-
Notifications
You must be signed in to change notification settings - Fork 324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
checkpoint of contianer with userns is not working #1207
Comments
@Luap99 is this still an issue? Do you think we could fix that in the near future somehow? cc @adrianreber |
I would assume so, nothing has changed and my reproducer still fails with the same error message In general restoring the network namespace for a userns is currently broken anyways with the runtime restore API as the process is started right away so podman has no chance to configure the netns after oci runtime created the namespaces as the process is started right away (unlike the normal container startup sequence with uses two steps for create then start so we can configure the netns in between there without issues). But I guess crun first should be able to checkpoint before we can work on the restore side. |
@adrianreber @rst0git could you take a look? |
When we brought checkpoint/restore from runc to crun we did not implement this because nobody seems to be using it. checkpoint/restore works only on containers which are started by root because CRIU needs root (there is a new capability to run as non-root but the development has kind of stalled). I am not aware of people complaining about containers running as root and user namespaces not working with CRIU. At this point if feels like really low priority. For testing runc can be used to see if it works. For restore we take the information about the network namespace and add it to |
Relevant line from the log:
(00.120964) Error (criu/mount.c:753): mnt: 2049:./dev/urandom doesn't have a proper root mount
Full log: dump.log
When the --uidmap argument is not used it works correctly, it works with runc but there is still a podman bug: containers/podman#18502
The text was updated successfully, but these errors were encountered: