Skip to content

Conversation

@Jenkins-J
Copy link
Contributor

The TestUpdateContainerResources_MemoryLimit test was failing when swap is disabled (just like in issue #7918). This modifies the expected swap values of the memory limit test, allowing the test to pass when swap is not enabled.

@k8s-ci-robot
Copy link

Hi @Jenkins-J. Thanks for your PR.

I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@Jenkins-J Jenkins-J force-pushed the fix-mem-limit-test branch 2 times, most recently from e89c3c0 to 63a3ed3 Compare January 13, 2023 15:11
Modify the memory limit test, allowing the test to pass when swap is not
enabled.

Signed-off-by: James Jenkins <[email protected]>
@mqasimsarfraz
Copy link
Contributor

I tried running the test a node w/o swap controller:

TestUpdateContainerResources_MemoryLimit (main)
$ stat -fc %T /sys/fs/cgroup/
tmpfs
$ ls -la /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes
ls: cannot access '/sys/fs/cgroup/memory/memory.memsw.limit_in_bytes': No such file or directory
$ GITHUB_WORKSPACE="" ENABLE_CRI_SANDBOXES="" CONTAINERD_RUNTIME=io.containerd.runc.v2 FOCUS=TestUpdateContainerResources_Memory make cri-integration
+ bin/ctr
go build  -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie  -o bin/ctr -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-68-g8d9af708d -X github.com/containerd/containerd/version.Revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs"  ./cmd/ctr
+ bin/containerd
go build  -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie  -o bin/containerd -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-68-g8d9af708d -X github.com/containerd/containerd/version.Revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs"  ./cmd/containerd
+ bin/containerd-stress
go build  -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie  -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-68-g8d9af708d -X github.com/containerd/containerd/version.Revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs"  ./cmd/containerd-stress
+ bin/containerd-shim
+ bin/containerd-shim-runc-v1
+ bin/containerd-shim-runc-v2
+ binaries
+ bin/cri-integration.test
+ cri-integration
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc-fp]
  cni_conf_dir = "/tmp/failpoint-cni-net.d"
  cni_max_conf_num = 1
  pod_annotations = ["io.containerd.runtime.v2.shim.failpoint.*"]
  runtime_type = "runc-fp.v1"
{
  "cniVersion": "1.0.0",
  "name": "containerd-net-failpoint",
  "plugins": [
    {
      "type": "cni-bridge-fp",
      "bridge": "cni-fp",
      "isGateway": true,
      "ipMasq": true,
      "promiscMode": true,
      "ipam": {
        "type": "host-local",
        "ranges": [
          [{
            "subnet": "10.88.0.0/16"
          }],
          [{
            "subnet": "2001:4860:4860::/64"
          }]
        ],
        "routes": [
          { "dst": "0.0.0.0/0" },
          { "dst": "::/0" }
        ]
      },
      "capabilities": {
        "io.kubernetes.cri.pod-annotations": true
      }
    },
    {
      "type": "portmap",
      "capabilities": {"portMappings": true}
    }
  ]
}
{
  "status": {
    "conditions": [
      {
        "type": "RuntimeReady",
        "status": true,
        "reason": "",
        "message": ""
      },
      {
        "type": "NetworkReady",
        "status": true,
        "reason": "",
        "message": ""
      }
    ]
  },
  "cniconfig": {
    "PluginDirs": [
      "/opt/cni/bin"
    ],
    "PluginConfDir": "/etc/cni/net.d",
    "PluginMaxConfNum": 1,
    "Prefix": "eth",
    "Networks": [
      {
        "Config": {
          "Name": "cni-loopback",
          "CNIVersion": "0.3.1",
          "Plugins": [
            {
              "Network": {
                "type": "loopback",
                "ipam": {},
                "dns": {}
              },
              "Source": "{\"type\":\"loopback\"}"
            }
          ],
          "Source": "{\n\"cniVersion\": \"0.3.1\",\n\"name\": \"cni-loopback\",\n\"plugins\": [{\n  \"type\": \"loopback\"\n}]\n}"
        },
        "IFName": "lo"
      },
      {
        "Config": {
          "Name": "containerd-net",
          "CNIVersion": "1.0.0",
          "Plugins": [
            {
              "Network": {
                "type": "bridge",
                "ipam": {
                  "type": "host-local"
                },
                "dns": {}
              },
              "Source": "{\"bridge\":\"cni0\",\"ipMasq\":true,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.88.0.0/16\"}],[{\"subnet\":\"2001:4860:4860::/64\"}]],\"routes\":[{\"dst\":\"0.0.0.0/0\"},{\"dst\":\"::/0\"}],\"type\":\"host-local\"},\"isGateway\":true,\"promiscMode\":true,\"type\":\"bridge\"}"
            },
            {
              "Network": {
                "type": "portmap",
                "capabilities": {
                  "portMappings": true
                },
                "ipam": {},
                "dns": {}
              },
              "Source": "{\"capabilities\":{\"portMappings\":true},\"type\":\"portmap\"}"
            }
          ],
          "Source": "{\n  \"cniVersion\": \"1.0.0\",\n  \"name\": \"containerd-net\",\n  \"plugins\": [\n    {\n      \"type\": \"bridge\",\n      \"bridge\": \"cni0\",\n      \"isGateway\": true,\n      \"ipMasq\": true,\n      \"promiscMode\": true,\n      \"ipam\": {\n        \"type\": \"host-local\",\n        \"ranges\": [\n          [{\n            \"subnet\": \"10.88.0.0/16\"\n          }],\n          [{\n            \"subnet\": \"2001:4860:4860::/64\"\n          }]\n        ],\n        \"routes\": [\n          { \"dst\": \"0.0.0.0/0\" },\n          { \"dst\": \"::/0\" }\n        ]\n      }\n    },\n    {\n      \"type\": \"portmap\",\n      \"capabilities\": {\"portMappings\": true}\n    }\n  ]\n}\n"
        },
        "IFName": "eth0"
      }
    ]
  },
  "config": {
    "containerd": {
      "snapshotter": "overlayfs",
      "defaultRuntimeName": "runc",
      "defaultRuntime": {
        "runtimeType": "",
        "runtimePath": "",
        "runtimeEngine": "",
        "PodAnnotations": null,
        "ContainerAnnotations": null,
        "runtimeRoot": "",
        "options": null,
        "privileged_without_host_devices": false,
        "privileged_without_host_devices_all_devices_allowed": false,
        "baseRuntimeSpec": "",
        "cniConfDir": "",
        "cniMaxConfNum": 0,
        "snapshotter": "",
        "sandboxMode": ""
      },
      "untrustedWorkloadRuntime": {
        "runtimeType": "",
        "runtimePath": "",
        "runtimeEngine": "",
        "PodAnnotations": null,
        "ContainerAnnotations": null,
        "runtimeRoot": "",
        "options": null,
        "privileged_without_host_devices": false,
        "privileged_without_host_devices_all_devices_allowed": false,
        "baseRuntimeSpec": "",
        "cniConfDir": "",
        "cniMaxConfNum": 0,
        "snapshotter": "",
        "sandboxMode": ""
      },
      "runtimes": {
        "runc": {
          "runtimeType": "io.containerd.runc.v2",
          "runtimePath": "",
          "runtimeEngine": "",
          "PodAnnotations": null,
          "ContainerAnnotations": null,
          "runtimeRoot": "",
          "options": null,
          "privileged_without_host_devices": false,
          "privileged_without_host_devices_all_devices_allowed": false,
          "baseRuntimeSpec": "",
          "cniConfDir": "",
          "cniMaxConfNum": 0,
          "snapshotter": "",
          "sandboxMode": "podsandbox"
        },
        "runc-fp": {
          "runtimeType": "runc-fp.v1",
          "runtimePath": "",
          "runtimeEngine": "",
          "PodAnnotations": [
            "io.containerd.runtime.v2.shim.failpoint.*"
          ],
          "ContainerAnnotations": null,
          "runtimeRoot": "",
          "options": null,
          "privileged_without_host_devices": false,
          "privileged_without_host_devices_all_devices_allowed": false,
          "baseRuntimeSpec": "",
          "cniConfDir": "/tmp/failpoint-cni-net.d",
          "cniMaxConfNum": 1,
          "snapshotter": "",
          "sandboxMode": "podsandbox"
        }
      },
      "noPivot": false,
      "disableSnapshotAnnotations": true,
      "discardUnpackedLayers": false,
      "ignoreBlockIONotEnabledErrors": false,
      "ignoreRdtNotEnabledErrors": false
    },
    "cni": {
      "binDir": "/opt/cni/bin",
      "confDir": "/etc/cni/net.d",
      "maxConfNum": 1,
      "setupSerially": false,
      "confTemplate": "",
      "ipPref": ""
    },
    "registry": {
      "configPath": "",
      "mirrors": null,
      "configs": null,
      "auths": null,
      "headers": null
    },
    "imageDecryption": {
      "keyModel": "node"
    },
    "disableTCPService": true,
    "streamServerAddress": "127.0.0.1",
    "streamServerPort": "0",
    "streamIdleTimeout": "4h0m0s",
    "enableSelinux": false,
    "selinuxCategoryRange": 1024,
    "sandboxImage": "registry.k8s.io/pause:3.8",
    "statsCollectPeriod": 10,
    "systemdCgroup": false,
    "enableTLSStreaming": false,
    "x509KeyPairStreaming": {
      "tlsCertFile": "",
      "tlsKeyFile": ""
    },
    "maxContainerLogSize": 16384,
    "disableCgroup": false,
    "disableApparmor": false,
    "restrictOOMScoreAdj": false,
    "maxConcurrentDownloads": 3,
    "disableProcMount": false,
    "unsetSeccompProfile": "",
    "tolerateMissingHugetlbController": true,
    "disableHugetlbController": true,
    "device_ownership_from_security_context": false,
    "ignoreImageDefinedVolumes": false,
    "netnsMountsUnderStateDir": false,
    "enableUnprivilegedPorts": false,
    "enableUnprivilegedICMP": false,
    "enableCDI": false,
    "cdiSpecDirs": [
      "/etc/cdi",
      "/var/run/cdi"
    ],
    "imagePullProgressTimeout": "1m0s",
    "containerdRootDir": "/var/lib/containerd-test",
    "containerdEndpoint": "/run/containerd-test/containerd.sock",
    "rootDir": "/var/lib/containerd-test/io.containerd.grpc.v1.cri",
    "stateDir": "/run/containerd-test/io.containerd.grpc.v1.cri"
  },
  "golang": "go1.18.10",
  "lastCNILoadStatus": "OK",
  "lastCNILoadStatus.default": "OK",
  "lastCNILoadStatus.runc-fp": "OK"
}
=== RUN   TestUpdateContainerResources_MemorySwap
    container_update_resources_test.go:157: Swap or swap accounting are not enabled. Swap is required for this test
--- SKIP: TestUpdateContainerResources_MemorySwap (0.00s)
=== RUN   TestUpdateContainerResources_MemoryLimit
    container_update_resources_test.go:228: Create a sandbox
INFO[0000] Using the following image list: {Alpine:ghcr.io/containerd/alpine:3.14.0 BusyBox:ghcr.io/containerd/busybox:1.28 Pause:registry.k8s.io/pause:3.8 ResourceConsumer:registry.k8s.io/e2e-test-images/resource-consumer:1.10 VolumeCopyUp:ghcr.io/containerd/volume-copy-up:2.1 VolumeOwnership:ghcr.io/containerd/volume-ownership:2.1} 
    main_test.go:668: Image "registry.k8s.io/pause:3.8" already exists, not pulling.
    container_update_resources_test.go:238: Create a container with memory limit
    container_update_resources_test.go:249: Check memory limit in container OCI spec
    container_update_resources_test.go:56: 
        	Error Trace:	/home/azureuser/containerd/container_update_resources_test.go:56
        	            				/home/azureuser/containerd/container_update_resources_test.go:255
        	Error:      	Expected value not to be nil.
        	Test:       	TestUpdateContainerResources_MemoryLimit
--- FAIL: TestUpdateContainerResources_MemoryLimit (1.22s)
FAIL
run_containerd
time="2023-01-25T16:40:53.896196467Z" level=info msg="starting containerd" revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 version=v1.7.0-beta.2-68-g8d9af708d
time="2023-01-25T16:40:53.923675282Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.926762719Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.927022039Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd-test/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.927046941Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
time="2023-01-25T16:40:53.928032417Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928062119Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928217931Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928240033Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
time="2023-01-25T16:40:53.928252434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928465450Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd-test/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928491052Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
time="2023-01-25T16:40:53.928512154Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
time="2023-01-25T16:40:53.928524255Z" level=info msg="metadata content store policy set" policy=shared
time="2023-01-25T16:40:53.928807276Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
time="2023-01-25T16:40:53.928851980Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
time="2023-01-25T16:40:53.928870881Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
time="2023-01-25T16:40:53.928929586Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1
time="2023-01-25T16:40:53.928954588Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1
time="2023-01-25T16:40:53.929127601Z" level=info msg="runtime interface created"
time="2023-01-25T16:40:53.929143102Z" level=info msg="created NRI interface"
time="2023-01-25T16:40:53.929157503Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1
time="2023-01-25T16:40:53.929174205Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1
time="2023-01-25T16:40:53.929190706Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1
time="2023-01-25T16:40:53.929210007Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929225309Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929240610Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929255311Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929284713Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929301214Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929316416Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
time="2023-01-25T16:40:53.929362919Z" level=debug msg="loading tasks in namespace" namespace=k8s.io
time="2023-01-25T16:40:53.929424624Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2
time="2023-01-25T16:40:53.929442725Z" level=info msg="loading plugin \"io.containerd.service.v1.sandbox-controller-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929458527Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929473328Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
time="2023-01-25T16:40:53.929508930Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
time="2023-01-25T16:40:53.930008469Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.930040371Z" level=debug msg="No blockio config file specified, blockio not configured"
time="2023-01-25T16:40:53.930068373Z" level=debug msg="No RDT config file specified, RDT not configured"
time="2023-01-25T16:40:53.930086575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930102276Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
time="2023-01-25T16:40:53.930161281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930177482Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930195183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930209984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930224885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930240187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930254488Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930268289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930282890Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
time="2023-01-25T16:40:53.930321793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930338994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930353495Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930368897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930383098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930398899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930413300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930435702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930681221Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox} runc-fp:{Type:runc-fp.v1 Path: Engine: PodAnnotations:[io.containerd.runtime.v2.shim.failpoint.*] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir:/tmp/failpoint-cni-net.d NetworkPluginMaxConfNum:1 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:1m0s} ContainerdRootDir:/var/lib/containerd-test ContainerdEndpoint:/run/containerd-test/containerd.sock RootDir:/var/lib/containerd-test/io.containerd.grpc.v1.cri StateDir:/run/containerd-test/io.containerd.grpc.v1.cri}"
time="2023-01-25T16:40:53.930753126Z" level=info msg="Connect containerd service"
time="2023-01-25T16:40:53.930793729Z" level=info msg="using legacy CRI server"
time="2023-01-25T16:40:53.930841433Z" level=info msg="Get image filesystem path \"/var/lib/containerd-test/io.containerd.snapshotter.v1.overlayfs\""
time="2023-01-25T16:40:53.931470981Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this"
time="2023-01-25T16:40:53.931488683Z" level=info msg="runtime interface starting up..."
time="2023-01-25T16:40:53.931497183Z" level=info msg="starting plugins..."
time="2023-01-25T16:40:53.931710800Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
time="2023-01-25T16:40:53.931738502Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
time="2023-01-25T16:40:53.931752503Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
time="2023-01-25T16:40:53.931773205Z" level=info msg="skipping tracing processor initialization (no tracing plugin)" error="no OpenTelemetry endpoint: skip plugin"
time="2023-01-25T16:40:53.932020324Z" level=info msg=serving... address=/run/containerd-test/containerd.sock.ttrpc
time="2023-01-25T16:40:53.932070227Z" level=info msg=serving... address=/run/containerd-test/containerd.sock
time="2023-01-25T16:40:53.932125932Z" level=debug msg="sd notification" notified=false state="READY=1"
time="2023-01-25T16:40:53.932144933Z" level=info msg="containerd successfully booted in 0.036554s"
time="2023-01-25T16:40:53.936582675Z" level=info msg="Start subscribing containerd event"
time="2023-01-25T16:40:53.936902799Z" level=info msg="Start recovering state"
time="2023-01-25T16:40:53.942044495Z" level=debug msg="Loaded image \"sha256:4873874c08efc72e9729683a83ffbb7502ee729e9a5ac097723806ea7fa13517\""
time="2023-01-25T16:40:53.944579290Z" level=debug msg="Loaded image \"registry.k8s.io/pause:3.8\""
time="2023-01-25T16:40:53.945584667Z" level=debug msg="Loaded image \"registry.k8s.io/pause@sha256:9001185023633d17a2f98ff69b6ff2615b8ea02a825adffa40422f51dfdcde9d\""
time="2023-01-25T16:40:53.945818285Z" level=info msg="Start event monitor"
time="2023-01-25T16:40:53.945839987Z" level=info msg="Start snapshots syncer"
time="2023-01-25T16:40:53.945852688Z" level=info msg="Start cni network conf syncer for default"
time="2023-01-25T16:40:53.945887291Z" level=info msg="Start cni network conf syncer for runc-fp"
time="2023-01-25T16:40:53.945895691Z" level=info msg="Start streaming server"
time="2023-01-25T16:40:53.945905392Z" level=info msg="Registered namespace \"k8s.io\" with NRI"
time="2023-01-25T16:40:54.034654320Z" level=debug msg="garbage collected" d=4.747466ms
time="2023-01-25T16:40:54.087711103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:sandbox,Uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649,Namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999,Attempt:0,}"
time="2023-01-25T16:40:54.087826912Z" level=debug msg="Sandbox config &PodSandboxConfig{Metadata:&PodSandboxMetadata{Name:sandbox,Uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649,Namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999,Attempt:0,},Hostname:,LogDirectory:,DnsConfig:nil,PortMappings:[]*PortMapping{},Labels:map[string]string{},Annotations:map[string]string{},Linux:&LinuxPodSandboxConfig{CgroupParent:,SecurityContext:nil,Sysctls:map[string]string{},Overhead:nil,Resources:nil,},Windows:nil,}"
time="2023-01-25T16:40:54.087861714Z" level=debug msg="generated id for sandbox name \"sandbox_update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999_52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649_0\"" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.087990324Z" level=debug msg="use OCI runtime {Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.088262445Z" level=debug msg="sandbox container spec: (*specs.Spec)(0xc0006fc990){Version:(string)1.0.2-dev Process:(*specs.Process)(0xc0007f72c0){Terminal:(bool)false ConsoleSize:(*specs.Box)<nil> User:(specs.User){UID:(uint32)0 GID:(uint32)0 Umask:(*uint32)<nil> AdditionalGids:([]uint32)<nil> Username:(string)} Args:([]string)[/pause] CommandLine:(string) Env:([]string)[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin] Cwd:(string)/ Capabilities:(*specs.LinuxCapabilities)(0xc00091e400){Bounding:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Effective:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Inheritable:([]string)<nil> Permitted:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Ambient:([]string)<nil>} Rlimits:([]specs.POSIXRlimit)<nil> NoNewPrivileges:(bool)true ApparmorProfile:(string) OOMScoreAdj:(*int)(0xc0008404a8)-998 SelinuxLabel:(string)} Root:(*specs.Root)(0xc00041b7e8){Path:(string)rootfs Readonly:(bool)true} Hostname:(string) Domainname:(string) Mounts:([]specs.Mount)[{Destination:(string)/proc Type:(string)proc Source:(string)proc Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev Type:(string)tmpfs Source:(string)tmpfs Options:([]string)[nosuid strictatime mode=755 size=65536k] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/pts Type:(string)devpts Source:(string)devpts Options:([]string)[nosuid noexec newinstance ptmxmode=0666 mode=0620 gid=5] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/mqueue Type:(string)mqueue Source:(string)mqueue Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/sys Type:(string)sysfs Source:(string)sysfs Options:([]string)[nosuid noexec nodev ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/shm Type:(string)bind Source:(string)/run/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/shm Options:([]string)[rbind ro nosuid nodev noexec] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/resolv.conf Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/resolv.conf Options:([]string)[rbind ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>}] Hooks:(*specs.Hooks)<nil> Annotations:(map[string]string)map[io.kubernetes.cri.sandbox-uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649 io.kubernetes.cri.sandbox-name:sandbox io.kubernetes.cri.sandbox-log-directory: io.kubernetes.cri.container-type:sandbox io.kubernetes.cri.sandbox-id:5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa io.kubernetes.cri.sandbox-namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999] Linux:(*specs.Linux)(0xc0007f73b0){UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil> Sysctl:(map[string]string)map[] Resources:(*specs.LinuxResources)(0xc0001d35e0){Devices:([]specs.LinuxDeviceCgroup)[{Allow:(bool)false Type:(string) Major:(*int64)<nil> Minor:(*int64)<nil> Access:(string)rwm}] Memory:(*specs.LinuxMemory)<nil> CPU:(*specs.LinuxCPU)(0xc00087e3c0){Shares:(*uint64)(0xc0008404d0)2 Quota:(*int64)<nil> Period:(*uint64)<nil> RealtimeRuntime:(*int64)<nil> RealtimePeriod:(*uint64)<nil> Cpus:(string) Mems:(string) Idle:(*int64)<nil>} Pids:(*specs.LinuxPids)<nil> BlockIO:(*specs.LinuxBlockIO)<nil> HugepageLimits:([]specs.LinuxHugepageLimit)<nil> Network:(*specs.LinuxNetwork)<nil> Rdma:(map[string]specs.LinuxRdma)<nil> Unified:(map[string]string)<nil>} CgroupsPath:(string)/k8s.io/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa Namespaces:([]specs.LinuxNamespace)[{Type:(specs.LinuxNamespaceType)pid Path:(string)} {Type:(specs.LinuxNamespaceType)ipc Path:(string)} {Type:(specs.LinuxNamespaceType)uts Path:(string)} {Type:(specs.LinuxNamespaceType)mount Path:(string)} {Type:(specs.LinuxNamespaceType)network Path:(string)}] Devices:([]specs.LinuxDevice)<nil> Seccomp:(*specs.LinuxSeccomp)<nil> RootfsPropagation:(string) MaskedPaths:([]string)[/proc/acpi /proc/asound /proc/kcore /proc/keys /proc/latency_stats /proc/timer_list /proc/timer_stats /proc/sched_debug /sys/firmware /proc/scsi] ReadonlyPaths:([]string)[/proc/bus /proc/fs /proc/irq /proc/sys /proc/sysrq-trigger] MountLabel:(string) IntelRdt:(*specs.LinuxIntelRdt)<nil> Personality:(*specs.LinuxPersonality)<nil>} Solaris:(*specs.Solaris)<nil> Windows:(*specs.Windows)<nil> VM:(*specs.VM)<nil> ZOS:(*specs.ZOS)<nil>}" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.095472500Z" level=debug msg="remote introspection plugin filters" filters="[type==io.containerd.snapshotter.v1, id==overlayfs]"
time="2023-01-25T16:40:54.111041798Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/prepare type=containerd.events.SnapshotPrepare
time="2023-01-25T16:40:54.119256430Z" level=debug msg="event published" ns=k8s.io topic=/containers/create type=containerd.events.ContainerCreate
time="2023-01-25T16:40:54.137370824Z" level=debug msg="event published" ns=k8s.io topic=/containers/update type=containerd.events.ContainerUpdate
time="2023-01-25T16:40:54.137434829Z" level=debug msg="begin cni setup" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.211409020Z" level=debug msg="cni result: {\"Interfaces\":{\"cni0\":{\"IPConfigs\":null,\"Mac\":\"ba:27:b6:79:8f:18\",\"Sandbox\":\"\"},\"eth0\":{\"IPConfigs\":[{\"IP\":\"10.88.0.12\",\"Gateway\":\"10.88.0.1\"},{\"IP\":\"2001:4860:4860::c\",\"Gateway\":\"2001:4860:4860::1\"}],\"Mac\":\"62:a4:f1:70:96:49\",\"Sandbox\":\"/var/run/netns/cni-609863d8-fccd-2c68-3b41-e515198da617\"},\"lo\":{\"IPConfigs\":[{\"IP\":\"127.0.0.1\",\"Gateway\":\"\"},{\"IP\":\"::1\",\"Gateway\":\"\"}],\"Mac\":\"00:00:00:00:00:00\",\"Sandbox\":\"/var/run/netns/cni-609863d8-fccd-2c68-3b41-e515198da617\"},\"veth6d4d3e9d\":{\"IPConfigs\":null,\"Mac\":\"86:a9:3f:0b:ea:e5\",\"Sandbox\":\"\"}},\"DNS\":[{},{}],\"Routes\":[{\"dst\":\"0.0.0.0/0\"},{\"dst\":\"::/0\"}]}" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.217375479Z" level=debug msg="event published" ns=k8s.io topic=/containers/update type=containerd.events.ContainerUpdate
time="2023-01-25T16:40:54.226662694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
time="2023-01-25T16:40:54.226724199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
time="2023-01-25T16:40:54.226738400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
time="2023-01-25T16:40:54.226922714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd-test/io.containerd.runtime.v2.task/k8s.io/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa pid=4598 runtime=io.containerd.runc.v2
time="2023-01-25T16:40:54.271663757Z" level=debug msg="garbage collected" d=3.394661ms
time="2023-01-25T16:40:54.273380589Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/create type=containerd.events.TaskCreate
time="2023-01-25T16:40:54.283028131Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/start type=containerd.events.TaskStart
time="2023-01-25T16:40:54.283383658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:sandbox,Uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649,Namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999,Attempt:0,} returns sandbox id \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:54.285069088Z" level=info msg="CreateContainer within sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" for container &ContainerMetadata{Name:container,Attempt:0,}"
time="2023-01-25T16:40:54.285148194Z" level=debug msg="Container config &ContainerConfig{Metadata:&ContainerMetadata{Name:container,Attempt:0,},Image:&ImageSpec{Image:registry.k8s.io/pause:3.8,Annotations:map[string]string{},},Command:[],Args:[],WorkingDir:,Envs:[]*KeyValue{},Mounts:[]*Mount{},Devices:[]*Device{},Labels:map[string]string{},Annotations:map[string]string{},LogPath:,Stdin:false,StdinOnce:false,Tty:false,Linux:&LinuxContainerConfig{Resources:&LinuxContainerResources{CpuPeriod:0,CpuQuota:0,CpuShares:0,MemoryLimitInBytes:209715200,OomScoreAdj:0,CpusetCpus:,CpusetMems:,HugepageLimits:[]*HugepageLimit{},Unified:map[string]string{},MemorySwapLimitInBytes:0,},SecurityContext:nil,},Windows:nil,}"
time="2023-01-25T16:40:54.285373311Z" level=debug msg="Generated id \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" for container \"container_sandbox_update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999_52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649_0\""
time="2023-01-25T16:40:54.285577027Z" level=debug msg="Use OCI runtime {Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox} for sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" and container \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\""
time="2023-01-25T16:40:54.285903952Z" level=debug msg="Container \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" spec: (*specs.Spec)(0xc000779dd0){Version:(string)1.0.2-dev Process:(*specs.Process)(0xc00075a4b0){Terminal:(bool)false ConsoleSize:(*specs.Box)<nil> User:(specs.User){UID:(uint32)0 GID:(uint32)0 Umask:(*uint32)<nil> AdditionalGids:([]uint32)<nil> Username:(string)} Args:([]string)[/pause] CommandLine:(string) Env:([]string)[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin HOSTNAME=qasim-vm] Cwd:(string)/ Capabilities:(*specs.LinuxCapabilities)(0xc0000f5c80){Bounding:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Effective:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Inheritable:([]string)<nil> Permitted:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Ambient:([]string)<nil>} Rlimits:([]specs.POSIXRlimit)<nil> NoNewPrivileges:(bool)false ApparmorProfile:(string) OOMScoreAdj:(*int)(0xc00074b658)0 SelinuxLabel:(string)} Root:(*specs.Root)(0xc0001419f8){Path:(string)rootfs Readonly:(bool)false} Hostname:(string) Domainname:(string) Mounts:([]specs.Mount)[{Destination:(string)/proc Type:(string)proc Source:(string)proc Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev Type:(string)tmpfs Source:(string)tmpfs Options:([]string)[nosuid strictatime mode=755 size=65536k] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/pts Type:(string)devpts Source:(string)devpts Options:([]string)[nosuid noexec newinstance ptmxmode=0666 mode=0620 gid=5] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/mqueue Type:(string)mqueue Source:(string)mqueue Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/sys Type:(string)sysfs Source:(string)sysfs Options:([]string)[nosuid noexec nodev ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/sys/fs/cgroup Type:(string)cgroup Source:(string)cgroup Options:([]string)[nosuid noexec nodev relatime ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/hostname Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/hostname Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/hosts Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/hosts Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/resolv.conf Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/resolv.conf Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/shm Type:(string)bind Source:(string)/run/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/shm Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>}] Hooks:(*specs.Hooks)<nil> Annotations:(map[string]string)map[io.kubernetes.cri.container-type:container io.kubernetes.cri.sandbox-id:5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa io.kubernetes.cri.sandbox-namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999 io.kubernetes.cri.sandbox-uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649 io.kubernetes.cri.sandbox-name:sandbox io.kubernetes.cri.container-name:container io.kubernetes.cri.image-name:registry.k8s.io/pause:3.8] Linux:(*specs.Linux)(0xc00075a5a0){UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil> Sysctl:(map[string]string)<nil> Resources:(*specs.LinuxResources)(0xc0004ff030){Devices:([]specs.LinuxDeviceCgroup)[{Allow:(bool)false Type:(string) Major:(*int64)<nil> Minor:(*int64)<nil> Access:(string)rwm}] Memory:(*specs.LinuxMemory)(0xc000397080){Limit:(*int64)(0xc00074b648)209715200 Reservation:(*int64)<nil> Swap:(*int64)<nil> Kernel:(*int64)<nil> KernelTCP:(*int64)<nil> Swappiness:(*uint64)<nil> DisableOOMKiller:(*bool)<nil> UseHierarchy:(*bool)<nil>} CPU:(*specs.LinuxCPU)(0xc000802be0){Shares:(*uint64)<nil> Quota:(*int64)<nil> Period:(*uint64)<nil> RealtimeRuntime:(*int64)<nil> RealtimePeriod:(*uint64)<nil> Cpus:(string) Mems:(string) Idle:(*int64)<nil>} Pids:(*specs.LinuxPids)<nil> BlockIO:(*specs.LinuxBlockIO)<nil> HugepageLimits:([]specs.LinuxHugepageLimit)<nil> Network:(*specs.LinuxNetwork)<nil> Rdma:(map[string]specs.LinuxRdma)<nil> Unified:(map[string]string)<nil>} CgroupsPath:(string)/k8s.io/145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83 Namespaces:([]specs.LinuxNamespace)[{Type:(specs.LinuxNamespaceType)pid Path:(string)/proc/4619/ns/pid} {Type:(specs.LinuxNamespaceType)ipc Path:(string)/proc/4619/ns/ipc} {Type:(specs.LinuxNamespaceType)uts Path:(string)/proc/4619/ns/uts} {Type:(specs.LinuxNamespaceType)mount Path:(string)} {Type:(specs.LinuxNamespaceType)network Path:(string)/proc/4619/ns/net}] Devices:([]specs.LinuxDevice)<nil> Seccomp:(*specs.LinuxSeccomp)<nil> RootfsPropagation:(string) MaskedPaths:([]string)[] ReadonlyPaths:([]string)[] MountLabel:(string) IntelRdt:(*specs.LinuxIntelRdt)<nil> Personality:(*specs.LinuxPersonality)<nil>} Solaris:(*specs.Solaris)<nil> Windows:(*specs.Windows)<nil> VM:(*specs.VM)<nil> ZOS:(*specs.ZOS)<nil>}"
time="2023-01-25T16:40:54.286028762Z" level=info msg="Logging will be disabled due to empty log paths for sandbox (\"\") or container (\"\")"
time="2023-01-25T16:40:54.291780504Z" level=debug msg="remote introspection plugin filters" filters="[type==io.containerd.snapshotter.v1, id==overlayfs]"
time="2023-01-25T16:40:54.307679628Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/prepare type=containerd.events.SnapshotPrepare
time="2023-01-25T16:40:54.319899868Z" level=debug msg="event published" ns=k8s.io topic=/containers/create type=containerd.events.ContainerCreate
time="2023-01-25T16:40:54.334251572Z" level=info msg="CreateContainer within sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" for &ContainerMetadata{Name:container,Attempt:0,} returns container id \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\""
time="2023-01-25T16:40:54.338027063Z" level=info msg="StopPodSandbox for \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:54.338122870Z" level=info msg="Container to stop \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" must be in running or unknown state, current state \"CONTAINER_CREATED\""
time="2023-01-25T16:40:54.352509177Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/exit type=containerd.events.TaskExit
time="2023-01-25T16:40:54.352672790Z" level=debug msg="received exit event container_id:\"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" id:\"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" pid:4619 exit_status:137 exited_at:{seconds:1674664854 nanos:352336164}"
time="2023-01-25T16:40:55.151559058Z" level=debug msg="garbage collected" d=679.420176ms
time="2023-01-25T16:40:55.159291952Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/delete type=containerd.events.TaskDelete
time="2023-01-25T16:40:55.159692683Z" level=info msg="shim disconnected" id=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa namespace=k8s.io
time="2023-01-25T16:40:55.159739587Z" level=warning msg="cleaning up after shim disconnected" id=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa namespace=k8s.io
time="2023-01-25T16:40:55.159751988Z" level=info msg="cleaning up dead shim" namespace=k8s.io
time="2023-01-25T16:40:55.170802538Z" level=warning msg="cleanup warnings time=\"2023-01-25T16:40:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4654 runtime=io.containerd.runc.v2\n" namespace=k8s.io
time="2023-01-25T16:40:55.245433880Z" level=info msg="TearDown network for sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" successfully"
time="2023-01-25T16:40:55.245490485Z" level=info msg="StopPodSandbox for \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" returns successfully"
time="2023-01-25T16:40:55.246849089Z" level=info msg="RemovePodSandbox for \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:55.246888592Z" level=info msg="Forcibly stopping sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:55.246933396Z" level=info msg="Container to stop \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" must be in running or unknown state, current state \"CONTAINER_CREATED\""
time="2023-01-25T16:40:55.267113549Z" level=info msg="TearDown network for sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" successfully"
time="2023-01-25T16:40:55.280926311Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/remove type=containerd.events.SnapshotRemove
time="2023-01-25T16:40:55.290903079Z" level=debug msg="event published" ns=k8s.io topic=/containers/delete type=containerd.events.ContainerDelete
time="2023-01-25T16:40:55.297947821Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/remove type=containerd.events.SnapshotRemove
time="2023-01-25T16:40:55.303816473Z" level=debug msg="event published" ns=k8s.io topic=/containers/delete type=containerd.events.ContainerDelete
time="2023-01-25T16:40:55.303890978Z" level=error msg="Failed to get podSandbox status for container event for sandboxID \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\": an error occurred when try to find sandbox: not found. Skipping sending the event."
time="2023-01-25T16:40:55.303931781Z" level=info msg="RemovePodSandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" returns successfully"
make: *** [Makefile:224: cri-integration] Error 1
TestUpdateContainerResources_MemoryLimit (PR)
$ stat -fc %T /sys/fs/cgroup/
tmpfs
$ ls -la /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes
ls: cannot access '/sys/fs/cgroup/memory/memory.memsw.limit_in_bytes': No such file or directory
$ GITHUB_WORKSPACE="" ENABLE_CRI_SANDBOXES="" CONTAINERD_RUNTIME=io.containerd.runc.v2 FOCUS=TestUpdateContainerResources_Memory make cri-integration
+ bin/ctr
go build  -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie  -o bin/ctr -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-31-gb1c5c57be -X github.com/containerd/containerd/version.Revision=b1c5c57be08ceeb1763b41cdd7c95c743931e193 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs"  ./cmd/ctr
+ bin/containerd
go build  -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie  -o bin/containerd -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-31-gb1c5c57be -X github.com/containerd/containerd/version.Revision=b1c5c57be08ceeb1763b41cdd7c95c743931e193 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs"  ./cmd/containerd
+ bin/containerd-stress
go build  -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie  -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-31-gb1c5c57be -X github.com/containerd/containerd/version.Revision=b1c5c57be08ceeb1763b41cdd7c95c743931e193 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs"  ./cmd/containerd-stress
+ bin/containerd-shim
+ bin/containerd-shim-runc-v1
+ bin/containerd-shim-runc-v2
+ binaries
+ bin/cri-integration.test
+ cri-integration
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc-fp]
  cni_conf_dir = "/tmp/failpoint-cni-net.d"
  cni_max_conf_num = 1
  pod_annotations = ["io.containerd.runtime.v2.shim.failpoint.*"]
  runtime_type = "runc-fp.v1"
{
  "cniVersion": "1.0.0",
  "name": "containerd-net-failpoint",
  "plugins": [
    {
      "type": "cni-bridge-fp",
      "bridge": "cni-fp",
      "isGateway": true,
      "ipMasq": true,
      "promiscMode": true,
      "ipam": {
        "type": "host-local",
        "ranges": [
          [{
            "subnet": "10.88.0.0/16"
          }],
          [{
            "subnet": "2001:4860:4860::/64"
          }]
        ],
        "routes": [
          { "dst": "0.0.0.0/0" },
          { "dst": "::/0" }
        ]
      },
      "capabilities": {
        "io.kubernetes.cri.pod-annotations": true
      }
    },
    {
      "type": "portmap",
      "capabilities": {"portMappings": true}
    }
  ]
}
{
  "status": {
    "conditions": [
      {
        "type": "RuntimeReady",
        "status": true,
        "reason": "",
        "message": ""
      },
      {
        "type": "NetworkReady",
        "status": true,
        "reason": "",
        "message": ""
      }
    ]
  },
  "cniconfig": {
    "PluginDirs": [
      "/opt/cni/bin"
    ],
    "PluginConfDir": "/etc/cni/net.d",
    "PluginMaxConfNum": 1,
    "Prefix": "eth",
    "Networks": [
      {
        "Config": {
          "Name": "cni-loopback",
          "CNIVersion": "0.3.1",
          "Plugins": [
            {
              "Network": {
                "type": "loopback",
                "ipam": {},
                "dns": {}
              },
              "Source": "{\"type\":\"loopback\"}"
            }
          ],
          "Source": "{\n\"cniVersion\": \"0.3.1\",\n\"name\": \"cni-loopback\",\n\"plugins\": [{\n  \"type\": \"loopback\"\n}]\n}"
        },
        "IFName": "lo"
      },
      {
        "Config": {
          "Name": "containerd-net",
          "CNIVersion": "1.0.0",
          "Plugins": [
            {
              "Network": {
                "type": "bridge",
                "ipam": {
                  "type": "host-local"
                },
                "dns": {}
              },
              "Source": "{\"bridge\":\"cni0\",\"ipMasq\":true,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.88.0.0/16\"}],[{\"subnet\":\"2001:4860:4860::/64\"}]],\"routes\":[{\"dst\":\"0.0.0.0/0\"},{\"dst\":\"::/0\"}],\"type\":\"host-local\"},\"isGateway\":true,\"promiscMode\":true,\"type\":\"bridge\"}"
            },
            {
              "Network": {
                "type": "portmap",
                "capabilities": {
                  "portMappings": true
                },
                "ipam": {},
                "dns": {}
              },
              "Source": "{\"capabilities\":{\"portMappings\":true},\"type\":\"portmap\"}"
            }
          ],
          "Source": "{\n  \"cniVersion\": \"1.0.0\",\n  \"name\": \"containerd-net\",\n  \"plugins\": [\n    {\n      \"type\": \"bridge\",\n      \"bridge\": \"cni0\",\n      \"isGateway\": true,\n      \"ipMasq\": true,\n      \"promiscMode\": true,\n      \"ipam\": {\n        \"type\": \"host-local\",\n        \"ranges\": [\n          [{\n            \"subnet\": \"10.88.0.0/16\"\n          }],\n          [{\n            \"subnet\": \"2001:4860:4860::/64\"\n          }]\n        ],\n        \"routes\": [\n          { \"dst\": \"0.0.0.0/0\" },\n          { \"dst\": \"::/0\" }\n        ]\n      }\n    },\n    {\n      \"type\": \"portmap\",\n      \"capabilities\": {\"portMappings\": true}\n    }\n  ]\n}\n"
        },
        "IFName": "eth0"
      }
    ]
  },
  "config": {
    "containerd": {
      "snapshotter": "overlayfs",
      "defaultRuntimeName": "runc",
      "defaultRuntime": {
        "runtimeType": "",
        "runtimePath": "",
        "runtimeEngine": "",
        "PodAnnotations": null,
        "ContainerAnnotations": null,
        "runtimeRoot": "",
        "options": null,
        "privileged_without_host_devices": false,
        "privileged_without_host_devices_all_devices_allowed": false,
        "baseRuntimeSpec": "",
        "cniConfDir": "",
        "cniMaxConfNum": 0,
        "snapshotter": "",
        "sandboxMode": ""
      },
      "untrustedWorkloadRuntime": {
        "runtimeType": "",
        "runtimePath": "",
        "runtimeEngine": "",
        "PodAnnotations": null,
        "ContainerAnnotations": null,
        "runtimeRoot": "",
        "options": null,
        "privileged_without_host_devices": false,
        "privileged_without_host_devices_all_devices_allowed": false,
        "baseRuntimeSpec": "",
        "cniConfDir": "",
        "cniMaxConfNum": 0,
        "snapshotter": "",
        "sandboxMode": ""
      },
      "runtimes": {
        "runc": {
          "runtimeType": "io.containerd.runc.v2",
          "runtimePath": "",
          "runtimeEngine": "",
          "PodAnnotations": null,
          "ContainerAnnotations": null,
          "runtimeRoot": "",
          "options": null,
          "privileged_without_host_devices": false,
          "privileged_without_host_devices_all_devices_allowed": false,
          "baseRuntimeSpec": "",
          "cniConfDir": "",
          "cniMaxConfNum": 0,
          "snapshotter": "",
          "sandboxMode": "podsandbox"
        },
        "runc-fp": {
          "runtimeType": "runc-fp.v1",
          "runtimePath": "",
          "runtimeEngine": "",
          "PodAnnotations": [
            "io.containerd.runtime.v2.shim.failpoint.*"
          ],
          "ContainerAnnotations": null,
          "runtimeRoot": "",
          "options": null,
          "privileged_without_host_devices": false,
          "privileged_without_host_devices_all_devices_allowed": false,
          "baseRuntimeSpec": "",
          "cniConfDir": "/tmp/failpoint-cni-net.d",
          "cniMaxConfNum": 1,
          "snapshotter": "",
          "sandboxMode": "podsandbox"
        }
      },
      "noPivot": false,
      "disableSnapshotAnnotations": true,
      "discardUnpackedLayers": false,
      "ignoreBlockIONotEnabledErrors": false,
      "ignoreRdtNotEnabledErrors": false
    },
    "cni": {
      "binDir": "/opt/cni/bin",
      "confDir": "/etc/cni/net.d",
      "maxConfNum": 1,
      "setupSerially": false,
      "confTemplate": "",
      "ipPref": ""
    },
    "registry": {
      "configPath": "",
      "mirrors": null,
      "configs": null,
      "auths": null,
      "headers": null
    },
    "imageDecryption": {
      "keyModel": "node"
    },
    "disableTCPService": true,
    "streamServerAddress": "127.0.0.1",
    "streamServerPort": "0",
    "streamIdleTimeout": "4h0m0s",
    "enableSelinux": false,
    "selinuxCategoryRange": 1024,
    "sandboxImage": "registry.k8s.io/pause:3.8",
    "statsCollectPeriod": 10,
    "systemdCgroup": false,
    "enableTLSStreaming": false,
    "x509KeyPairStreaming": {
      "tlsCertFile": "",
      "tlsKeyFile": ""
    },
    "maxContainerLogSize": 16384,
    "disableCgroup": false,
    "disableApparmor": false,
    "restrictOOMScoreAdj": false,
    "maxConcurrentDownloads": 3,
    "disableProcMount": false,
    "unsetSeccompProfile": "",
    "tolerateMissingHugetlbController": true,
    "disableHugetlbController": true,
    "device_ownership_from_security_context": false,
    "ignoreImageDefinedVolumes": false,
    "netnsMountsUnderStateDir": false,
    "enableUnprivilegedPorts": false,
    "enableUnprivilegedICMP": false,
    "enableCDI": false,
    "cdiSpecDirs": [
      "/etc/cdi",
      "/var/run/cdi"
    ],
    "imagePullProgressTimeout": "1m0s",
    "containerdRootDir": "/var/lib/containerd-test",
    "containerdEndpoint": "/run/containerd-test/containerd.sock",
    "rootDir": "/var/lib/containerd-test/io.containerd.grpc.v1.cri",
    "stateDir": "/run/containerd-test/io.containerd.grpc.v1.cri"
  },
  "golang": "go1.18.10",
  "lastCNILoadStatus": "OK",
  "lastCNILoadStatus.default": "OK",
  "lastCNILoadStatus.runc-fp": "OK"
}
=== RUN   TestUpdateContainerResources_MemorySwap
    container_update_resources_test.go:158: Swap or swap accounting are not enabled. Swap is required for this test
--- SKIP: TestUpdateContainerResources_MemorySwap (0.00s)
=== RUN   TestUpdateContainerResources_MemoryLimit
    container_update_resources_test.go:229: Create a sandbox
INFO[0000] Using the following image list: {Alpine:ghcr.io/containerd/alpine:3.14.0 BusyBox:ghcr.io/containerd/busybox:1.28 Pause:registry.k8s.io/pause:3.8 ResourceConsumer:registry.k8s.io/e2e-test-images/resource-consumer:1.10 VolumeCopyUp:ghcr.io/containerd/volume-copy-up:2.1 VolumeOwnership:ghcr.io/containerd/volume-ownership:2.1} 
    main_test.go:668: Image "registry.k8s.io/pause:3.8" already exists, not pulling.
    container_update_resources_test.go:242: Create a container with memory limit
    container_update_resources_test.go:253: Check memory limit in container OCI spec
    container_update_resources_test.go:261: Update container memory limit after created
    container_update_resources_test.go:267: Check memory limit in container OCI spec
    container_update_resources_test.go:273: Start the container
    container_update_resources_test.go:278: Check memory limit in cgroup
    container_update_resources_test.go:286: Update container memory limit after started
    container_update_resources_test.go:292: Check memory limit in container OCI spec
    container_update_resources_test.go:298: Check memory limit in cgroup
--- PASS: TestUpdateContainerResources_MemoryLimit (1.19s)
PASS

So the fix seem to be working fine for me!

@Jenkins-J
Copy link
Contributor Author

@AkihiroSuda Does this solution seem consistent with the other fixed tests (#7946)?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Archived in project

Development

Successfully merging this pull request may close these issues.

5 participants