Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update runc to v1.1.7 #15375

Merged
merged 3 commits into from
May 20, 2023
Merged

Update runc to v1.1.7 #15375

merged 3 commits into from
May 20, 2023

Conversation

hakman
Copy link
Member

@hakman hakman commented May 6, 2023

No description provided.

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels May 6, 2023
@k8s-ci-robot k8s-ci-robot requested review from olemarkus and zetaab May 6, 2023 14:48
@justinsb
Copy link
Member

justinsb commented May 6, 2023

Awesome - fingers crossed that this now works after the gce CSI update :-)

@hakman
Copy link
Member Author

hakman commented May 6, 2023

Awesome - fingers crossed that this now works after the gce CSI update :-)

Unfortunately, it looks like it's still failing...

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 7, 2023
@k8s-ci-robot k8s-ci-robot added size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. and removed needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels May 8, 2023
@k8s-ci-robot k8s-ci-robot added size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. and removed size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. labels May 8, 2023
@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 12, 2023
@hakman
Copy link
Member Author

hakman commented May 12, 2023

/test pull-kops-e2e-k8s-gce-ci

@hakman
Copy link
Member Author

hakman commented May 12, 2023

/test pull-kops-e2e-k8s-gce-ci

2 similar comments
@hakman
Copy link
Member Author

hakman commented May 12, 2023

/test pull-kops-e2e-k8s-gce-ci

@hakman
Copy link
Member Author

hakman commented May 12, 2023

/test pull-kops-e2e-k8s-gce-ci

@hakman
Copy link
Member Author

hakman commented May 12, 2023

Most likely related to opencontainers/runc#3849.
Should be fixed with the next K8s patch releases.

@hakman
Copy link
Member Author

hakman commented May 12, 2023

@anthonyhaussman ^^^

@hakman hakman mentioned this pull request May 12, 2023
@hakman
Copy link
Member Author

hakman commented May 12, 2023

/hold

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label May 12, 2023
@BenTheElder
Copy link
Member

FWIW, I've been considering what to do in KIND, and it seems we have some other unrelated problems, but only 1.24+ will get the k8s patch so runc 1.1.6+ currently will break anyone on cgroups v1 and <1.23, seems like this should be held for a bit? 1.1.5 had the CVE fixes.

Unless I'm mis-reading https://kops.sigs.k8s.io/welcome/releases/

The latest Kubernetes minor version supported by a kOps release is the one matching the kOps version. E.g for kOps 1.25, the highest supported Kubernetes version is 1.25. From that version, kOps additionally support Kubernetes two additional minor versions. In this case 1.24 and 1.23. To ease migration, kOps also supports two more minor versions that are considered deprecated. Bugs isolated to deprecated Kubernetes versions will not be fixed unless they prohibit upgrades to supported versions. kOps users are advised to run one of the 3 minor versions Kubernetes supports.

(I'm actually just interested in how kOps will handle this, as some degree of precedent for other projects with the same problem)

@hakman
Copy link
Member Author

hakman commented May 13, 2023

@BenTheElder kOps doesn't have strict control on the patch versions that operators use. We may have to start set the requiredVersion in channels, or go even further and make it an error when someone configures an older K8s version with runc v1.1.6+.
It's not yet clear how will future K8s releases deal with older containerd + runc versions.

For sure we will have to hold back containerd + runc for older K8s versions, as you suggested.

Regarding the mention that CVEs were fixed in v1.1.5, that's true for now. There will be other CVEs, so holding back is not ideal.

We were hesitant of switching the default base image to Ubuntu 22.04 with cgroup v2, but this issue may finally give us a good reason to switch.

@hakman
Copy link
Member Author

hakman commented May 18, 2023

/test all

@hakman
Copy link
Member Author

hakman commented May 18, 2023

/test pull-kops-e2e-cni-cilium-etcd

@hakman
Copy link
Member Author

hakman commented May 18, 2023

/test pull-kops-e2e-cni-amazonvpc
/test pull-kops-e2e-cni-calico

@hakman
Copy link
Member Author

hakman commented May 19, 2023

/retest

@hakman
Copy link
Member Author

hakman commented May 19, 2023

/cc @justinsb

@k8s-ci-robot k8s-ci-robot requested a review from justinsb May 19, 2023 14:47
@hakman
Copy link
Member Author

hakman commented May 20, 2023

/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label May 20, 2023
@kubernetes kubernetes deleted a comment from k8s-ci-robot May 20, 2023
@hakman
Copy link
Member Author

hakman commented May 20, 2023

/retest

@justinsb
Copy link
Member

Thanks @hakman ... I might have a go at rewriting the fallthrough logic to see if there's a way to make it more obvious, but that's just nitpicking.

/approve
/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label May 20, 2023
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: justinsb

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 20, 2023
@hakman
Copy link
Member Author

hakman commented May 20, 2023

/retest

@k8s-ci-robot k8s-ci-robot merged commit 35cc073 into kubernetes:master May 20, 2023
@BenTheElder
Copy link
Member

BenTheElder commented May 25, 2023

FTR: kind is disabling the misc controller on cgroups v1. Seeing as it's unlikely to be used by anything in Kubernetes and wasn't supported by runc on v1 until now anyhow. xref kubernetes-sigs/kind#3223

That pretty neatly avoids all of the issues. Though for KIND that's a bit messy to accomplish.
With control over the host kernel etc it would be much more straightforward to do something like cgroup_disable=misc in the kernel args.

@hakman hakman deleted the runc-1.1.7 branch May 26, 2023 04:19
Shimiazoulai pushed a commit to spotinst/kubernetes-kops that referenced this pull request Jul 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/office-hours lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants