i.e. copy youki binary to where runc is, delete/rename runc, and rename youki to runc). As I need to use the original runc for other stuff, I prefer the vagrat way.