-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Runc kill #178
Runc kill #178
Conversation
Signed-off-by: rajasec <rajasec79@gmail.com>
Signed-off-by: rajasec <rajasec79@gmail.com>
4df6103
to
1f21f91
Compare
if err == nil { | ||
return syscall.Signal(s), nil | ||
} | ||
signal, ok := signalMap[strings.TrimPrefix(rawSignal, "SIG")] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
linux kill
command also supports lowercase, so maybe strings.ToUpper
first?
Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
1f21f91
to
fbb8d3e
Compare
@LK4D4 added the ToUpper |
LGTM |
1 similar comment
LGTM |
@crosbymichael |
What are the intended cleanup semantics of On version 48fdc50, when I did # runc start
ERRO[0019] Failed to remove paths: map[devices:/sys/fs/cgroup/devices/user/1000.user/22.session/root cpuacct:/sys/fs/cgroup/cpuacct/user/1000.user/22.session/root perf_event:/sys/fs/cgroup/perf_event/user/1000.user/22.session/root freezer:/sys/fs/cgroup/freezer/user/1000.user/22.session/root cpuset:/sys/fs/cgroup/cpuset/user/1000.user/22.session/root memory:/sys/fs/cgroup/memory/user/1000.user/22.session/root cpu:/sys/fs/cgroup/cpu/user/1000.user/22.session/root blkio:/sys/fs/cgroup/blkio/user/1000.user/22.session/root hugetlb:/sys/fs/cgroup/hugetlb/user/1000.user/22.session/root] whereas when I did As noted in #39, if I kill the runc process itself, Thanks! |
Removing state.json should suffice to start back the container. |
I just checked and it does suffice to start the cotnainer. It's really nice that only one simple action is required to get up and running again after an unclean shutdown. Putting my question another way, after any of those shutdown scenarios, will there be cgroups, namespaces, mounts, network objects or other things left around? If so, is it possible that the leak will eventually cause problems? |
|
OK, got it. As I noted in my comment above, it looks like runc kill is different than kill on pid1 at the moment. When the runc process does happen to get killed, it would be very helpful if either runc automatically cleans up the next time it runs, or else there's some kind of |
Closes #176
Closes #124
This is a carry of #176 with fixed cross compile.
@rajasec thanks, i have you commits included in this PR.