-
Notifications
You must be signed in to change notification settings - Fork 3.8k
Fix Memory Limit test #7959
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix Memory Limit test #7959
Conversation
|
Hi @Jenkins-J. Thanks for your PR. I'm waiting for a containerd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
e89c3c0 to
63a3ed3
Compare
Modify the memory limit test, allowing the test to pass when swap is not enabled. Signed-off-by: James Jenkins <[email protected]>
63a3ed3 to
b1c5c57
Compare
|
I tried running the test a node w/o swap controller: TestUpdateContainerResources_MemoryLimit (main)$ stat -fc %T /sys/fs/cgroup/
tmpfs
$ ls -la /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes
ls: cannot access '/sys/fs/cgroup/memory/memory.memsw.limit_in_bytes': No such file or directory
$ GITHUB_WORKSPACE="" ENABLE_CRI_SANDBOXES="" CONTAINERD_RUNTIME=io.containerd.runc.v2 FOCUS=TestUpdateContainerResources_Memory make cri-integration
+ bin/ctr
go build -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie -o bin/ctr -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-68-g8d9af708d -X github.com/containerd/containerd/version.Revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs" ./cmd/ctr
+ bin/containerd
go build -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie -o bin/containerd -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-68-g8d9af708d -X github.com/containerd/containerd/version.Revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs" ./cmd/containerd
+ bin/containerd-stress
go build -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-68-g8d9af708d -X github.com/containerd/containerd/version.Revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs" ./cmd/containerd-stress
+ bin/containerd-shim
+ bin/containerd-shim-runc-v1
+ bin/containerd-shim-runc-v2
+ binaries
+ bin/cri-integration.test
+ cri-integration
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc-fp]
cni_conf_dir = "/tmp/failpoint-cni-net.d"
cni_max_conf_num = 1
pod_annotations = ["io.containerd.runtime.v2.shim.failpoint.*"]
runtime_type = "runc-fp.v1"
{
"cniVersion": "1.0.0",
"name": "containerd-net-failpoint",
"plugins": [
{
"type": "cni-bridge-fp",
"bridge": "cni-fp",
"isGateway": true,
"ipMasq": true,
"promiscMode": true,
"ipam": {
"type": "host-local",
"ranges": [
[{
"subnet": "10.88.0.0/16"
}],
[{
"subnet": "2001:4860:4860::/64"
}]
],
"routes": [
{ "dst": "0.0.0.0/0" },
{ "dst": "::/0" }
]
},
"capabilities": {
"io.kubernetes.cri.pod-annotations": true
}
},
{
"type": "portmap",
"capabilities": {"portMappings": true}
}
]
}
{
"status": {
"conditions": [
{
"type": "RuntimeReady",
"status": true,
"reason": "",
"message": ""
},
{
"type": "NetworkReady",
"status": true,
"reason": "",
"message": ""
}
]
},
"cniconfig": {
"PluginDirs": [
"/opt/cni/bin"
],
"PluginConfDir": "/etc/cni/net.d",
"PluginMaxConfNum": 1,
"Prefix": "eth",
"Networks": [
{
"Config": {
"Name": "cni-loopback",
"CNIVersion": "0.3.1",
"Plugins": [
{
"Network": {
"type": "loopback",
"ipam": {},
"dns": {}
},
"Source": "{\"type\":\"loopback\"}"
}
],
"Source": "{\n\"cniVersion\": \"0.3.1\",\n\"name\": \"cni-loopback\",\n\"plugins\": [{\n \"type\": \"loopback\"\n}]\n}"
},
"IFName": "lo"
},
{
"Config": {
"Name": "containerd-net",
"CNIVersion": "1.0.0",
"Plugins": [
{
"Network": {
"type": "bridge",
"ipam": {
"type": "host-local"
},
"dns": {}
},
"Source": "{\"bridge\":\"cni0\",\"ipMasq\":true,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.88.0.0/16\"}],[{\"subnet\":\"2001:4860:4860::/64\"}]],\"routes\":[{\"dst\":\"0.0.0.0/0\"},{\"dst\":\"::/0\"}],\"type\":\"host-local\"},\"isGateway\":true,\"promiscMode\":true,\"type\":\"bridge\"}"
},
{
"Network": {
"type": "portmap",
"capabilities": {
"portMappings": true
},
"ipam": {},
"dns": {}
},
"Source": "{\"capabilities\":{\"portMappings\":true},\"type\":\"portmap\"}"
}
],
"Source": "{\n \"cniVersion\": \"1.0.0\",\n \"name\": \"containerd-net\",\n \"plugins\": [\n {\n \"type\": \"bridge\",\n \"bridge\": \"cni0\",\n \"isGateway\": true,\n \"ipMasq\": true,\n \"promiscMode\": true,\n \"ipam\": {\n \"type\": \"host-local\",\n \"ranges\": [\n [{\n \"subnet\": \"10.88.0.0/16\"\n }],\n [{\n \"subnet\": \"2001:4860:4860::/64\"\n }]\n ],\n \"routes\": [\n { \"dst\": \"0.0.0.0/0\" },\n { \"dst\": \"::/0\" }\n ]\n }\n },\n {\n \"type\": \"portmap\",\n \"capabilities\": {\"portMappings\": true}\n }\n ]\n}\n"
},
"IFName": "eth0"
}
]
},
"config": {
"containerd": {
"snapshotter": "overlayfs",
"defaultRuntimeName": "runc",
"defaultRuntime": {
"runtimeType": "",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": null,
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "",
"cniMaxConfNum": 0,
"snapshotter": "",
"sandboxMode": ""
},
"untrustedWorkloadRuntime": {
"runtimeType": "",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": null,
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "",
"cniMaxConfNum": 0,
"snapshotter": "",
"sandboxMode": ""
},
"runtimes": {
"runc": {
"runtimeType": "io.containerd.runc.v2",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": null,
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "",
"cniMaxConfNum": 0,
"snapshotter": "",
"sandboxMode": "podsandbox"
},
"runc-fp": {
"runtimeType": "runc-fp.v1",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": [
"io.containerd.runtime.v2.shim.failpoint.*"
],
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "/tmp/failpoint-cni-net.d",
"cniMaxConfNum": 1,
"snapshotter": "",
"sandboxMode": "podsandbox"
}
},
"noPivot": false,
"disableSnapshotAnnotations": true,
"discardUnpackedLayers": false,
"ignoreBlockIONotEnabledErrors": false,
"ignoreRdtNotEnabledErrors": false
},
"cni": {
"binDir": "/opt/cni/bin",
"confDir": "/etc/cni/net.d",
"maxConfNum": 1,
"setupSerially": false,
"confTemplate": "",
"ipPref": ""
},
"registry": {
"configPath": "",
"mirrors": null,
"configs": null,
"auths": null,
"headers": null
},
"imageDecryption": {
"keyModel": "node"
},
"disableTCPService": true,
"streamServerAddress": "127.0.0.1",
"streamServerPort": "0",
"streamIdleTimeout": "4h0m0s",
"enableSelinux": false,
"selinuxCategoryRange": 1024,
"sandboxImage": "registry.k8s.io/pause:3.8",
"statsCollectPeriod": 10,
"systemdCgroup": false,
"enableTLSStreaming": false,
"x509KeyPairStreaming": {
"tlsCertFile": "",
"tlsKeyFile": ""
},
"maxContainerLogSize": 16384,
"disableCgroup": false,
"disableApparmor": false,
"restrictOOMScoreAdj": false,
"maxConcurrentDownloads": 3,
"disableProcMount": false,
"unsetSeccompProfile": "",
"tolerateMissingHugetlbController": true,
"disableHugetlbController": true,
"device_ownership_from_security_context": false,
"ignoreImageDefinedVolumes": false,
"netnsMountsUnderStateDir": false,
"enableUnprivilegedPorts": false,
"enableUnprivilegedICMP": false,
"enableCDI": false,
"cdiSpecDirs": [
"/etc/cdi",
"/var/run/cdi"
],
"imagePullProgressTimeout": "1m0s",
"containerdRootDir": "/var/lib/containerd-test",
"containerdEndpoint": "/run/containerd-test/containerd.sock",
"rootDir": "/var/lib/containerd-test/io.containerd.grpc.v1.cri",
"stateDir": "/run/containerd-test/io.containerd.grpc.v1.cri"
},
"golang": "go1.18.10",
"lastCNILoadStatus": "OK",
"lastCNILoadStatus.default": "OK",
"lastCNILoadStatus.runc-fp": "OK"
}
=== RUN TestUpdateContainerResources_MemorySwap
container_update_resources_test.go:157: Swap or swap accounting are not enabled. Swap is required for this test
--- SKIP: TestUpdateContainerResources_MemorySwap (0.00s)
=== RUN TestUpdateContainerResources_MemoryLimit
container_update_resources_test.go:228: Create a sandbox
INFO[0000] Using the following image list: {Alpine:ghcr.io/containerd/alpine:3.14.0 BusyBox:ghcr.io/containerd/busybox:1.28 Pause:registry.k8s.io/pause:3.8 ResourceConsumer:registry.k8s.io/e2e-test-images/resource-consumer:1.10 VolumeCopyUp:ghcr.io/containerd/volume-copy-up:2.1 VolumeOwnership:ghcr.io/containerd/volume-ownership:2.1}
main_test.go:668: Image "registry.k8s.io/pause:3.8" already exists, not pulling.
container_update_resources_test.go:238: Create a container with memory limit
container_update_resources_test.go:249: Check memory limit in container OCI spec
container_update_resources_test.go:56:
Error Trace: /home/azureuser/containerd/container_update_resources_test.go:56
/home/azureuser/containerd/container_update_resources_test.go:255
Error: Expected value not to be nil.
Test: TestUpdateContainerResources_MemoryLimit
--- FAIL: TestUpdateContainerResources_MemoryLimit (1.22s)
FAIL
run_containerd
time="2023-01-25T16:40:53.896196467Z" level=info msg="starting containerd" revision=8d9af708d7298ca4b3ecd6e2f25c33048aa527e2 version=v1.7.0-beta.2-68-g8d9af708d
time="2023-01-25T16:40:53.923675282Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.926762719Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.927022039Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd-test/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.927046941Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
time="2023-01-25T16:40:53.928032417Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928062119Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928217931Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928240033Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
time="2023-01-25T16:40:53.928252434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928465450Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd-test/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
time="2023-01-25T16:40:53.928491052Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
time="2023-01-25T16:40:53.928512154Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
time="2023-01-25T16:40:53.928524255Z" level=info msg="metadata content store policy set" policy=shared
time="2023-01-25T16:40:53.928807276Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
time="2023-01-25T16:40:53.928851980Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
time="2023-01-25T16:40:53.928870881Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
time="2023-01-25T16:40:53.928929586Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1
time="2023-01-25T16:40:53.928954588Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1
time="2023-01-25T16:40:53.929127601Z" level=info msg="runtime interface created"
time="2023-01-25T16:40:53.929143102Z" level=info msg="created NRI interface"
time="2023-01-25T16:40:53.929157503Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1
time="2023-01-25T16:40:53.929174205Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1
time="2023-01-25T16:40:53.929190706Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1
time="2023-01-25T16:40:53.929210007Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929225309Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929240610Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929255311Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929284713Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929301214Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929316416Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
time="2023-01-25T16:40:53.929362919Z" level=debug msg="loading tasks in namespace" namespace=k8s.io
time="2023-01-25T16:40:53.929424624Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2
time="2023-01-25T16:40:53.929442725Z" level=info msg="loading plugin \"io.containerd.service.v1.sandbox-controller-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929458527Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.929473328Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
time="2023-01-25T16:40:53.929508930Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
time="2023-01-25T16:40:53.930008469Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
time="2023-01-25T16:40:53.930040371Z" level=debug msg="No blockio config file specified, blockio not configured"
time="2023-01-25T16:40:53.930068373Z" level=debug msg="No RDT config file specified, RDT not configured"
time="2023-01-25T16:40:53.930086575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930102276Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
time="2023-01-25T16:40:53.930161281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930177482Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930195183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930209984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930224885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930240187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930254488Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930268289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930282890Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
time="2023-01-25T16:40:53.930321793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930338994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930353495Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930368897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930383098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930398899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930413300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930435702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
time="2023-01-25T16:40:53.930681221Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox} runc-fp:{Type:runc-fp.v1 Path: Engine: PodAnnotations:[io.containerd.runtime.v2.shim.failpoint.*] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir:/tmp/failpoint-cni-net.d NetworkPluginMaxConfNum:1 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:1m0s} ContainerdRootDir:/var/lib/containerd-test ContainerdEndpoint:/run/containerd-test/containerd.sock RootDir:/var/lib/containerd-test/io.containerd.grpc.v1.cri StateDir:/run/containerd-test/io.containerd.grpc.v1.cri}"
time="2023-01-25T16:40:53.930753126Z" level=info msg="Connect containerd service"
time="2023-01-25T16:40:53.930793729Z" level=info msg="using legacy CRI server"
time="2023-01-25T16:40:53.930841433Z" level=info msg="Get image filesystem path \"/var/lib/containerd-test/io.containerd.snapshotter.v1.overlayfs\""
time="2023-01-25T16:40:53.931470981Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this"
time="2023-01-25T16:40:53.931488683Z" level=info msg="runtime interface starting up..."
time="2023-01-25T16:40:53.931497183Z" level=info msg="starting plugins..."
time="2023-01-25T16:40:53.931710800Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
time="2023-01-25T16:40:53.931738502Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
time="2023-01-25T16:40:53.931752503Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
time="2023-01-25T16:40:53.931773205Z" level=info msg="skipping tracing processor initialization (no tracing plugin)" error="no OpenTelemetry endpoint: skip plugin"
time="2023-01-25T16:40:53.932020324Z" level=info msg=serving... address=/run/containerd-test/containerd.sock.ttrpc
time="2023-01-25T16:40:53.932070227Z" level=info msg=serving... address=/run/containerd-test/containerd.sock
time="2023-01-25T16:40:53.932125932Z" level=debug msg="sd notification" notified=false state="READY=1"
time="2023-01-25T16:40:53.932144933Z" level=info msg="containerd successfully booted in 0.036554s"
time="2023-01-25T16:40:53.936582675Z" level=info msg="Start subscribing containerd event"
time="2023-01-25T16:40:53.936902799Z" level=info msg="Start recovering state"
time="2023-01-25T16:40:53.942044495Z" level=debug msg="Loaded image \"sha256:4873874c08efc72e9729683a83ffbb7502ee729e9a5ac097723806ea7fa13517\""
time="2023-01-25T16:40:53.944579290Z" level=debug msg="Loaded image \"registry.k8s.io/pause:3.8\""
time="2023-01-25T16:40:53.945584667Z" level=debug msg="Loaded image \"registry.k8s.io/pause@sha256:9001185023633d17a2f98ff69b6ff2615b8ea02a825adffa40422f51dfdcde9d\""
time="2023-01-25T16:40:53.945818285Z" level=info msg="Start event monitor"
time="2023-01-25T16:40:53.945839987Z" level=info msg="Start snapshots syncer"
time="2023-01-25T16:40:53.945852688Z" level=info msg="Start cni network conf syncer for default"
time="2023-01-25T16:40:53.945887291Z" level=info msg="Start cni network conf syncer for runc-fp"
time="2023-01-25T16:40:53.945895691Z" level=info msg="Start streaming server"
time="2023-01-25T16:40:53.945905392Z" level=info msg="Registered namespace \"k8s.io\" with NRI"
time="2023-01-25T16:40:54.034654320Z" level=debug msg="garbage collected" d=4.747466ms
time="2023-01-25T16:40:54.087711103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:sandbox,Uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649,Namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999,Attempt:0,}"
time="2023-01-25T16:40:54.087826912Z" level=debug msg="Sandbox config &PodSandboxConfig{Metadata:&PodSandboxMetadata{Name:sandbox,Uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649,Namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999,Attempt:0,},Hostname:,LogDirectory:,DnsConfig:nil,PortMappings:[]*PortMapping{},Labels:map[string]string{},Annotations:map[string]string{},Linux:&LinuxPodSandboxConfig{CgroupParent:,SecurityContext:nil,Sysctls:map[string]string{},Overhead:nil,Resources:nil,},Windows:nil,}"
time="2023-01-25T16:40:54.087861714Z" level=debug msg="generated id for sandbox name \"sandbox_update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999_52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649_0\"" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.087990324Z" level=debug msg="use OCI runtime {Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.088262445Z" level=debug msg="sandbox container spec: (*specs.Spec)(0xc0006fc990){Version:(string)1.0.2-dev Process:(*specs.Process)(0xc0007f72c0){Terminal:(bool)false ConsoleSize:(*specs.Box)<nil> User:(specs.User){UID:(uint32)0 GID:(uint32)0 Umask:(*uint32)<nil> AdditionalGids:([]uint32)<nil> Username:(string)} Args:([]string)[/pause] CommandLine:(string) Env:([]string)[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin] Cwd:(string)/ Capabilities:(*specs.LinuxCapabilities)(0xc00091e400){Bounding:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Effective:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Inheritable:([]string)<nil> Permitted:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Ambient:([]string)<nil>} Rlimits:([]specs.POSIXRlimit)<nil> NoNewPrivileges:(bool)true ApparmorProfile:(string) OOMScoreAdj:(*int)(0xc0008404a8)-998 SelinuxLabel:(string)} Root:(*specs.Root)(0xc00041b7e8){Path:(string)rootfs Readonly:(bool)true} Hostname:(string) Domainname:(string) Mounts:([]specs.Mount)[{Destination:(string)/proc Type:(string)proc Source:(string)proc Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev Type:(string)tmpfs Source:(string)tmpfs Options:([]string)[nosuid strictatime mode=755 size=65536k] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/pts Type:(string)devpts Source:(string)devpts Options:([]string)[nosuid noexec newinstance ptmxmode=0666 mode=0620 gid=5] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/mqueue Type:(string)mqueue Source:(string)mqueue Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/sys Type:(string)sysfs Source:(string)sysfs Options:([]string)[nosuid noexec nodev ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/shm Type:(string)bind Source:(string)/run/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/shm Options:([]string)[rbind ro nosuid nodev noexec] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/resolv.conf Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/resolv.conf Options:([]string)[rbind ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>}] Hooks:(*specs.Hooks)<nil> Annotations:(map[string]string)map[io.kubernetes.cri.sandbox-uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649 io.kubernetes.cri.sandbox-name:sandbox io.kubernetes.cri.sandbox-log-directory: io.kubernetes.cri.container-type:sandbox io.kubernetes.cri.sandbox-id:5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa io.kubernetes.cri.sandbox-namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999] Linux:(*specs.Linux)(0xc0007f73b0){UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil> Sysctl:(map[string]string)map[] Resources:(*specs.LinuxResources)(0xc0001d35e0){Devices:([]specs.LinuxDeviceCgroup)[{Allow:(bool)false Type:(string) Major:(*int64)<nil> Minor:(*int64)<nil> Access:(string)rwm}] Memory:(*specs.LinuxMemory)<nil> CPU:(*specs.LinuxCPU)(0xc00087e3c0){Shares:(*uint64)(0xc0008404d0)2 Quota:(*int64)<nil> Period:(*uint64)<nil> RealtimeRuntime:(*int64)<nil> RealtimePeriod:(*uint64)<nil> Cpus:(string) Mems:(string) Idle:(*int64)<nil>} Pids:(*specs.LinuxPids)<nil> BlockIO:(*specs.LinuxBlockIO)<nil> HugepageLimits:([]specs.LinuxHugepageLimit)<nil> Network:(*specs.LinuxNetwork)<nil> Rdma:(map[string]specs.LinuxRdma)<nil> Unified:(map[string]string)<nil>} CgroupsPath:(string)/k8s.io/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa Namespaces:([]specs.LinuxNamespace)[{Type:(specs.LinuxNamespaceType)pid Path:(string)} {Type:(specs.LinuxNamespaceType)ipc Path:(string)} {Type:(specs.LinuxNamespaceType)uts Path:(string)} {Type:(specs.LinuxNamespaceType)mount Path:(string)} {Type:(specs.LinuxNamespaceType)network Path:(string)}] Devices:([]specs.LinuxDevice)<nil> Seccomp:(*specs.LinuxSeccomp)<nil> RootfsPropagation:(string) MaskedPaths:([]string)[/proc/acpi /proc/asound /proc/kcore /proc/keys /proc/latency_stats /proc/timer_list /proc/timer_stats /proc/sched_debug /sys/firmware /proc/scsi] ReadonlyPaths:([]string)[/proc/bus /proc/fs /proc/irq /proc/sys /proc/sysrq-trigger] MountLabel:(string) IntelRdt:(*specs.LinuxIntelRdt)<nil> Personality:(*specs.LinuxPersonality)<nil>} Solaris:(*specs.Solaris)<nil> Windows:(*specs.Windows)<nil> VM:(*specs.VM)<nil> ZOS:(*specs.ZOS)<nil>}" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.095472500Z" level=debug msg="remote introspection plugin filters" filters="[type==io.containerd.snapshotter.v1, id==overlayfs]"
time="2023-01-25T16:40:54.111041798Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/prepare type=containerd.events.SnapshotPrepare
time="2023-01-25T16:40:54.119256430Z" level=debug msg="event published" ns=k8s.io topic=/containers/create type=containerd.events.ContainerCreate
time="2023-01-25T16:40:54.137370824Z" level=debug msg="event published" ns=k8s.io topic=/containers/update type=containerd.events.ContainerUpdate
time="2023-01-25T16:40:54.137434829Z" level=debug msg="begin cni setup" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.211409020Z" level=debug msg="cni result: {\"Interfaces\":{\"cni0\":{\"IPConfigs\":null,\"Mac\":\"ba:27:b6:79:8f:18\",\"Sandbox\":\"\"},\"eth0\":{\"IPConfigs\":[{\"IP\":\"10.88.0.12\",\"Gateway\":\"10.88.0.1\"},{\"IP\":\"2001:4860:4860::c\",\"Gateway\":\"2001:4860:4860::1\"}],\"Mac\":\"62:a4:f1:70:96:49\",\"Sandbox\":\"/var/run/netns/cni-609863d8-fccd-2c68-3b41-e515198da617\"},\"lo\":{\"IPConfigs\":[{\"IP\":\"127.0.0.1\",\"Gateway\":\"\"},{\"IP\":\"::1\",\"Gateway\":\"\"}],\"Mac\":\"00:00:00:00:00:00\",\"Sandbox\":\"/var/run/netns/cni-609863d8-fccd-2c68-3b41-e515198da617\"},\"veth6d4d3e9d\":{\"IPConfigs\":null,\"Mac\":\"86:a9:3f:0b:ea:e5\",\"Sandbox\":\"\"}},\"DNS\":[{},{}],\"Routes\":[{\"dst\":\"0.0.0.0/0\"},{\"dst\":\"::/0\"}]}" podsandboxid=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa
time="2023-01-25T16:40:54.217375479Z" level=debug msg="event published" ns=k8s.io topic=/containers/update type=containerd.events.ContainerUpdate
time="2023-01-25T16:40:54.226662694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
time="2023-01-25T16:40:54.226724199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
time="2023-01-25T16:40:54.226738400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
time="2023-01-25T16:40:54.226922714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd-test/io.containerd.runtime.v2.task/k8s.io/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa pid=4598 runtime=io.containerd.runc.v2
time="2023-01-25T16:40:54.271663757Z" level=debug msg="garbage collected" d=3.394661ms
time="2023-01-25T16:40:54.273380589Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/create type=containerd.events.TaskCreate
time="2023-01-25T16:40:54.283028131Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/start type=containerd.events.TaskStart
time="2023-01-25T16:40:54.283383658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:sandbox,Uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649,Namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999,Attempt:0,} returns sandbox id \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:54.285069088Z" level=info msg="CreateContainer within sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" for container &ContainerMetadata{Name:container,Attempt:0,}"
time="2023-01-25T16:40:54.285148194Z" level=debug msg="Container config &ContainerConfig{Metadata:&ContainerMetadata{Name:container,Attempt:0,},Image:&ImageSpec{Image:registry.k8s.io/pause:3.8,Annotations:map[string]string{},},Command:[],Args:[],WorkingDir:,Envs:[]*KeyValue{},Mounts:[]*Mount{},Devices:[]*Device{},Labels:map[string]string{},Annotations:map[string]string{},LogPath:,Stdin:false,StdinOnce:false,Tty:false,Linux:&LinuxContainerConfig{Resources:&LinuxContainerResources{CpuPeriod:0,CpuQuota:0,CpuShares:0,MemoryLimitInBytes:209715200,OomScoreAdj:0,CpusetCpus:,CpusetMems:,HugepageLimits:[]*HugepageLimit{},Unified:map[string]string{},MemorySwapLimitInBytes:0,},SecurityContext:nil,},Windows:nil,}"
time="2023-01-25T16:40:54.285373311Z" level=debug msg="Generated id \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" for container \"container_sandbox_update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999_52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649_0\""
time="2023-01-25T16:40:54.285577027Z" level=debug msg="Use OCI runtime {Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox} for sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" and container \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\""
time="2023-01-25T16:40:54.285903952Z" level=debug msg="Container \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" spec: (*specs.Spec)(0xc000779dd0){Version:(string)1.0.2-dev Process:(*specs.Process)(0xc00075a4b0){Terminal:(bool)false ConsoleSize:(*specs.Box)<nil> User:(specs.User){UID:(uint32)0 GID:(uint32)0 Umask:(*uint32)<nil> AdditionalGids:([]uint32)<nil> Username:(string)} Args:([]string)[/pause] CommandLine:(string) Env:([]string)[PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin HOSTNAME=qasim-vm] Cwd:(string)/ Capabilities:(*specs.LinuxCapabilities)(0xc0000f5c80){Bounding:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Effective:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Inheritable:([]string)<nil> Permitted:([]string)[CAP_CHOWN CAP_DAC_OVERRIDE CAP_FSETID CAP_FOWNER CAP_MKNOD CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SETFCAP CAP_SETPCAP CAP_NET_BIND_SERVICE CAP_SYS_CHROOT CAP_KILL CAP_AUDIT_WRITE] Ambient:([]string)<nil>} Rlimits:([]specs.POSIXRlimit)<nil> NoNewPrivileges:(bool)false ApparmorProfile:(string) OOMScoreAdj:(*int)(0xc00074b658)0 SelinuxLabel:(string)} Root:(*specs.Root)(0xc0001419f8){Path:(string)rootfs Readonly:(bool)false} Hostname:(string) Domainname:(string) Mounts:([]specs.Mount)[{Destination:(string)/proc Type:(string)proc Source:(string)proc Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev Type:(string)tmpfs Source:(string)tmpfs Options:([]string)[nosuid strictatime mode=755 size=65536k] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/pts Type:(string)devpts Source:(string)devpts Options:([]string)[nosuid noexec newinstance ptmxmode=0666 mode=0620 gid=5] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/mqueue Type:(string)mqueue Source:(string)mqueue Options:([]string)[nosuid noexec nodev] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/sys Type:(string)sysfs Source:(string)sysfs Options:([]string)[nosuid noexec nodev ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/sys/fs/cgroup Type:(string)cgroup Source:(string)cgroup Options:([]string)[nosuid noexec nodev relatime ro] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/hostname Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/hostname Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/hosts Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/hosts Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/etc/resolv.conf Type:(string)bind Source:(string)/var/lib/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/resolv.conf Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>} {Destination:(string)/dev/shm Type:(string)bind Source:(string)/run/containerd-test/io.containerd.grpc.v1.cri/sandboxes/5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa/shm Options:([]string)[rbind rprivate rw] UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil>}] Hooks:(*specs.Hooks)<nil> Annotations:(map[string]string)map[io.kubernetes.cri.container-type:container io.kubernetes.cri.sandbox-id:5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa io.kubernetes.cri.sandbox-namespace:update-container-resources-81855ad8681d0d86d1e91e00167939cb6694d2c422acd208a0072939487f6999 io.kubernetes.cri.sandbox-uid:52fdfc072182654f163f5f0f9a621d729566c74d10037c4d7bbb0407d1e2c649 io.kubernetes.cri.sandbox-name:sandbox io.kubernetes.cri.container-name:container io.kubernetes.cri.image-name:registry.k8s.io/pause:3.8] Linux:(*specs.Linux)(0xc00075a5a0){UIDMappings:([]specs.LinuxIDMapping)<nil> GIDMappings:([]specs.LinuxIDMapping)<nil> Sysctl:(map[string]string)<nil> Resources:(*specs.LinuxResources)(0xc0004ff030){Devices:([]specs.LinuxDeviceCgroup)[{Allow:(bool)false Type:(string) Major:(*int64)<nil> Minor:(*int64)<nil> Access:(string)rwm}] Memory:(*specs.LinuxMemory)(0xc000397080){Limit:(*int64)(0xc00074b648)209715200 Reservation:(*int64)<nil> Swap:(*int64)<nil> Kernel:(*int64)<nil> KernelTCP:(*int64)<nil> Swappiness:(*uint64)<nil> DisableOOMKiller:(*bool)<nil> UseHierarchy:(*bool)<nil>} CPU:(*specs.LinuxCPU)(0xc000802be0){Shares:(*uint64)<nil> Quota:(*int64)<nil> Period:(*uint64)<nil> RealtimeRuntime:(*int64)<nil> RealtimePeriod:(*uint64)<nil> Cpus:(string) Mems:(string) Idle:(*int64)<nil>} Pids:(*specs.LinuxPids)<nil> BlockIO:(*specs.LinuxBlockIO)<nil> HugepageLimits:([]specs.LinuxHugepageLimit)<nil> Network:(*specs.LinuxNetwork)<nil> Rdma:(map[string]specs.LinuxRdma)<nil> Unified:(map[string]string)<nil>} CgroupsPath:(string)/k8s.io/145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83 Namespaces:([]specs.LinuxNamespace)[{Type:(specs.LinuxNamespaceType)pid Path:(string)/proc/4619/ns/pid} {Type:(specs.LinuxNamespaceType)ipc Path:(string)/proc/4619/ns/ipc} {Type:(specs.LinuxNamespaceType)uts Path:(string)/proc/4619/ns/uts} {Type:(specs.LinuxNamespaceType)mount Path:(string)} {Type:(specs.LinuxNamespaceType)network Path:(string)/proc/4619/ns/net}] Devices:([]specs.LinuxDevice)<nil> Seccomp:(*specs.LinuxSeccomp)<nil> RootfsPropagation:(string) MaskedPaths:([]string)[] ReadonlyPaths:([]string)[] MountLabel:(string) IntelRdt:(*specs.LinuxIntelRdt)<nil> Personality:(*specs.LinuxPersonality)<nil>} Solaris:(*specs.Solaris)<nil> Windows:(*specs.Windows)<nil> VM:(*specs.VM)<nil> ZOS:(*specs.ZOS)<nil>}"
time="2023-01-25T16:40:54.286028762Z" level=info msg="Logging will be disabled due to empty log paths for sandbox (\"\") or container (\"\")"
time="2023-01-25T16:40:54.291780504Z" level=debug msg="remote introspection plugin filters" filters="[type==io.containerd.snapshotter.v1, id==overlayfs]"
time="2023-01-25T16:40:54.307679628Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/prepare type=containerd.events.SnapshotPrepare
time="2023-01-25T16:40:54.319899868Z" level=debug msg="event published" ns=k8s.io topic=/containers/create type=containerd.events.ContainerCreate
time="2023-01-25T16:40:54.334251572Z" level=info msg="CreateContainer within sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" for &ContainerMetadata{Name:container,Attempt:0,} returns container id \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\""
time="2023-01-25T16:40:54.338027063Z" level=info msg="StopPodSandbox for \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:54.338122870Z" level=info msg="Container to stop \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" must be in running or unknown state, current state \"CONTAINER_CREATED\""
time="2023-01-25T16:40:54.352509177Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/exit type=containerd.events.TaskExit
time="2023-01-25T16:40:54.352672790Z" level=debug msg="received exit event container_id:\"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" id:\"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" pid:4619 exit_status:137 exited_at:{seconds:1674664854 nanos:352336164}"
time="2023-01-25T16:40:55.151559058Z" level=debug msg="garbage collected" d=679.420176ms
time="2023-01-25T16:40:55.159291952Z" level=debug msg="event forwarded" ns=k8s.io topic=/tasks/delete type=containerd.events.TaskDelete
time="2023-01-25T16:40:55.159692683Z" level=info msg="shim disconnected" id=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa namespace=k8s.io
time="2023-01-25T16:40:55.159739587Z" level=warning msg="cleaning up after shim disconnected" id=5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa namespace=k8s.io
time="2023-01-25T16:40:55.159751988Z" level=info msg="cleaning up dead shim" namespace=k8s.io
time="2023-01-25T16:40:55.170802538Z" level=warning msg="cleanup warnings time=\"2023-01-25T16:40:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4654 runtime=io.containerd.runc.v2\n" namespace=k8s.io
time="2023-01-25T16:40:55.245433880Z" level=info msg="TearDown network for sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" successfully"
time="2023-01-25T16:40:55.245490485Z" level=info msg="StopPodSandbox for \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" returns successfully"
time="2023-01-25T16:40:55.246849089Z" level=info msg="RemovePodSandbox for \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:55.246888592Z" level=info msg="Forcibly stopping sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\""
time="2023-01-25T16:40:55.246933396Z" level=info msg="Container to stop \"145da03ec1c25eb2da39c823705dbd06b4db88ed03b8d08bfc1788c5b9055d83\" must be in running or unknown state, current state \"CONTAINER_CREATED\""
time="2023-01-25T16:40:55.267113549Z" level=info msg="TearDown network for sandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" successfully"
time="2023-01-25T16:40:55.280926311Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/remove type=containerd.events.SnapshotRemove
time="2023-01-25T16:40:55.290903079Z" level=debug msg="event published" ns=k8s.io topic=/containers/delete type=containerd.events.ContainerDelete
time="2023-01-25T16:40:55.297947821Z" level=debug msg="event published" ns=k8s.io topic=/snapshot/remove type=containerd.events.SnapshotRemove
time="2023-01-25T16:40:55.303816473Z" level=debug msg="event published" ns=k8s.io topic=/containers/delete type=containerd.events.ContainerDelete
time="2023-01-25T16:40:55.303890978Z" level=error msg="Failed to get podSandbox status for container event for sandboxID \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\": an error occurred when try to find sandbox: not found. Skipping sending the event."
time="2023-01-25T16:40:55.303931781Z" level=info msg="RemovePodSandbox \"5a9ab7602e1d49913e6d0c4463355ba496afdb40f8758cb66361cdefa462fffa\" returns successfully"
make: *** [Makefile:224: cri-integration] Error 1TestUpdateContainerResources_MemoryLimit (PR)$ stat -fc %T /sys/fs/cgroup/
tmpfs
$ ls -la /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes
ls: cannot access '/sys/fs/cgroup/memory/memory.memsw.limit_in_bytes': No such file or directory
$ GITHUB_WORKSPACE="" ENABLE_CRI_SANDBOXES="" CONTAINERD_RUNTIME=io.containerd.runc.v2 FOCUS=TestUpdateContainerResources_Memory make cri-integration
+ bin/ctr
go build -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie -o bin/ctr -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-31-gb1c5c57be -X github.com/containerd/containerd/version.Revision=b1c5c57be08ceeb1763b41cdd7c95c743931e193 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs" ./cmd/ctr
+ bin/containerd
go build -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie -o bin/containerd -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-31-gb1c5c57be -X github.com/containerd/containerd/version.Revision=b1c5c57be08ceeb1763b41cdd7c95c743931e193 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs" ./cmd/containerd
+ bin/containerd-stress
go build -gcflags=-trimpath=/home/azureuser/go/src -buildmode=pie -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/version.Version=v1.7.0-beta.2-31-gb1c5c57be -X github.com/containerd/containerd/version.Revision=b1c5c57be08ceeb1763b41cdd7c95c743931e193 -X github.com/containerd/containerd/version.Package=github.com/containerd/containerd -s -w ' -tags "urfave_cli_no_docs" ./cmd/containerd-stress
+ bin/containerd-shim
+ bin/containerd-shim-runc-v1
+ bin/containerd-shim-runc-v2
+ binaries
+ bin/cri-integration.test
+ cri-integration
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc-fp]
cni_conf_dir = "/tmp/failpoint-cni-net.d"
cni_max_conf_num = 1
pod_annotations = ["io.containerd.runtime.v2.shim.failpoint.*"]
runtime_type = "runc-fp.v1"
{
"cniVersion": "1.0.0",
"name": "containerd-net-failpoint",
"plugins": [
{
"type": "cni-bridge-fp",
"bridge": "cni-fp",
"isGateway": true,
"ipMasq": true,
"promiscMode": true,
"ipam": {
"type": "host-local",
"ranges": [
[{
"subnet": "10.88.0.0/16"
}],
[{
"subnet": "2001:4860:4860::/64"
}]
],
"routes": [
{ "dst": "0.0.0.0/0" },
{ "dst": "::/0" }
]
},
"capabilities": {
"io.kubernetes.cri.pod-annotations": true
}
},
{
"type": "portmap",
"capabilities": {"portMappings": true}
}
]
}
{
"status": {
"conditions": [
{
"type": "RuntimeReady",
"status": true,
"reason": "",
"message": ""
},
{
"type": "NetworkReady",
"status": true,
"reason": "",
"message": ""
}
]
},
"cniconfig": {
"PluginDirs": [
"/opt/cni/bin"
],
"PluginConfDir": "/etc/cni/net.d",
"PluginMaxConfNum": 1,
"Prefix": "eth",
"Networks": [
{
"Config": {
"Name": "cni-loopback",
"CNIVersion": "0.3.1",
"Plugins": [
{
"Network": {
"type": "loopback",
"ipam": {},
"dns": {}
},
"Source": "{\"type\":\"loopback\"}"
}
],
"Source": "{\n\"cniVersion\": \"0.3.1\",\n\"name\": \"cni-loopback\",\n\"plugins\": [{\n \"type\": \"loopback\"\n}]\n}"
},
"IFName": "lo"
},
{
"Config": {
"Name": "containerd-net",
"CNIVersion": "1.0.0",
"Plugins": [
{
"Network": {
"type": "bridge",
"ipam": {
"type": "host-local"
},
"dns": {}
},
"Source": "{\"bridge\":\"cni0\",\"ipMasq\":true,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.88.0.0/16\"}],[{\"subnet\":\"2001:4860:4860::/64\"}]],\"routes\":[{\"dst\":\"0.0.0.0/0\"},{\"dst\":\"::/0\"}],\"type\":\"host-local\"},\"isGateway\":true,\"promiscMode\":true,\"type\":\"bridge\"}"
},
{
"Network": {
"type": "portmap",
"capabilities": {
"portMappings": true
},
"ipam": {},
"dns": {}
},
"Source": "{\"capabilities\":{\"portMappings\":true},\"type\":\"portmap\"}"
}
],
"Source": "{\n \"cniVersion\": \"1.0.0\",\n \"name\": \"containerd-net\",\n \"plugins\": [\n {\n \"type\": \"bridge\",\n \"bridge\": \"cni0\",\n \"isGateway\": true,\n \"ipMasq\": true,\n \"promiscMode\": true,\n \"ipam\": {\n \"type\": \"host-local\",\n \"ranges\": [\n [{\n \"subnet\": \"10.88.0.0/16\"\n }],\n [{\n \"subnet\": \"2001:4860:4860::/64\"\n }]\n ],\n \"routes\": [\n { \"dst\": \"0.0.0.0/0\" },\n { \"dst\": \"::/0\" }\n ]\n }\n },\n {\n \"type\": \"portmap\",\n \"capabilities\": {\"portMappings\": true}\n }\n ]\n}\n"
},
"IFName": "eth0"
}
]
},
"config": {
"containerd": {
"snapshotter": "overlayfs",
"defaultRuntimeName": "runc",
"defaultRuntime": {
"runtimeType": "",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": null,
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "",
"cniMaxConfNum": 0,
"snapshotter": "",
"sandboxMode": ""
},
"untrustedWorkloadRuntime": {
"runtimeType": "",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": null,
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "",
"cniMaxConfNum": 0,
"snapshotter": "",
"sandboxMode": ""
},
"runtimes": {
"runc": {
"runtimeType": "io.containerd.runc.v2",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": null,
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "",
"cniMaxConfNum": 0,
"snapshotter": "",
"sandboxMode": "podsandbox"
},
"runc-fp": {
"runtimeType": "runc-fp.v1",
"runtimePath": "",
"runtimeEngine": "",
"PodAnnotations": [
"io.containerd.runtime.v2.shim.failpoint.*"
],
"ContainerAnnotations": null,
"runtimeRoot": "",
"options": null,
"privileged_without_host_devices": false,
"privileged_without_host_devices_all_devices_allowed": false,
"baseRuntimeSpec": "",
"cniConfDir": "/tmp/failpoint-cni-net.d",
"cniMaxConfNum": 1,
"snapshotter": "",
"sandboxMode": "podsandbox"
}
},
"noPivot": false,
"disableSnapshotAnnotations": true,
"discardUnpackedLayers": false,
"ignoreBlockIONotEnabledErrors": false,
"ignoreRdtNotEnabledErrors": false
},
"cni": {
"binDir": "/opt/cni/bin",
"confDir": "/etc/cni/net.d",
"maxConfNum": 1,
"setupSerially": false,
"confTemplate": "",
"ipPref": ""
},
"registry": {
"configPath": "",
"mirrors": null,
"configs": null,
"auths": null,
"headers": null
},
"imageDecryption": {
"keyModel": "node"
},
"disableTCPService": true,
"streamServerAddress": "127.0.0.1",
"streamServerPort": "0",
"streamIdleTimeout": "4h0m0s",
"enableSelinux": false,
"selinuxCategoryRange": 1024,
"sandboxImage": "registry.k8s.io/pause:3.8",
"statsCollectPeriod": 10,
"systemdCgroup": false,
"enableTLSStreaming": false,
"x509KeyPairStreaming": {
"tlsCertFile": "",
"tlsKeyFile": ""
},
"maxContainerLogSize": 16384,
"disableCgroup": false,
"disableApparmor": false,
"restrictOOMScoreAdj": false,
"maxConcurrentDownloads": 3,
"disableProcMount": false,
"unsetSeccompProfile": "",
"tolerateMissingHugetlbController": true,
"disableHugetlbController": true,
"device_ownership_from_security_context": false,
"ignoreImageDefinedVolumes": false,
"netnsMountsUnderStateDir": false,
"enableUnprivilegedPorts": false,
"enableUnprivilegedICMP": false,
"enableCDI": false,
"cdiSpecDirs": [
"/etc/cdi",
"/var/run/cdi"
],
"imagePullProgressTimeout": "1m0s",
"containerdRootDir": "/var/lib/containerd-test",
"containerdEndpoint": "/run/containerd-test/containerd.sock",
"rootDir": "/var/lib/containerd-test/io.containerd.grpc.v1.cri",
"stateDir": "/run/containerd-test/io.containerd.grpc.v1.cri"
},
"golang": "go1.18.10",
"lastCNILoadStatus": "OK",
"lastCNILoadStatus.default": "OK",
"lastCNILoadStatus.runc-fp": "OK"
}
=== RUN TestUpdateContainerResources_MemorySwap
container_update_resources_test.go:158: Swap or swap accounting are not enabled. Swap is required for this test
--- SKIP: TestUpdateContainerResources_MemorySwap (0.00s)
=== RUN TestUpdateContainerResources_MemoryLimit
container_update_resources_test.go:229: Create a sandbox
INFO[0000] Using the following image list: {Alpine:ghcr.io/containerd/alpine:3.14.0 BusyBox:ghcr.io/containerd/busybox:1.28 Pause:registry.k8s.io/pause:3.8 ResourceConsumer:registry.k8s.io/e2e-test-images/resource-consumer:1.10 VolumeCopyUp:ghcr.io/containerd/volume-copy-up:2.1 VolumeOwnership:ghcr.io/containerd/volume-ownership:2.1}
main_test.go:668: Image "registry.k8s.io/pause:3.8" already exists, not pulling.
container_update_resources_test.go:242: Create a container with memory limit
container_update_resources_test.go:253: Check memory limit in container OCI spec
container_update_resources_test.go:261: Update container memory limit after created
container_update_resources_test.go:267: Check memory limit in container OCI spec
container_update_resources_test.go:273: Start the container
container_update_resources_test.go:278: Check memory limit in cgroup
container_update_resources_test.go:286: Update container memory limit after started
container_update_resources_test.go:292: Check memory limit in container OCI spec
container_update_resources_test.go:298: Check memory limit in cgroup
--- PASS: TestUpdateContainerResources_MemoryLimit (1.19s)
PASSSo the fix seem to be working fine for me! |
|
@AkihiroSuda Does this solution seem consistent with the other fixed tests (#7946)? |
…/main Update fork-external/main with upstream containerd/containerd/main at commit hash 3d32da8 Related work items: containerd#5674, containerd#7129, containerd#7393, containerd#7661, containerd#7685, containerd#7810, containerd#7850, containerd#7861, containerd#7882, containerd#7883, containerd#7886, containerd#7891, containerd#7892, containerd#7893, containerd#7903, containerd#7904, containerd#7905, containerd#7906, containerd#7907, containerd#7908, containerd#7911, containerd#7913, containerd#7914, containerd#7917, containerd#7925, containerd#7927, containerd#7928, containerd#7929, containerd#7932, containerd#7935, containerd#7943, containerd#7946, containerd#7948, containerd#7957, containerd#7958, containerd#7959, containerd#7960, containerd#7963, containerd#7968, containerd#7969, containerd#7970, containerd#7973, containerd#7985, containerd#7987, containerd#7994, containerd#8005
The
TestUpdateContainerResources_MemoryLimittest was failing when swap is disabled (just like in issue #7918). This modifies the expected swap values of the memory limit test, allowing the test to pass when swap is not enabled.