-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug in runc causes kubectl exec
failure after systemd daemon-reload
#6064
Comments
Is this a problem with the runc binary that we're including, or the runc module used by containerd? They're not necessarily the same. |
I'll think it should be easy to update runc in both locations, but I echo this comment: containerd/containerd#7219 (comment) |
According to opencontainers/runc#3551 (comment) it has to do with the systemd group driver, and systemd mucking about with permissions when it reloads. Interesting... |
Unsure. |
kubectl exec
failure after systemd daemon-reload
It's the binary (unless your software is using runc/libcontainer/cgroups/systemd package to create systemd units on a cgroup v1 system, in which case it's also the vendored packages). |
Validated on with /Environment DetailsInfrastructure
Node(s) CPU architecture, OS, and Version:
Cluster Configuration:
Testing Steps
|
Is your feature request related to a problem? Please describe.
Yes. The runc version in k3s' containerd version 1.6.6 contains a regression that prevents anyone from executing a command and attaching to the container's TTY (
exec -it
) whenever someone runssystemctl daemon-reload
. Alternatively, the user may run into this issue on SELinux-enforced systems.containerd/containerd#7219
Describe the solution you'd like
I am not sure how k3s maintainers usually handle these issues, but I would very much like to see a k3s release that updates runc to 1.1.4.
Describe alternatives you've considered
Downgrade k3s to 1.23.
Additional context
The text was updated successfully, but these errors were encountered: