-
Notifications
You must be signed in to change notification settings - Fork 599
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alpine test/build fails #2313
Comments
It was probably introduced by guidosarducci/musl@25e6fee Cc: @richfelker |
Starting with the musl v1.2.4~69, _GNU_SOURCE doesn't set _LARGEFILE64_SOURCE. Fixes checkpoint-restore#2313 Signed-off-by: Andrei Vagin <[email protected]>
Starting with the musl v1.2.4~69, _GNU_SOURCE doesn't set _LARGEFILE64_SOURCE. Fixes checkpoint-restore#2313 Signed-off-by: Andrei Vagin <[email protected]>
Starting with the musl v1.2.4~69, _GNU_SOURCE doesn't set _LARGEFILE64_SOURCE. Fixes checkpoint-restore#2313 Signed-off-by: Andrei Vagin <[email protected]>
Starting with the musl v1.2.4~69, _GNU_SOURCE doesn't set _LARGEFILE64_SOURCE. Fixes checkpoint-restore#2313 Signed-off-by: Andrei Vagin <[email protected]>
https://github.com/checkpoint-restore/criu/actions/runs/7345320063/job/19998316100 |
It is required to C/R iptables rules. Fixes checkpoint-restore#2313 Signed-off-by: Andrei Vagin <[email protected]>
The following error causes this test to fail in
|
In addition to the error above,
For this input, the nft tool shows the following error:
This test works with nftables v1.0.7, where the value of table ip filter {
chain INPUT {
type filter hook input priority filter; policy accept;
counter packets 0 bytes 0 jump CRIU
- iifname "lo" ip protocol tcp xt match "conntrack" counter packets 3 bytes 172 accept
+ iifname "lo" meta l4proto tcp ct state new,established counter packets 3 bytes 172 accept
counter packets 0 bytes 0 drop
}
chain CRIU {
meta mark 0x0000c114 counter packets 0 bytes 0 accept
counter packets 0 bytes 0 drop
}
chain OUTPUT {
type filter hook output priority filter; policy accept;
counter packets 0 bytes 0 jump CRIU
}
} The following steps can be used to replicate the problem in Alpine container: $ nft --version
nftables v1.0.9 (Old Doc Yak #3)
$ iptables-nft --version
iptables v1.8.10 (nf_tables)
$ iptables-translate -A INPUT -i lo -p tcp -m state --state NEW,ESTABLISHED -j ACCEPT
nft 'add rule ip filter INPUT iifname "lo" ip protocol tcp ct state new,established counter accept'
$ iptables-nft -A INPUT -i lo -p tcp -m state --state NEW,ESTABLISHED -j ACCEPT
$ nft list ruleset | tee dump.txt
# Warning: table ip filter is managed by iptables-nft, do not touch!
table ip filter {
chain INPUT {
type filter hook input priority filter; policy accept;
iifname "lo" ip protocol tcp xt match "conntrack" counter packets 0 bytes 0 accept
}
}
$ nft flush ruleset
$ nft -f dump.txt
dump.txt:4:32-51: Error: unsupported xtables compat expression, use iptables-nft with this ruleset
iifname "lo" ip protocol tcp xt match "conntrack" counter packets 0 bytes 0 accept
^^^^^^^^^^^^^^^^^^^^
|
Starting with the musl v1.2.4~69, _GNU_SOURCE doesn't set _LARGEFILE64_SOURCE. Fixes checkpoint-restore#2313 Signed-off-by: Andrei Vagin <[email protected]>
Starting with the musl v1.2.4~69, _GNU_SOURCE doesn't set _LARGEFILE64_SOURCE. Fixes #2313 Signed-off-by: Andrei Vagin <[email protected]>
https://github.com/checkpoint-restore/criu/actions/runs/7171767723/job/19527463844
The text was updated successfully, but these errors were encountered: