Samuel Karp
Samuel Karp
CreateContainer can hang indefinitely if a non-responsive CIFS mount is used as a hostPath volume
### Description When `hostPath` volumes are used, containerd invokes [`os.Stat`](https://github.com/containerd/containerd/blob/v1.7.13/pkg/cri/opts/spec_linux_opts.go#L109) to determine whether a directory exists and create it if necessary. A CIFS mount can become unresponsive and hang, and...
https://github.com/containerd/containerd/actions/runs/11218387681/job/31182389717?pr=10783#step:12:43 ``` === FAIL: . TestTransferImport/DigestRefs (0.07s) import_test.go:689: unexpected number of images saved: (1) [registry.test/all-refs:index] expected image map: (3) map[registry.test/all-refs:1:{application/vnd.oci.image.manifest.v1+json sha256:08954ea[42](https://github.com/containerd/containerd/actions/runs/11218387681/job/31182389717?pr=10783#step:12:43)14f5d1dcfcb224de42101ceb7158bacf4fe75559ded413463ef2793 448 [] map[io.containerd.image.name:registry.test/all-refs:1] [] } registry.test/all-refs:index:{application/vnd.oci.image.index.v1+json sha256:68a6a4eb41a21466370dd0bba840307575062ca9b1e345df64a3130036062bc7 256 []...
### Description In https://github.com/containerd/containerd/pull/10795 we're attempting to update containerd 1.6 to use runc 1.1.15. This triggers a Kubernetes e2e CI run, which is consistently failing. The same update to runc...
### Description `containerd config dump` should reasonably be expected to show an accurate dump of the config containerd is using. However, it does not run plugin config migrations (only top-level...
Per https://github.com/kubernetes/k8s.io/issues/7709, we are being asked to migrate containerd's Kubernetes-related CI (sig-node e2e tests) _off_ the Kubernetes project Prow. It has been suggested that we can run the same e2e...
New flag allows `ctr` to dump the generated OCI spec to a file. This is useful when debugging failures at the runtime layer when containerd cleans up the bundle directory...
New flag allows a user to override the default `RLIMIT_NOFILE` value of 1024:1024 set in the default spec.
runc 1.4.0 has a [breaking change](https://github.com/opencontainers/runc/releases/tag/v1.4.0) regarding the handling of `pids.limit` in the bundle. As long as we're omitting adding `0` when the limit is unset, this should be fine...
(Note: this issue is a personal perspective and does _not_ represent a stance of the OCI TOB) https://github.com/opencontainers/runtime-spec/commit/869b2d5b0c9fbb9db559ab53cf1fa61a170835e9 changed `LinuxPid` from `int64` to `*int64`. While the description in the commit...