@@ -44,7 +44,7 @@ The following parameters can be specified to setup namespaces:
4444If a namespace type is not specified in the ` namespaces ` array, the container MUST inherit the [ runtime namespace] ( glossary.md#runtime-namespace ) of that type.
4545If a ` namespaces ` field contains duplicated namespaces with same ` type ` , the runtime MUST [ generate an error] ( runtime.md#errors ) .
4646
47- ###### Example
47+ ### Example
4848
4949``` json
5050 "namespaces" : [
@@ -88,7 +88,7 @@ Each entry has the following structure:
8888The runtime SHOULD NOT modify the ownership of referenced filesystems to realize the mapping.
8989Note that the number of mapping entries MAY be limited by the [ kernel] [ user-namespaces ] .
9090
91- ###### Example
91+ ### Example
9292
9393``` json
9494 "uidMappings" : [
@@ -126,7 +126,7 @@ Each entry has the following structure:
126126
127127The same ` type ` , ` major ` and ` minor ` SHOULD NOT be used for multiple devices.
128128
129- ###### Example
129+ ### Example
130130
131131``` json
132132 "devices" : [
@@ -151,7 +151,7 @@ The same `type`, `major` and `minor` SHOULD NOT be used for multiple devices.
151151 ]
152152```
153153
154- ###### <a name =" configLinuxDefaultDevices " />Default Devices
154+ ### <a name =" configLinuxDefaultDevices " />Default Devices
155155
156156In addition to any devices configured with this setting, the runtime MUST also supply:
157157
@@ -191,7 +191,7 @@ For example, to run a new process in an existing container without updating limi
191191
192192Runtimes MAY attach the container process to additional cgroup controllers beyond those necessary to fulfill the ` resources ` settings.
193193
194- ###### Example
194+ ### Example
195195
196196``` json
197197 "cgroupsPath" : " /myRuntime/myContainer" ,
@@ -209,7 +209,7 @@ Runtimes MAY attach the container process to additional cgroup controllers beyon
209209 }
210210```
211211
212- #### <a name =" configLinuxDeviceWhitelist " />Device whitelist
212+ ### <a name =" configLinuxDeviceWhitelist " />Device whitelist
213213
214214** ` devices ` ** (array of objects, OPTIONAL) configures the [ device whitelist] [ cgroup-v1-devices ] .
215215The runtime MUST apply entries in the listed order.
@@ -224,7 +224,7 @@ Each entry has the following structure:
224224* ** ` access ` ** * (string, OPTIONAL)* - cgroup permissions for device.
225225 A composition of ` r ` (read), ` w ` (write), and ` m ` (mknod).
226226
227- ###### Example
227+ #### Example
228228
229229``` json
230230 "devices" : [
@@ -249,7 +249,7 @@ Each entry has the following structure:
249249 ]
250250```
251251
252- #### <a name =" configLinuxDisableOutOfMemoryKiller " />Disable out-of-memory killer
252+ ### <a name =" configLinuxDisableOutOfMemoryKiller " />Disable out-of-memory killer
253253
254254` disableOOMKiller ` contains a boolean (` true ` or ` false ` ) that enables or disables the Out of Memory killer for a cgroup.
255255If enabled (` false ` ), tasks that attempt to consume more memory than they are allowed are immediately killed by the OOM killer.
@@ -259,13 +259,13 @@ For more information, see the kernel cgroups documentation about [memory][cgroup
259259
260260* ** ` disableOOMKiller ` ** * (bool, OPTIONAL)* - enables or disables the OOM killer
261261
262- ###### Example
262+ #### Example
263263
264264``` json
265265 "disableOOMKiller" : false
266266```
267267
268- #### <a name =" configLinuxMemory " />Memory
268+ ### <a name =" configLinuxMemory " />Memory
269269
270270** ` memory ` ** (object, OPTIONAL) represents the cgroup subsystem ` memory ` and it's used to set limits on the container's memory usage.
271271For more information, see the kernel cgroups documentation about [ memory] [ cgroup-v1-memory ] .
@@ -284,7 +284,7 @@ The following parameters can be specified to setup the controller:
284284
285285* ** ` swappiness ` ** * (uint64, OPTIONAL)* - sets swappiness parameter of vmscan (See sysctl's vm.swappiness)
286286
287- ###### Example
287+ #### Example
288288
289289``` json
290290 "memory" : {
@@ -297,7 +297,7 @@ The following parameters can be specified to setup the controller:
297297 }
298298```
299299
300- #### <a name =" configLinuxCPU " />CPU
300+ ### <a name =" configLinuxCPU " />CPU
301301
302302** ` cpu ` ** (object, OPTIONAL) represents the cgroup subsystems ` cpu ` and ` cpusets ` .
303303For more information, see the kernel cgroups documentation about [ cpusets] [ cgroup-v1-cpusets ] .
@@ -318,7 +318,7 @@ The following parameters can be specified to setup the controller:
318318
319319* ** ` mems ` ** * (string, OPTIONAL)* - list of Memory Nodes the container will run in
320320
321- ###### Example
321+ #### Example
322322
323323``` json
324324 "cpu" : {
@@ -332,7 +332,7 @@ The following parameters can be specified to setup the controller:
332332 }
333333```
334334
335- #### <a name =" configLinuxBlockIO " />Block IO
335+ ### <a name =" configLinuxBlockIO " />Block IO
336336
337337** ` blockIO ` ** (object, OPTIONAL) represents the cgroup subsystem ` blkio ` which implements the block IO controller.
338338For more information, see the kernel cgroups documentation about [ blkio] [ cgroup-v1-blkio ] .
@@ -355,7 +355,7 @@ The following parameters can be specified to setup the controller:
355355 * ** ` major, minor ` ** * (int64, REQUIRED)* - major, minor numbers for device. More info in [ mknod(1)] [ mknod.1 ] man page.
356356 * ** ` rate ` ** * (uint64, REQUIRED)* - IO rate limit for the device
357357
358- ###### Example
358+ #### Example
359359
360360``` json
361361 "blockIO" : {
@@ -391,7 +391,7 @@ The following parameters can be specified to setup the controller:
391391 }
392392```
393393
394- #### <a name =" configLinuxHugePageLimits " />Huge page limits
394+ ### <a name =" configLinuxHugePageLimits " />Huge page limits
395395
396396** ` hugepageLimits ` ** (array of objects, OPTIONAL) represents the ` hugetlb ` controller which allows to limit the
397397HugeTLB usage per control group and enforces the controller limit during page fault.
@@ -403,7 +403,7 @@ Each entry has the following structure:
403403
404404* ** ` limit ` ** * (uint64, REQUIRED)* - limit in bytes of * hugepagesize* HugeTLB usage
405405
406- ###### Example
406+ #### Example
407407
408408``` json
409409 "hugepageLimits" : [
@@ -414,7 +414,7 @@ Each entry has the following structure:
414414 ]
415415```
416416
417- #### <a name =" configLinuxNetwork " />Network
417+ ### <a name =" configLinuxNetwork " />Network
418418
419419** ` network ` ** (object, OPTIONAL) represents the cgroup subsystems ` net_cls ` and ` net_prio ` .
420420For more information, see the kernel cgroups documentations about [ net\_ cls cgroup] [ cgroup-v1-net-cls ] and [ net\_ prio cgroup] [ cgroup-v1-net-prio ] .
@@ -428,7 +428,7 @@ The following parameters can be specified to setup the controller:
428428 * ** ` name ` ** * (string, REQUIRED)* - interface name in [ runtime network namespace] ( glossary.md#runtime-namespace )
429429 * ** ` priority ` ** * (uint32, REQUIRED)* - priority applied to the interface
430430
431- ###### Example
431+ #### Example
432432
433433``` json
434434 "network" : {
@@ -446,7 +446,7 @@ The following parameters can be specified to setup the controller:
446446 }
447447```
448448
449- #### <a name =" configLinuxPIDS " />PIDs
449+ ### <a name =" configLinuxPIDS " />PIDs
450450
451451** ` pids ` ** (object, OPTIONAL) represents the cgroup subsystem ` pids ` .
452452For more information, see the kernel cgroups documentation about [ pids] [ cgroup-v1-pids ] .
@@ -455,7 +455,7 @@ The following parameters can be specified to setup the controller:
455455
456456* ** ` limit ` ** * (int64, REQUIRED)* - specifies the maximum number of tasks in the cgroup
457457
458- ###### Example
458+ #### Example
459459
460460``` json
461461 "pids" : {
@@ -496,7 +496,7 @@ Tasks inside the container only have access to the "upper" 80% of L3 cache id 0
496496** ` sysctl ` ** (object, OPTIONAL) allows kernel parameters to be modified at runtime for the container.
497497For more information, see the [ sysctl(8)] [ sysctl.8 ] man page.
498498
499- ###### Example
499+ ### Example
500500
501501``` json
502502 "sysctl" : {
@@ -580,7 +580,7 @@ The following parameters can be specified to setup seccomp:
580580 * ` SCMP_CMP_GT `
581581 * ` SCMP_CMP_MASKED_EQ `
582582
583- ###### Example
583+ ### Example
584584
585585``` json
586586 "seccomp" : {
@@ -607,7 +607,7 @@ The following parameters can be specified to setup seccomp:
607607Its value is either slave, private, shared or unbindable.
608608The [ Shared Subtrees] [ sharedsubtree ] article in the kernel documentation has more information about mount propagation.
609609
610- ###### Example
610+ ### Example
611611
612612``` json
613613 "rootfsPropagation" : " slave" ,
@@ -618,7 +618,7 @@ The [Shared Subtrees][sharedsubtree] article in the kernel documentation has mor
618618** ` maskedPaths ` ** (array of strings, OPTIONAL) will mask over the provided paths inside the container so that they cannot be read.
619619The values MUST be absolute paths in the [ container namespace] ( glossary.md#container_namespace ) .
620620
621- ###### Example
621+ ### Example
622622
623623``` json
624624 "maskedPaths" : [
@@ -631,7 +631,7 @@ The values MUST be absolute paths in the [container namespace](glossary.md#conta
631631** ` readonlyPaths ` ** (array of strings, OPTIONAL) will set the provided paths as readonly inside the container.
632632The values MUST be absolute paths in the [ container namespace] ( glossary.md#container-namespace ) .
633633
634- ###### Example
634+ ### Example
635635
636636``` json
637637 "readonlyPaths" : [
@@ -643,7 +643,7 @@ The values MUST be absolute paths in the [container namespace](glossary.md#conta
643643
644644** ` mountLabel ` ** (string, OPTIONAL) will set the Selinux context for the mounts in the container.
645645
646- ###### Example
646+ ### Example
647647
648648``` json
649649 "mountLabel" : " system_u:object_r:svirt_sandbox_file_t:s0:c715,c811"
0 commit comments