diff --git a/hack/podman_cleanup_tracer.bt b/hack/podman_cleanup_tracer.bt index 42c46cde9a..f2b480c056 100755 --- a/hack/podman_cleanup_tracer.bt +++ b/hack/podman_cleanup_tracer.bt @@ -149,3 +149,17 @@ tracepoint:syscalls:sys_enter_write $offset += $len } } + +// HACK: debug for https://github.com/containers/podman/issues/23913 +// The test uses "ebpf-debug-23913" volume name and because and volume rm +// will delete the path we can trap the process here to find out who actually +// deletes it. +tracepoint:syscalls:sys_enter_unlink* +/ strcontains(str(args.pathname), "ebpf-debug-23913") / +{ + printf("Special issue 23913 volume deleted by pid %d: ", pid); + // This can fail to open the file it is done in user space and + // thus racy if the process exits quickly. + cat("/proc/%d/cmdline", pid); + print(""); +} diff --git a/test/system/600-completion.bats b/test/system/600-completion.bats index fe3da843d3..1f300b0565 100644 --- a/test/system/600-completion.bats +++ b/test/system/600-completion.bats @@ -270,7 +270,8 @@ function _check_no_suggestions() { random_image_name="i-$(safename)" random_image_tag=$(random_string 5) random_network_name="n-$(safename)" - random_volume_name="v-$(safename)" + # Do not change the suffix, it is special debug for #23913 + random_volume_name="v-$(safename)-ebpf-debug-23913" random_secret_name="s-$(safename)" random_secret_content=$(random_string 30) secret_file=$PODMAN_TMPDIR/$(random_string 10)