mirror of
https://github.com/containers/podman.git
synced 2025-05-21 00:56:36 +08:00
Remove --kernel-memory options
Kernel memory option has been depracated in runtime-spec, It is believed that it will not work properly on certain kernels. runc ignores it. This PR removes documentation of the flag and also prints a warning if a user uses it. [NO NEW TESTS NEEDED] Helps Fix: https://github.com/containers/podman/issues/12045 Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
@ -319,6 +319,9 @@ func DefineCreateFlags(cmd *cobra.Command, cf *entities.ContainerCreateOptions,
|
||||
"Kernel memory limit "+sizeWithUnitFormat,
|
||||
)
|
||||
_ = cmd.RegisterFlagCompletionFunc(kernelMemoryFlagName, completion.AutocompleteNone)
|
||||
// kernel-memory is deprecated in the runtime spec.
|
||||
_ = createFlags.MarkHidden("kernel-memory")
|
||||
|
||||
logDriverFlagName := "log-driver"
|
||||
createFlags.StringVar(
|
||||
&cf.LogDriver,
|
||||
|
@ -18,6 +18,7 @@ import (
|
||||
"github.com/containers/podman/v3/pkg/specgen"
|
||||
"github.com/docker/docker/api/types/mount"
|
||||
"github.com/pkg/errors"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
func stringMaptoArray(m map[string]string) []string {
|
||||
@ -383,6 +384,9 @@ func ContainerCreateToContainerCLIOpts(cc handlers.CreateContainerConfig, rtc *c
|
||||
if cc.HostConfig.Memory > 0 {
|
||||
cliOpts.Memory = strconv.Itoa(int(cc.HostConfig.Memory))
|
||||
}
|
||||
if cc.HostConfig.KernelMemory > 0 {
|
||||
logrus.Warnf("The --kernel-memory flag has been deprecated. May not work properly on your system.")
|
||||
}
|
||||
|
||||
if cc.HostConfig.MemoryReservation > 0 {
|
||||
cliOpts.MemoryReservation = strconv.Itoa(int(cc.HostConfig.MemoryReservation))
|
||||
|
@ -487,18 +487,6 @@ Default is to create a private IPC namespace (POSIX SysV IPC) for the container
|
||||
`host`: use the host shared memory,semaphores and message queues inside the container. Note: the host mode gives the container full access to local shared memory and is therefore considered insecure.
|
||||
`ns:<path>` path to an IPC namespace to join.
|
||||
|
||||
#### **--kernel-memory**=*number[unit]*
|
||||
|
||||
Kernel memory limit (format: `<number>[<unit>]`, where unit = b (bytes), k (kilobytes), m (megabytes), or g (gigabytes))
|
||||
|
||||
Constrains the kernel memory available to a container. If a limit of 0
|
||||
is specified (not using `--kernel-memory`), the container's kernel memory
|
||||
is not limited. If you specify a limit, it may be rounded up to a multiple
|
||||
of the operating system's page size and the value can be very large,
|
||||
millions of trillions.
|
||||
|
||||
This flag is not supported on cgroups V2 systems.
|
||||
|
||||
#### **--label**, **-l**=*label*
|
||||
|
||||
Add metadata to a container (e.g., --label com.example.key=value)
|
||||
|
@ -512,18 +512,6 @@ a private IPC namespace.
|
||||
- **host**: use the host shared memory,semaphores and message queues inside the container. Note: the host mode gives the container full access to local shared memory and is therefore considered insecure.
|
||||
- **ns:**_path_: path to an IPC namespace to join.
|
||||
|
||||
#### **--kernel-memory**=_number_[_unit_]
|
||||
|
||||
Kernel memory limit. A _unit_ can be **b** (bytes), **k** (kilobytes), **m** (megabytes), or **g** (gigabytes).
|
||||
|
||||
Constrains the kernel memory available to a container. If a limit of 0
|
||||
is specified (not using *--kernel-memory*), the container's kernel memory
|
||||
is not limited. If you specify a limit, it may be rounded up to a multiple
|
||||
of the operating system's page size and the value can be very large,
|
||||
millions of trillions.
|
||||
|
||||
This flag is not supported on cgroups V2 systems.
|
||||
|
||||
#### **--label**, **-l**=*key*=*value*
|
||||
|
||||
Add metadata to a container.
|
||||
|
Reference in New Issue
Block a user