Skip to content

Commit 3036273

Browse files
author
Mrunal Patel
authored
Merge pull request #832 from wking/config-linux-header-levels
config-linux: Consistent header nesting
2 parents faec82c + e9b0f6e commit 3036273

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

config-linux.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following parameters can be specified to setup namespaces:
4444
If a namespace type is not specified in the `namespaces` array, the container MUST inherit the [runtime namespace](glossary.md#runtime-namespace) of that type.
4545
If a `namespaces` field contains duplicated namespaces with same `type`, the runtime MUST [generate an error](runtime.md#errors).
4646

47-
###### Example
47+
### Example
4848

4949
```json
5050
"namespaces": [
@@ -88,7 +88,7 @@ Each entry has the following structure:
8888
The runtime SHOULD NOT modify the ownership of referenced filesystems to realize the mapping.
8989
Note that the number of mapping entries MAY be limited by the [kernel][user-namespaces].
9090

91-
###### Example
91+
### Example
9292

9393
```json
9494
"uidMappings": [
@@ -126,7 +126,7 @@ Each entry has the following structure:
126126

127127
The same `type`, `major` and `minor` SHOULD NOT be used for multiple devices.
128128

129-
###### Example
129+
### Example
130130

131131
```json
132132
"devices": [
@@ -151,7 +151,7 @@ The same `type`, `major` and `minor` SHOULD NOT be used for multiple devices.
151151
]
152152
```
153153

154-
###### <a name="configLinuxDefaultDevices" />Default Devices
154+
### <a name="configLinuxDefaultDevices" />Default Devices
155155

156156
In addition to any devices configured with this setting, the runtime MUST also supply:
157157

@@ -191,7 +191,7 @@ For example, to run a new process in an existing container without updating limi
191191

192192
Runtimes MAY attach the container process to additional cgroup controllers beyond those necessary to fulfill the `resources` settings.
193193

194-
###### Example
194+
### Example
195195

196196
```json
197197
"cgroupsPath": "/myRuntime/myContainer",
@@ -209,7 +209,7 @@ Runtimes MAY attach the container process to additional cgroup controllers beyon
209209
}
210210
```
211211

212-
#### <a name="configLinuxDeviceWhitelist" />Device whitelist
212+
### <a name="configLinuxDeviceWhitelist" />Device whitelist
213213

214214
**`devices`** (array of objects, OPTIONAL) configures the [device whitelist][cgroup-v1-devices].
215215
The runtime MUST apply entries in the listed order.
@@ -224,7 +224,7 @@ Each entry has the following structure:
224224
* **`access`** *(string, OPTIONAL)* - cgroup permissions for device.
225225
A composition of `r` (read), `w` (write), and `m` (mknod).
226226

227-
###### Example
227+
#### Example
228228

229229
```json
230230
"devices": [
@@ -249,7 +249,7 @@ Each entry has the following structure:
249249
]
250250
```
251251

252-
#### <a name="configLinuxDisableOutOfMemoryKiller" />Disable out-of-memory killer
252+
### <a name="configLinuxDisableOutOfMemoryKiller" />Disable out-of-memory killer
253253

254254
`disableOOMKiller` contains a boolean (`true` or `false`) that enables or disables the Out of Memory killer for a cgroup.
255255
If enabled (`false`), tasks that attempt to consume more memory than they are allowed are immediately killed by the OOM killer.
@@ -259,13 +259,13 @@ For more information, see the kernel cgroups documentation about [memory][cgroup
259259

260260
* **`disableOOMKiller`** *(bool, OPTIONAL)* - enables or disables the OOM killer
261261

262-
###### Example
262+
#### Example
263263

264264
```json
265265
"disableOOMKiller": false
266266
```
267267

268-
#### <a name="configLinuxMemory" />Memory
268+
### <a name="configLinuxMemory" />Memory
269269

270270
**`memory`** (object, OPTIONAL) represents the cgroup subsystem `memory` and it's used to set limits on the container's memory usage.
271271
For more information, see the kernel cgroups documentation about [memory][cgroup-v1-memory].
@@ -284,7 +284,7 @@ The following parameters can be specified to setup the controller:
284284

285285
* **`swappiness`** *(uint64, OPTIONAL)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
286286

287-
###### Example
287+
#### Example
288288

289289
```json
290290
"memory": {
@@ -297,7 +297,7 @@ The following parameters can be specified to setup the controller:
297297
}
298298
```
299299

300-
#### <a name="configLinuxCPU" />CPU
300+
### <a name="configLinuxCPU" />CPU
301301

302302
**`cpu`** (object, OPTIONAL) represents the cgroup subsystems `cpu` and `cpusets`.
303303
For more information, see the kernel cgroups documentation about [cpusets][cgroup-v1-cpusets].
@@ -318,7 +318,7 @@ The following parameters can be specified to setup the controller:
318318

319319
* **`mems`** *(string, OPTIONAL)* - list of Memory Nodes the container will run in
320320

321-
###### Example
321+
#### Example
322322

323323
```json
324324
"cpu": {
@@ -332,7 +332,7 @@ The following parameters can be specified to setup the controller:
332332
}
333333
```
334334

335-
#### <a name="configLinuxBlockIO" />Block IO
335+
### <a name="configLinuxBlockIO" />Block IO
336336

337337
**`blockIO`** (object, OPTIONAL) represents the cgroup subsystem `blkio` which implements the block IO controller.
338338
For more information, see the kernel cgroups documentation about [blkio][cgroup-v1-blkio].
@@ -355,7 +355,7 @@ The following parameters can be specified to setup the controller:
355355
* **`major, minor`** *(int64, REQUIRED)* - major, minor numbers for device. More info in [mknod(1)][mknod.1] man page.
356356
* **`rate`** *(uint64, REQUIRED)* - IO rate limit for the device
357357

358-
###### Example
358+
#### Example
359359

360360
```json
361361
"blockIO": {
@@ -391,7 +391,7 @@ The following parameters can be specified to setup the controller:
391391
}
392392
```
393393

394-
#### <a name="configLinuxHugePageLimits" />Huge page limits
394+
### <a name="configLinuxHugePageLimits" />Huge page limits
395395

396396
**`hugepageLimits`** (array of objects, OPTIONAL) represents the `hugetlb` controller which allows to limit the
397397
HugeTLB usage per control group and enforces the controller limit during page fault.
@@ -403,7 +403,7 @@ Each entry has the following structure:
403403

404404
* **`limit`** *(uint64, REQUIRED)* - limit in bytes of *hugepagesize* HugeTLB usage
405405

406-
###### Example
406+
#### Example
407407

408408
```json
409409
"hugepageLimits": [
@@ -414,7 +414,7 @@ Each entry has the following structure:
414414
]
415415
```
416416

417-
#### <a name="configLinuxNetwork" />Network
417+
### <a name="configLinuxNetwork" />Network
418418

419419
**`network`** (object, OPTIONAL) represents the cgroup subsystems `net_cls` and `net_prio`.
420420
For more information, see the kernel cgroups documentations about [net\_cls cgroup][cgroup-v1-net-cls] and [net\_prio cgroup][cgroup-v1-net-prio].
@@ -428,7 +428,7 @@ The following parameters can be specified to setup the controller:
428428
* **`name`** *(string, REQUIRED)* - interface name in [runtime network namespace](glossary.md#runtime-namespace)
429429
* **`priority`** *(uint32, REQUIRED)* - priority applied to the interface
430430

431-
###### Example
431+
#### Example
432432

433433
```json
434434
"network": {
@@ -446,7 +446,7 @@ The following parameters can be specified to setup the controller:
446446
}
447447
```
448448

449-
#### <a name="configLinuxPIDS" />PIDs
449+
### <a name="configLinuxPIDS" />PIDs
450450

451451
**`pids`** (object, OPTIONAL) represents the cgroup subsystem `pids`.
452452
For more information, see the kernel cgroups documentation about [pids][cgroup-v1-pids].
@@ -455,7 +455,7 @@ The following parameters can be specified to setup the controller:
455455

456456
* **`limit`** *(int64, REQUIRED)* - specifies the maximum number of tasks in the cgroup
457457

458-
###### Example
458+
#### Example
459459

460460
```json
461461
"pids": {
@@ -496,7 +496,7 @@ Tasks inside the container only have access to the "upper" 80% of L3 cache id 0
496496
**`sysctl`** (object, OPTIONAL) allows kernel parameters to be modified at runtime for the container.
497497
For more information, see the [sysctl(8)][sysctl.8] man page.
498498

499-
###### Example
499+
### Example
500500

501501
```json
502502
"sysctl": {
@@ -580,7 +580,7 @@ The following parameters can be specified to setup seccomp:
580580
* `SCMP_CMP_GT`
581581
* `SCMP_CMP_MASKED_EQ`
582582

583-
###### Example
583+
### Example
584584

585585
```json
586586
"seccomp": {
@@ -607,7 +607,7 @@ The following parameters can be specified to setup seccomp:
607607
Its value is either slave, private, shared or unbindable.
608608
The [Shared Subtrees][sharedsubtree] article in the kernel documentation has more information about mount propagation.
609609

610-
###### Example
610+
### Example
611611

612612
```json
613613
"rootfsPropagation": "slave",
@@ -618,7 +618,7 @@ The [Shared Subtrees][sharedsubtree] article in the kernel documentation has mor
618618
**`maskedPaths`** (array of strings, OPTIONAL) will mask over the provided paths inside the container so that they cannot be read.
619619
The values MUST be absolute paths in the [container namespace](glossary.md#container_namespace).
620620

621-
###### Example
621+
### Example
622622

623623
```json
624624
"maskedPaths": [
@@ -631,7 +631,7 @@ The values MUST be absolute paths in the [container namespace](glossary.md#conta
631631
**`readonlyPaths`** (array of strings, OPTIONAL) will set the provided paths as readonly inside the container.
632632
The values MUST be absolute paths in the [container namespace](glossary.md#container-namespace).
633633

634-
###### Example
634+
### Example
635635

636636
```json
637637
"readonlyPaths": [
@@ -643,7 +643,7 @@ The values MUST be absolute paths in the [container namespace](glossary.md#conta
643643

644644
**`mountLabel`** (string, OPTIONAL) will set the Selinux context for the mounts in the container.
645645

646-
###### Example
646+
### Example
647647

648648
```json
649649
"mountLabel": "system_u:object_r:svirt_sandbox_file_t:s0:c715,c811"

0 commit comments

Comments
 (0)