-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[rootless+"privileged"] creating device nodes caused: open /..<snipped>../dev/tty: no such device or address #2450
Labels
Comments
Reproducible without CRI as well: $ rootlesskit runc --systemd-cgroup run foo
WARN[0000] exit status 1
ERRO[0000] container_linux.go:353: starting container process caused: process_linux.go:459: container init caused: rootfs_linux.go:70: creating device nodes caused: open /home/suda/tmp/runctest/rootfs/dev/tty: no such device or address
[rootlesskit:child ] error: command [runc --systemd-cgroup run foo] exited: exit status 1
[rootlesskit:parent] error: child exited: exit status 1 {
"ociVersion": "1.0.2-dev",
"process": {
"terminal": true,
"user": {
"uid": 0,
"gid": 0
},
"args": [
"sh"
],
"env": [
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"TERM=xterm"
],
"cwd": "/",
"capabilities": {
"bounding": [
"CAP_AUDIT_WRITE",
"CAP_KILL",
"CAP_NET_BIND_SERVICE"
],
"effective": [
"CAP_AUDIT_WRITE",
"CAP_KILL",
"CAP_NET_BIND_SERVICE"
],
"inheritable": [
"CAP_AUDIT_WRITE",
"CAP_KILL",
"CAP_NET_BIND_SERVICE"
],
"permitted": [
"CAP_AUDIT_WRITE",
"CAP_KILL",
"CAP_NET_BIND_SERVICE"
],
"ambient": [
"CAP_AUDIT_WRITE",
"CAP_KILL",
"CAP_NET_BIND_SERVICE"
]
},
"rlimits": [
{
"type": "RLIMIT_NOFILE",
"hard": 1024,
"soft": 1024
}
],
"noNewPrivileges": true
},
"root": {
"path": "rootfs",
"readonly": true
},
"hostname": "runc",
"mounts": [
{
"destination": "/proc",
"type": "proc",
"source": "proc"
},
{
"destination": "/dev",
"type": "tmpfs",
"source": "tmpfs",
"options": [
"nosuid",
"strictatime",
"mode=755",
"size=65536k"
]
},
{
"destination": "/dev/pts",
"type": "devpts",
"source": "devpts",
"options": [
"nosuid",
"noexec",
"newinstance",
"ptmxmode=0666",
"mode=0620",
"gid=5"
]
},
{
"destination": "/dev/shm",
"type": "tmpfs",
"source": "shm",
"options": [
"nosuid",
"noexec",
"nodev",
"mode=1777",
"size=65536k"
]
},
{
"destination": "/dev/mqueue",
"type": "mqueue",
"source": "mqueue",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/sys",
"type": "sysfs",
"source": "sysfs",
"options": [
"nosuid",
"noexec",
"nodev",
"ro"
]
},
{
"destination": "/sys/fs/cgroup",
"type": "cgroup",
"source": "cgroup",
"options": [
"nosuid",
"noexec",
"nodev",
"relatime",
"ro"
]
}
],
"linux": {
"cgroupsPath": "user.slice:runc:foo",
"resources": {
"devices": [
{
"allow": true,
"access": "rwm"
}
]
},
"devices": [
{
"path": "/dev/tty",
"type": "c",
"major": 5,
"minor": 0,
"fileMode": 8630,
"uid": 65534,
"gid": 65534
}
],
"namespaces": [
{
"type": "pid"
},
{
"type": "network"
},
{
"type": "ipc"
},
{
"type": "uts"
},
{
"type": "mount"
}
],
"maskedPaths": [
"/proc/acpi",
"/proc/asound",
"/proc/kcore",
"/proc/keys",
"/proc/latency_stats",
"/proc/timer_list",
"/proc/timer_stats",
"/proc/sched_debug",
"/sys/firmware",
"/proc/scsi"
],
"readonlyPaths": [
"/proc/bus",
"/proc/fs",
"/proc/irq",
"/proc/sys",
"/proc/sysrq-trigger"
]
}
}
The issue is not reproducible with |
AkihiroSuda
changed the title
[rootless+cgroup2+CRI+"privileged"] creating device nodes caused: open /..<snipped>../dev/tty: no such device or address
[rootless+cgroup2+"privileged"] creating device nodes caused: open /..<snipped>../dev/tty: no such device or address
Jun 2, 2020
AkihiroSuda
changed the title
[rootless+cgroup2+"privileged"] creating device nodes caused: open /..<snipped>../dev/tty: no such device or address
[rootless+"privileged"] creating device nodes caused: open /..<snipped>../dev/tty: no such device or address
Jun 2, 2020
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 2, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 2, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 3, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 5, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 5, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 5, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 8, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 8, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
AkihiroSuda
added a commit
to AkihiroSuda/runc
that referenced
this issue
Jun 8, 2020
Fix opencontainers#2450 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Should have been closed in #2522 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
On rootless+cgroup2(systemd)+CRI, creating a "privileged" container (which is not really privileged) fails with
creating device nodes caused: open /..<snipped>.../dev/tty: no such device or address
.This error is not reproducible with
docker (podman) run --privileged
.The repro step is same as containers/crun#382 but the error is different.
Repro
https://github.com/AkihiroSuda/critest-rootless-cgroup2/tree/v0.0.3
runc dbe5aca
Ubuntu 20.04
The text was updated successfully, but these errors were encountered: