Skip to content

Debian SID: runc: exec failed: unable to start container process #19552

@cevich

Description

@cevich

Issue Description

While updating Debian SID CI VM images the podman exec cannot be invoked integration test is failing across the whole matrix.

Steps to reproduce the issue

Steps to reproduce the issue

  1. Update .cirrus.yml to use the c20230807t144831z-f38f37d13 Debian images (or later) containing runc-1.1.5+ds1-1+b2-amd64.
  2. Let CI run

Describe the results you received

Enter [BeforeEach] TOP-LEVEL - /var/tmp/go/src/github.com[/containers/podman/test/e2e/common_test.go:109](https://github.com/containers/podman/blob/407cfe53d27dc546c6b66da03a3e2eb46b1436fa/test/e2e/common_test.go#L109) @ 08/07/23 19:56:21.318
           ← Exit  [BeforeEach] TOP-LEVEL - /var/tmp/go/src/github.com[/containers/podman/test/e2e/common_test.go:109](https://github.com/containers/podman/blob/407cfe53d27dc546c6b66da03a3e2eb46b1436fa/test/e2e/common_test.go#L109) @ 08/07/23 19:56:21.318 (0s)
           → Enter [It] podman exec cannot be invoked - /var/tmp/go/src/github.com[/containers/podman/test/e2e/exec_test.go:410](https://github.com/containers/podman/blob/407cfe53d27dc546c6b66da03a3e2eb46b1436fa/test/e2e/exec_test.go#L410) @ 08/07/23 19:56:21.319
           # podman [options] run --http-proxy=false --name test1 -d quay.io/libpod/alpine:latest top
           d18f8f3da39d3845995d9bb56d9e9a7a04fd0ac9ef654af228eb2f5f79b6b8e7
           # podman [options] exec test1 /etc
           Error: OCI runtime error: runc: exec failed: unable to start container process: exec: "/etc": is a directory

           [FAILED] Failure recorded during attempt 1:
           Expected
               <int>: 255
           to match exit code:
               <int>: 126
           In [It] at: /var/tmp/go/src/github.com[/containers/podman/test/e2e/exec_test.go:417](https://github.com/containers/podman/blob/407cfe53d27dc546c6b66da03a3e2eb46b1436fa/test/e2e/exec_test.go#L417) @ 08/07/23 19:56:22.161
         
           Full Stack Trace
             github.com/containers/podman/v4/test/e2e.glob..func23.24()
             	/var/tmp/go/src/github.com[/containers/podman/test/e2e/exec_test.go:417](https://github.com/containers/podman/blob/407cfe53d27dc546c6b66da03a3e2eb46b1436fa/test/e2e/exec_test.go#L417) +0x1af
           ← Exit  [It] podman exec cannot be invoked - /var/tmp/go/src/github.com[/containers/podman/test/e2e/exec_test.go:410](https://github.com/containers/podman/blob/407cfe53d27dc546c6b66da03a3e2eb46b1436fa/test/e2e/exec_test.go#L410) @ 08/07/23 19:56:22.161 (842ms)

Describe the results you expected

Debian integration test matrix should pass.

podman info output

host:
  arch: amd64
  buildahVersion: 1.32.0-dev
  cgroupControllers:
  - cpuset
  - cpu
  - cpuacct
  - blkio
  - memory
  - devices
  - freezer
  - net_cls
  - perf_event
  - net_prio
  - hugetlb
  - pids
  - rdma
  - misc
  cgroupManager: systemd
  cgroupVersion: v1
  conmon:
    package: conmon_2.1.6+ds1-1_amd64
    path: /usr/bin/conmon
    version: 'conmon version 2.1.6, commit: unknown'
  cpuUtilization:
    idlePercent: 25.24
    systemPercent: 29
    userPercent: 45.76
  cpus: 2
  databaseBackend: boltdb
  distribution:
    codename: trixie
    distribution: debian
    version: "13.13"
  eventLogger: journald
  freeLocks: 1931
  hostname: cirrus-task-4722790843023360
  idMappings:
    gidmap: null
    uidmap: null
  kernel: 6.4.0-1-cloud-amd64
  linkmode: dynamic
  logDriver: journald
  memFree: 2754945024
  memTotal: 4115283968
  networkBackend: netavark
  networkBackendInfo:
    backend: netavark
    dns:
      package: aardvark-dns_1.4.0-4_amd64
      path: /usr/lib/podman/aardvark-dns
      version: aardvark-dns 1.4.0
    package: netavark_1.4.0-3_amd64
    path: /usr/lib/podman/netavark
    version: netavark 1.4.0
  ociRuntime:
    name: runc
    package: runc_1.1.5+ds1-1+b2_amd64
    path: /usr/bin/runc
    version: |-
      runc version 1.1.5+ds1
      commit: 1.1.5+ds1-1+b2
      spec: 1.1.0-rc.3
      go: go1.20.7
      libseccomp: 2.5.4
  os: linux
  pasta:
    executable: /usr/bin/pasta
    package: passt_0.0~git20230627.289301b-1_amd64
    version: |
      pasta unknown version
      Copyright Red Hat
      GNU Affero GPL version 3 or later <https://www.gnu.org/licenses/agpl-3.0.html>
      This is free software: you are free to change and redistribute it.
      There is NO WARRANTY, to the extent permitted by law.
  remoteSocket:
    exists: false
    path: /run/podman/podman.sock
  security:
    apparmorEnabled: true
    capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
    rootless: false
    seccompEnabled: true
    seccompProfilePath: /usr/share/containers/seccomp.json
    selinuxEnabled: false
  serviceIsRemote: false
  slirp4netns:
    executable: /usr/bin/slirp4netns
    package: slirp4netns_1.2.0-1_amd64
    version: |-
      slirp4netns version 1.2.0
      commit: 656041d45cfca7a4176f6b7eed9e4fe6c11e8383
      libslirp: 4.7.0
      SLIRP_CONFIG_VERSION_MAX: 4
      libseccomp: 2.5.4
  swapFree: 0
  swapTotal: 0
  uptime: 0h 35m 22.00s
plugins:
  authorization: null
  log:
  - k8s-file
  - none
  - passthrough
  - journald
  network:
  - bridge
  - macvlan
  - ipvlan
  volume:
  - local
registries:
  docker.io:
    Blocked: false
    Insecure: false
    Location: mirror.gcr.io
    MirrorByDigestOnly: false
    Mirrors: null
    Prefix: docker.io
    PullFromMirror: ""
  docker.io/library:
    Blocked: false
    Insecure: false
    Location: quay.io/libpod
    MirrorByDigestOnly: false
    Mirrors: null
    Prefix: docker.io/library
    PullFromMirror: ""
  localhost:5000:
    Blocked: false
    Insecure: true
    Location: localhost:5000
    MirrorByDigestOnly: false
    Mirrors: null
    Prefix: localhost:5000
    PullFromMirror: ""
  search:
  - docker.io
  - quay.io
  - registry.fedoraproject.org
store:
  configFile: /etc/containers/storage.conf
  containerStore:
    number: 0
    paused: 0
    running: 0
    stopped: 0
  graphDriverName: overlay
  graphOptions: {}
  graphRoot: /var/lib/containers/storage
  graphRootAllocated: 211116445696
  graphRootUsed: 7050473472
  graphStatus:
    Backing Filesystem: extfs
    Native Overlay Diff: "true"
    Supports d_type: "true"
    Using metacopy: "false"
  imageCopyTmpDir: /var/tmp
  imageStore:
    number: 0
  runRoot: /run/containers/storage
  transientStore: false
  volumePath: /var/lib/containers/storage/volumes
version:
  APIVersion: 4.7.0-dev
  Built: 1691435594
  BuiltTime: Mon Aug  7 19:13:14 2023
  GitCommit: 407cfe53d27dc546c6b66da03a3e2eb46b1436fa
  GoVersion: go1.20.7
  Os: linux
  OsArch: linux/amd64
  Version: 4.7.0-dev

Podman in a container

Yes

Privileged Or Rootless

Rootless

Upstream Latest Release

Yes

Additional environment details

Representative annotated log

Additional information

In #19541 this test is skipped with reference to this issue.

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.stale-issue

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions