-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
QM:podman run is failing in Fedora 41 #666
Comments
can you please try with upstream Podman? Could be fixed by containers/podman#24547 Do you have a Podman command line that shows the error? Are you running as root? Is it inside a user namespace? |
the command goes as following
Yes it is run as root. Taking a look at pr24547 repo updates-testing? |
thanks, that is indeed nested podman, so I think the PR I have mentioned fixes your problem |
same problem with this
still failing
With --log-level debug
|
have you updated the podman inside the image? |
yes, it is partitioned file-system in qm repo not an image
|
do you prefer if we move this issue to podman or do you create a new one? Please provide a reproducer using just podman (both the external container, and the nested one). Please specify how the external container was created. |
Sure thanks I will do that @giuseppe thanks, |
KVM tier-0 tests dedicated for kvm tests. It checks /dev/kvm. nested virtualization exist. In case not, it removes qm_mount_bind_kvm rpm, in case installed by packit. Test check_qm_setup_succeeds is the irst test to run, The test check repo setup script is working properly Packit support for nested kvm support added currently for fedora/c9s Kvm tests should be introduced later. Introducing QM quadlets drop-ins for extending qm.container base quadlet. Using as single point of configuration. Replacing the usage of containers.conf Fedora is failing due to containers#666 Signed-off-by: Yariv Rachmani <[email protected]>
@giuseppe thanks |
@dougsland based on the issue in containers. So from here But this value is unlimited for QM, this requires CAP_RESOURCE DropCapability=sys_resource Asking for advise here Summery of the issue Note: |
KVM tier-0 tests dedicated for kvm tests. It checks /dev/kvm. nested virtualization exist. In case not, it removes qm_mount_bind_kvm rpm, in case installed by packit. Test check_qm_setup_succeeds is the irst test to run, The test check repo setup script is working properly Packit support for nested kvm support added currently for fedora/c9s Kvm tests should be introduced later. Introducing QM quadlets drop-ins for extending qm.container base quadlet. Using as single point of configuration. Replacing the usage of containers.conf Fedora is failing due to containers#666 Signed-off-by: Yariv Rachmani <[email protected]>
OK there is another option: Added this to quadlet drop-in
HOST [root@90f2f529-751d-45bd-8bd6-5b67ac6e4e59 ~]# podman exec qm ulimit -n -u -H
|
KVM tier-0 tests dedicated for kvm tests. It checks /dev/kvm. nested virtualization exist. In case not, it removes qm_mount_bind_kvm rpm, in case installed by packit. Test check_qm_setup_succeeds is the irst test to run, The test check repo setup script is working properly Packit support for nested kvm support added currently for fedora/c9s Kvm tests should be introduced later. Introducing QM quadlets drop-ins for extending qm.container base quadlet. Using as single point of configuration. Replacing the usage of containers.conf Fedora is failing due to #666 Signed-off-by: Yariv Rachmani <[email protected]>
So. my understanding is that systemd launches the qm container with a limit max open files, and then when podman runs in the qm container it tries to set the subcontainer max open file to what it thinks is the "default". However, this value is higher than the limit systemd set, so we fail. The real fix is containers/podman#24696 which means podman will never try to raise the max if it doesn't have the capability to do so. Now, possible workarounds are: Update to the fixed podman: This is the long term fix, but may be hard atm. Give podman the capability to raise the max in the qm container. This is obviously unwanted, we might as well just drop the max we set, as it makes it worthless, and we set it for a reason. Change the default max in containers.conf inside the qm container so podman doesn't try to raise the max. This is what i think we should do for now. |
OK, that did the trick, adding this into /etc/qm/containers/containers.conf default_ulimits = [ |
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Fix setup script, unmount qm nounts before dnf remove qm Signed-off-by: Yariv Rachmani <[email protected]>
Fedora tests run only on kvm-tier-0 This commit resolves containers#666, till full support in podman c9s, added fix in set-ffi-env-e2e Fix setup script, unmount qm nounts before dnf remove qm Signed-off-by: Yariv Rachmani <[email protected]>
During the work on #660 fedora QM podman run is failing with the following error while spawning rootful container inside qm
https://artifacts.dev.testing-farm.io/0b3cd818-fbdb-40a1-bcc8-d6d7e81ead39/
TODO:
Add update with extra details
podman infos
podman-qm-info.json
podman-host-info.json
Running podman logs, attached reveal this, podman-err.log
[conmon:d]: failed to write to /proc/self/oom_score_adj: Permission denied
No selinux errors
Note when replacing quadlet, see link, Podman args with --privileged container is forked successfully
https://github.com/containers/qm/blob/main/qm.container
Additional Info
Podman inspect log
podman-inspect.log
Ulimits
The text was updated successfully, but these errors were encountered: