@@ -44,7 +44,7 @@ The following parameters can be specified to setup namespaces:
44
44
If a namespace type is not specified in the ` namespaces ` array, the container MUST inherit the [ runtime namespace] ( glossary.md#runtime-namespace ) of that type.
45
45
If a ` namespaces ` field contains duplicated namespaces with same ` type ` , the runtime MUST [ generate an error] ( runtime.md#errors ) .
46
46
47
- ###### Example
47
+ ### Example
48
48
49
49
``` json
50
50
"namespaces" : [
@@ -88,7 +88,7 @@ Each entry has the following structure:
88
88
The runtime SHOULD NOT modify the ownership of referenced filesystems to realize the mapping.
89
89
Note that the number of mapping entries MAY be limited by the [ kernel] [ user-namespaces ] .
90
90
91
- ###### Example
91
+ ### Example
92
92
93
93
``` json
94
94
"uidMappings" : [
@@ -126,7 +126,7 @@ Each entry has the following structure:
126
126
127
127
The same ` type ` , ` major ` and ` minor ` SHOULD NOT be used for multiple devices.
128
128
129
- ###### Example
129
+ ### Example
130
130
131
131
``` json
132
132
"devices" : [
@@ -151,7 +151,7 @@ The same `type`, `major` and `minor` SHOULD NOT be used for multiple devices.
151
151
]
152
152
```
153
153
154
- ###### <a name =" configLinuxDefaultDevices " />Default Devices
154
+ ### <a name =" configLinuxDefaultDevices " />Default Devices
155
155
156
156
In addition to any devices configured with this setting, the runtime MUST also supply:
157
157
@@ -191,7 +191,7 @@ For example, to run a new process in an existing container without updating limi
191
191
192
192
Runtimes MAY attach the container process to additional cgroup controllers beyond those necessary to fulfill the ` resources ` settings.
193
193
194
- ###### Example
194
+ ### Example
195
195
196
196
``` json
197
197
"cgroupsPath" : " /myRuntime/myContainer" ,
@@ -209,7 +209,7 @@ Runtimes MAY attach the container process to additional cgroup controllers beyon
209
209
}
210
210
```
211
211
212
- #### <a name =" configLinuxDeviceWhitelist " />Device whitelist
212
+ ### <a name =" configLinuxDeviceWhitelist " />Device whitelist
213
213
214
214
** ` devices ` ** (array of objects, OPTIONAL) configures the [ device whitelist] [ cgroup-v1-devices ] .
215
215
The runtime MUST apply entries in the listed order.
@@ -224,7 +224,7 @@ Each entry has the following structure:
224
224
* ** ` access ` ** * (string, OPTIONAL)* - cgroup permissions for device.
225
225
A composition of ` r ` (read), ` w ` (write), and ` m ` (mknod).
226
226
227
- ###### Example
227
+ #### Example
228
228
229
229
``` json
230
230
"devices" : [
@@ -249,7 +249,7 @@ Each entry has the following structure:
249
249
]
250
250
```
251
251
252
- #### <a name =" configLinuxDisableOutOfMemoryKiller " />Disable out-of-memory killer
252
+ ### <a name =" configLinuxDisableOutOfMemoryKiller " />Disable out-of-memory killer
253
253
254
254
` disableOOMKiller ` contains a boolean (` true ` or ` false ` ) that enables or disables the Out of Memory killer for a cgroup.
255
255
If enabled (` false ` ), tasks that attempt to consume more memory than they are allowed are immediately killed by the OOM killer.
@@ -259,13 +259,13 @@ For more information, see the kernel cgroups documentation about [memory][cgroup
259
259
260
260
* ** ` disableOOMKiller ` ** * (bool, OPTIONAL)* - enables or disables the OOM killer
261
261
262
- ###### Example
262
+ #### Example
263
263
264
264
``` json
265
265
"disableOOMKiller" : false
266
266
```
267
267
268
- #### <a name =" configLinuxMemory " />Memory
268
+ ### <a name =" configLinuxMemory " />Memory
269
269
270
270
** ` memory ` ** (object, OPTIONAL) represents the cgroup subsystem ` memory ` and it's used to set limits on the container's memory usage.
271
271
For more information, see the kernel cgroups documentation about [ memory] [ cgroup-v1-memory ] .
@@ -284,7 +284,7 @@ The following parameters can be specified to setup the controller:
284
284
285
285
* ** ` swappiness ` ** * (uint64, OPTIONAL)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
286
286
287
- ###### Example
287
+ #### Example
288
288
289
289
``` json
290
290
"memory" : {
@@ -297,7 +297,7 @@ The following parameters can be specified to setup the controller:
297
297
}
298
298
```
299
299
300
- #### <a name =" configLinuxCPU " />CPU
300
+ ### <a name =" configLinuxCPU " />CPU
301
301
302
302
** ` cpu ` ** (object, OPTIONAL) represents the cgroup subsystems ` cpu ` and ` cpusets ` .
303
303
For more information, see the kernel cgroups documentation about [ cpusets] [ cgroup-v1-cpusets ] .
@@ -318,7 +318,7 @@ The following parameters can be specified to setup the controller:
318
318
319
319
* ** ` mems ` ** * (string, OPTIONAL)* - list of Memory Nodes the container will run in
320
320
321
- ###### Example
321
+ #### Example
322
322
323
323
``` json
324
324
"cpu" : {
@@ -332,7 +332,7 @@ The following parameters can be specified to setup the controller:
332
332
}
333
333
```
334
334
335
- #### <a name =" configLinuxBlockIO " />Block IO
335
+ ### <a name =" configLinuxBlockIO " />Block IO
336
336
337
337
** ` blockIO ` ** (object, OPTIONAL) represents the cgroup subsystem ` blkio ` which implements the block IO controller.
338
338
For more information, see the kernel cgroups documentation about [ blkio] [ cgroup-v1-blkio ] .
@@ -355,7 +355,7 @@ The following parameters can be specified to setup the controller:
355
355
* ** ` major, minor ` ** * (int64, REQUIRED)* - major, minor numbers for device. More info in [ mknod(1)] [ mknod.1 ] man page.
356
356
* ** ` rate ` ** * (uint64, REQUIRED)* - IO rate limit for the device
357
357
358
- ###### Example
358
+ #### Example
359
359
360
360
``` json
361
361
"blockIO" : {
@@ -391,7 +391,7 @@ The following parameters can be specified to setup the controller:
391
391
}
392
392
```
393
393
394
- #### <a name =" configLinuxHugePageLimits " />Huge page limits
394
+ ### <a name =" configLinuxHugePageLimits " />Huge page limits
395
395
396
396
** ` hugepageLimits ` ** (array of objects, OPTIONAL) represents the ` hugetlb ` controller which allows to limit the
397
397
HugeTLB usage per control group and enforces the controller limit during page fault.
@@ -403,7 +403,7 @@ Each entry has the following structure:
403
403
404
404
* ** ` limit ` ** * (uint64, REQUIRED)* - limit in bytes of * hugepagesize* HugeTLB usage
405
405
406
- ###### Example
406
+ #### Example
407
407
408
408
``` json
409
409
"hugepageLimits" : [
@@ -414,7 +414,7 @@ Each entry has the following structure:
414
414
]
415
415
```
416
416
417
- #### <a name =" configLinuxNetwork " />Network
417
+ ### <a name =" configLinuxNetwork " />Network
418
418
419
419
** ` network ` ** (object, OPTIONAL) represents the cgroup subsystems ` net_cls ` and ` net_prio ` .
420
420
For more information, see the kernel cgroups documentations about [ net\_ cls cgroup] [ cgroup-v1-net-cls ] and [ net\_ prio cgroup] [ cgroup-v1-net-prio ] .
@@ -428,7 +428,7 @@ The following parameters can be specified to setup the controller:
428
428
* ** ` name ` ** * (string, REQUIRED)* - interface name in [ runtime network namespace] ( glossary.md#runtime-namespace )
429
429
* ** ` priority ` ** * (uint32, REQUIRED)* - priority applied to the interface
430
430
431
- ###### Example
431
+ #### Example
432
432
433
433
``` json
434
434
"network" : {
@@ -446,7 +446,7 @@ The following parameters can be specified to setup the controller:
446
446
}
447
447
```
448
448
449
- #### <a name =" configLinuxPIDS " />PIDs
449
+ ### <a name =" configLinuxPIDS " />PIDs
450
450
451
451
** ` pids ` ** (object, OPTIONAL) represents the cgroup subsystem ` pids ` .
452
452
For more information, see the kernel cgroups documentation about [ pids] [ cgroup-v1-pids ] .
@@ -455,7 +455,7 @@ The following parameters can be specified to setup the controller:
455
455
456
456
* ** ` limit ` ** * (int64, REQUIRED)* - specifies the maximum number of tasks in the cgroup
457
457
458
- ###### Example
458
+ #### Example
459
459
460
460
``` json
461
461
"pids" : {
@@ -496,7 +496,7 @@ Tasks inside the container only have access to the "upper" 80% of L3 cache id 0
496
496
** ` sysctl ` ** (object, OPTIONAL) allows kernel parameters to be modified at runtime for the container.
497
497
For more information, see the [ sysctl(8)] [ sysctl.8 ] man page.
498
498
499
- ###### Example
499
+ ### Example
500
500
501
501
``` json
502
502
"sysctl" : {
@@ -580,7 +580,7 @@ The following parameters can be specified to setup seccomp:
580
580
* ` SCMP_CMP_GT `
581
581
* ` SCMP_CMP_MASKED_EQ `
582
582
583
- ###### Example
583
+ ### Example
584
584
585
585
``` json
586
586
"seccomp" : {
@@ -607,7 +607,7 @@ The following parameters can be specified to setup seccomp:
607
607
Its value is either slave, private, shared or unbindable.
608
608
The [ Shared Subtrees] [ sharedsubtree ] article in the kernel documentation has more information about mount propagation.
609
609
610
- ###### Example
610
+ ### Example
611
611
612
612
``` json
613
613
"rootfsPropagation" : " slave" ,
@@ -618,7 +618,7 @@ The [Shared Subtrees][sharedsubtree] article in the kernel documentation has mor
618
618
** ` maskedPaths ` ** (array of strings, OPTIONAL) will mask over the provided paths inside the container so that they cannot be read.
619
619
The values MUST be absolute paths in the [ container namespace] ( glossary.md#container_namespace ) .
620
620
621
- ###### Example
621
+ ### Example
622
622
623
623
``` json
624
624
"maskedPaths" : [
@@ -631,7 +631,7 @@ The values MUST be absolute paths in the [container namespace](glossary.md#conta
631
631
** ` readonlyPaths ` ** (array of strings, OPTIONAL) will set the provided paths as readonly inside the container.
632
632
The values MUST be absolute paths in the [ container namespace] ( glossary.md#container-namespace ) .
633
633
634
- ###### Example
634
+ ### Example
635
635
636
636
``` json
637
637
"readonlyPaths" : [
@@ -643,7 +643,7 @@ The values MUST be absolute paths in the [container namespace](glossary.md#conta
643
643
644
644
** ` mountLabel ` ** (string, OPTIONAL) will set the Selinux context for the mounts in the container.
645
645
646
- ###### Example
646
+ ### Example
647
647
648
648
``` json
649
649
"mountLabel" : " system_u:object_r:svirt_sandbox_file_t:s0:c715,c811"
0 commit comments