-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fail to run privileged nested container, on fedora 41 #24692
Comments
Can you provide the actual podman commands used please. |
Sure see Steps to reproduce the issue But the command itself is step number 7
qm is running with the following quadlet The issue is nested container inside qm In case you need ready env in TestingFarm, i can prepare it for you |
Ok I see, your outer container sets a low file limit and you do not give the container CAP_SYS_RESOURCE so it cannot increase it. Since commit The alternative is for podman to not assume we can increase the limits as root (check for CAP_SYS_RESOURCE) and if not just clamp it like with the rootless case: #24508 (comment) cc @giuseppe |
commit 5ebba75 implemented this behaviour for rootless users and later commit 0a69aef changed it when in a user namespace, but the same limitation exists for root without CAP_SYS_RESOURCE. Change the check to use the clamp to the current values if running without CAP_SYS_RESOURCE. Closes: containers#24692 Signed-off-by: Giuseppe Scrivano <[email protected]>
yes good analysis. I've opened a PR to fix it: #24696 |
commit 5ebba75 implemented this behaviour for rootless users and later commit 0a69aef changed it when in a user namespace, but the same limitation exists for root without CAP_SYS_RESOURCE. Change the check to use the clamp to the current values if running without CAP_SYS_RESOURCE. Closes: containers#24692 Signed-off-by: Giuseppe Scrivano <[email protected]>
@Luap99 thanks Add this to quadlet drop-in
Did the trick So to understand the ulimit explanation and in internal container So do i have to change one of those? |
commit 5ebba75 implemented this behaviour for rootless users and later commit 0a69aef changed it when in a user namespace, but the same limitation exists for root without CAP_SYS_RESOURCE. Change the check to use the clamp to the current values if running without CAP_SYS_RESOURCE. Closes: containers#24692 Signed-off-by: Giuseppe Scrivano <[email protected]>
Issue Description
Describe your issue
Fail to run privileged nested container, on fedora 41
Steps to reproduce the issue
Steps to reproduce the issue
dnf copr enable -y @centos-automotive-sig/bluechi-snapshot "Fedora-41-$(arch)"
dnf copr enable -y rhcontainerbot/qm "fedora-41-$(arch)"
dnf install -y qm
bash -x /usr/share/qm/setup
Describe the results you received
Describe the results you received
Describe the results you expected
Describe the results you expected
Nested container should run without failures.host-podman-info.txt
qm-podman-info.txt
Nested podman container is run successfully for c9s
https://artifacts.dev.testing-farm.io/0d73bf4f-14b2-43c9-8bcf-27b07f3406fb/work-kvm-tier-05glnpgbx/plans/e2e/kvm-tier-0/execute/data/guest/default-0/tests/qm-sanity-test/check_qm_podman_quadlet_is_ok-4/output.txt
podman info output
Podman in a container
Yes
Privileged Or Rootless
Privileged
Upstream Latest Release
Yes
Additional environment details
Additional environment details
To understand tested enviroment please refer this README
https://github.com/containers/qm?tab=readme-ov-file#qm-is-a-containerized-environment-for-running-functional-safety-qm-quality-management-software
Additional information
more details exist here
qm#660
This one containers/qm#666 (comment)
Did not help to solve the issue
The text was updated successfully, but these errors were encountered: