[From nobody Fri Apr  3 05:33:06 2026
Received: (at submit) by bugs.debian.org; 2 Apr 2026 20:44:41 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-19.1 required=4.0 tests=BAYES_00,
 BODY_INCLUDES_PACKAGE,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,
 DKIM_VALID_EF,FOURLA,HAS_PACKAGE,SPF_HELO_PASS,SPF_PASS,
 XMAILER_REPORTBUG autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 63; hammy, 149; neutral, 135; spammy,
 1. spammytokens:0.997-1--UD:B.C
 hammytokens:0.000-+--HTo:N*Debian, 
 0.000-+--H*Ad:N*Bug, 0.000-+--H*Ad:N*Tracking, 0.000-+--HTo:N*System,
 0.000-+--HTo:N*Bug
Return-path: &lt;debian-bugs-20260402@launay.org&gt;
Received: from smtp2.cusae.com ([2a01:66c0:1::25:2]:35121)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.96) (envelope-from &lt;debian-bugs-20260402@launay.org&gt;)
 id 1w8Ou7-00887h-2O for submit@bugs.debian.org;
 Thu, 02 Apr 2026 20:44:40 +0000
Received: from gw-home.launay.org (lfbn-dij-1-659-123.w90-100.abo.wanadoo.fr
 [90.100.114.123])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange x25519 server-signature RSA-PSS (4096 bits) server-digest SHA256)
 (No client certificate requested)
 (Authenticated sender: asl@launay.org)
 by smtp2.cusae.com (Postfix) with ESMTPSA id 962731A204B;
 Thu, 02 Apr 2026 22:35:42 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=launay.org; s=smtp;
 t=1775162142; bh=7vlejv9peXGpk64NCVkB0HZdMcnxq2nnCvvvLVum0ec=;
 h=Content-Type:MIME-Version:From:To:Subject:Message-ID:Date:From:
 Content-Type:Message-ID:MIME-Version:Date:In-Reply-To:References:
 Subject:To;
 b=YR3keCucEyH77nrnQKVvkuLK7tqR3sN9kvZv5xb7Az4vKoWr/w38AowkrBYPsWT4c
 q3ZyWX0bHGVSZt5DUP38rYqn+OuawLGTIxoEUTtBvR7B1ft4KRtZWoCZUt2zHxw//J
 ztuTQP3ZppvXNK2jg63Gd6dAIZP7E4fnWUWyq33r4oacKuaPeDEjzcieHCvF5Kskj8
 zWoH6j8jqcdFH9rxTIIP67OtV5M1zWOt5SGgwQZM/A4Yi9PGw7RtTl6qOiIllMgTBA
 7Txv+iW1/OOkLKS0P52zvAZEaQNaQFc4jwpDJ7H8uh3JmR2x3UPz3lq2UIbQaDhfrd
 6Zgt3NXy+AHIUlsmifAe+ZNNNuqiRYR12rnsW0K5fhxTFl/tKWCEiutS7yiKRlTys6
 Gb/3ZN9EF653ChjAD6vdx1c8N9MWvvMtfasX6F2GGEQ/ui1mWj8KTzg7QG7N3LCH0L
 AvGv+rFanSKuIV2mxJLxov/X5hkAWcVrN/SKT/nA630pUMDCdmKWBJ779KXkZ3QAr5
 Sg9LRU4F7Lb+w/o7of6cMf0OjXC8Gp/f0QrBlWX/oGi7Vo5AlW/9fRsQNKYCVvU+61
 k9mgUgU0KBozg8rrH7L6RmiavQ/54OBcV2JYg/OiBwDpVTGmG6075m2EftfEQogmZl
 AR0QjNfaYdQvCobgGxgxLpzY=
Received: from ct-nagios.localdomain (ct-nagios.launay.org [10.29.6.67])
 by gw-home.launay.org (Postfix) with ESMTP id 35BAE6E89;
 Thu,  2 Apr 2026 22:35:42 +0200 (CEST)
Received: by ct-nagios.localdomain (Postfix, from userid 0)
 id 22F012BD4; Thu, 02 Apr 2026 22:35:42 +0200 (CEST)
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Arnaud Launay &lt;debian-bugs-20260402@launay.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: nagios-nrpe-server: Check disk reports permission problem with LXC
 container
Message-ID: &lt;177516214211.168897.4312017441624047065.reportbug@ct-nagios.launay.org&gt;
X-Mailer: reportbug 13.2.0
Date: Thu, 02 Apr 2026 22:35:42 +0200
X-Greylist: delayed 534 seconds by postgrey-1.37 at buxtehude;
 Thu, 02 Apr 2026 20:44:39 UTC
Delivered-To: submit@bugs.debian.org

Package: nagios-nrpe-server
Version: 4.1.3-1
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

Upgrading from Debian 12 to Debian 13

   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

I got a different result after upgrading: it was working before, I get
an error after. It's very similar to #1128004 .

Tests realized:

A local check_disk works fine:

root@ct:~# su - nagios -s /bin/bash -c &quot;/usr/lib/nagios/plugins/check_disk -u GB -w 20% -c 10% -W 20% -K 10% -l -X devtmpfs -X debugfs -X tracefs -X configfs -X securityfs -X sysfs -X nsfs -X overlay -X fuse -X tmpfs&quot;
DISK OK - free space: / 4GB (55,0% inode=85%);| /=3000000000B;6400000000;7200000000;0;8000000000

(please note that tmpfs /is/ on -X ...)

root@ct-nagios:~# /usr/lib/nagios/plugins/check_nrpe -D -n -t 30 -t 30 -H 10.A.B.C -c check_disk
DISK CRITICAL - /run/credentials/container-getty@2.service is not accessible: Permission denied


Adding the -A -i /run/credentials does something, but I have different results locally and via nrpe:

root@ct:~# su - nagios -s /bin/bash -c '/usr/lib/nagios/plugins/check_disk -u GB -w 20% -c 10% -W 20% -K 10% -A -i /run/credentials -l -X devtmpfs -X debugfs -X tracefs -X configfs -X securityfs -X sysfs -X nsfs -X overlay -X fuse -X tmpfs'
DISK OK - free space: / 4GB (55,4% inode=85%);| /=3000000000B;6400000000;7200000000;0;8000000000

root@ct-nagios:~# /usr/lib/nagios/plugins/check_nrpe -D -n -t 30 -t 30 -H 10.A.B.C -c check_disk
DISK OK - free space: / 4GB (55.4% inode=85%); /var/tmp 4GB (55.4% inode=85%);| /=3000000000B;6400000000;7200000000;0;8000000000 /var/tmp=3000000000B;6400000000;7200000000;0;8000000000


For whatever reason, the -X tmpfs seems a bit ignored via nrpe... And /var/tmp is not
even mounted:

root@ct:~# mount |grep var
root@ct:~#


/etc/nagios/nrpe_local.cfg tried:

# Original, working on deb12, not on deb13
#command[check_disk]=/usr/lib/nagios/plugins/check_disk -u GB -w 20% -c 10% -W 20% -K 10% -l -X devtmpfs -X debugfs -X tracefs -X configfs -X securityfs -X sysfs -X nsfs -X overlay -X fuse -X tmpfs

# Those works:
#command[check_disk]=/usr/lib/nagios/plugins/check_disk -u GB -w 20% -c 10% -W 20% -K 10% -A -i /run/credentials -l -X devtmpfs -X debugfs -X tracefs -X configfs -X securityfs -X sysfs -X nsfs -X overlay -X fuse -X tmpfs
# Tried without the -l, tried moving the args around, nothing change.
#command[check_disk]=/usr/lib/nagios/plugins/check_disk -u GB -w 20% -c 10% -W 20% -K 10% -A -i /run/credentials -X devtmpfs -X debugfs -X tracefs -X configfs -X securityfs -X sysfs -X nsfs -X overlay -X fuse -X tmpfs



*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 13.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.17.13-2-pve (SMP w/1 CPU thread; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages nagios-nrpe-server depends on:
ii  adduser              3.152
ii  init-system-helpers  1.69~deb13u1
ii  libc6                2.41-12+deb13u2
ii  libssl3t64           3.5.5-1~deb13u1
ii  libwrap0             7.6.q-36
ii  sysvinit-utils       3.14-4

Versions of packages nagios-nrpe-server recommends:
ii  monitoring-plugins        2.4.0-3+deb13u1
ii  monitoring-plugins-basic  2.4.0-3+deb13u1

Versions of packages nagios-nrpe-server suggests:
pn  xinetd | inetd  &lt;none&gt;


-- no debconf information
]