-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update runc binary to 1.2.1 #10877
update runc binary to 1.2.1 #10877
Conversation
|
@AkihiroSuda It might be a regression from this PR: #10607. See this issue, which is already fixed, that was a regression too: #10847. Maybe you can try to revert #10741 and #10607 in this PR, just to see if that fixes the issue on CI? |
/retest |
@AkihiroSuda so it seems that is the culprit! :) There might be another field in the struct that #10607 forgot to set (I mean, like #10741 that added one more field to the struct used to create the userns). Can you try to debug this further? I will join forces as soon as I get some time (but maybe not this week :-/). The other option might be a revert. I don't know how close the final containerd 2.0.0 release is. |
|
internal/cri: simplify netns setup with pinned userns
It looks like there is bug in runc side... |
Opened an issue in runc repo: |
runc creates the userns and then the other namespaces to avoid a bug with selinux and mqueue in the kernel, it seems to be what we hit here. See here: https://github.com/opencontainers/runc/blob/e37371ebd791114e4f23444ab1fbcae87ac6b928/libcontainer/nsenter/nsexec.c#L866-L871:
It seems creating the namespaces in two steps, as runc is doing it, might be a way forward. @AkihiroSuda are you sure that crun is tested on vagrant here in containerd? Because only vagrant is failing in this PR, as far as I can see @fuweid any thoughts? :) |
Sorry, I was wrong 😅 |
assumming the issue is what I mentioned in the last comment, it doesn't seem simple to fix. It is quite limited what we can do in go. Currently we create a process with the userns and the netns here: https://github.com/containerd/containerd/blob/main/pkg/sys/unshare_linux.go#L48-L63 We can't easily run something inside that process, because we are using /proc/self/exe as the command to exec (but with ptrace so we don't really exec it). So doing first the unshare for userns and then for the netns doesn't seem like a 1 line fix, at least. What I can think is to do something like this instead: https://github.com/containers/storage/blob/main/pkg/idmap/idmapped_utils.go#L53. But the child does the creation of the other namespaces. There might be a perf hit bigger than before, though, as we are indeed cloning the process, starting the go-runtime, etc. I'm unsure if revert is simpler for 2.0 or if we should try that. EDIT: Ooor, what happens if instead of using cloneFlags and unshareFlags, we pass just one of those? (like the userns and the netns both in cloneFlags or both in unshareFlags here: https://github.com/containerd/containerd/pull/10607/files#diff-106945d93d68e955471ccab149a1302ebb7214c1832b7df0bbd8855992ddf397R52-R53). Maybe the kernel does the right thing in that case? It seems we need to map the userns before creating the other ns. We need to check the code to see what is happening here, it might be fun to write a patch to improve it (so the other namespaces are created after the userns is mapped). @fuweid any thoughts or other ideas? It would be great to first validate my theory of what is the bug, though. |
Thanks for the information. I will take a look in this week. We can rolllback first and create a tracking issue for this. |
I actually ran the test with crun + SELinux, and it seems green. |
1eb6b0b
to
f6ea4a7
Compare
internal/cri: simplify netns setup with pinned userns
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM on green
The |
/cherrypick release/1.7 |
/cherrypick release/1.6 |
@samuelkarp: new pull request created: #10940 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@samuelkarp: new pull request created: #10941 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
https://github.com/opencontainers/runc/releases/tag/v1.2.0
https://github.com/opencontainers/runc/releases/tag/v1.2.1