644a4af377
Both GetSecurityContext() and GetNamespaceOptions() can return nil. In these cases, cri-o will panic like this: ``` panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x1 pc=0x1cc43f6] goroutine 66 [running]: .../cri-o/server.(*Server).RunPodSandbox(0xc42060e300, 0x7f611d37a0b8, 0xc420207e60, 0xc42015e318, 0x0, 0x0, 0x0) .../cri-o/server/sandbox_run.go:261 +0xfe6 .../cri-o/vendor/k8s.io/kubernetes/pkg/kubelet/apis/cri/v1alpha1/runtime._RuntimeService_RunPodSandbox_Handler(0x2180920, 0xc42060e300, 0x7f611d37a0b8, 0xc420207e60, 0xc420505950, 0x0, 0x0, 0x0, 0x64ed0d, 0xc42064bc80) .../cri-o/vendor/k8s.io/kubernetes/pkg/kubelet/apis/cri/v1alpha1/runtime/api.pb.go:3645 +0x279 .../cri-o/vendor/google.golang.org/grpc.(*Server).processUnaryRPC(0xc4200a4240, 0x33f28e0, 0xc4204b0360, 0xc42074a870, 0xc420476de0, 0x33bcd38, 0xc420207e30, 0x0, 0x0) ``` Signed-off-by: Dongsu Park <dongsu@kinvolk.io> |
||
---|---|---|
.. | ||
apparmor | ||
seccomp | ||
config.go | ||
container_attach.go | ||
container_create.go | ||
container_exec.go | ||
container_execsync.go | ||
container_list.go | ||
container_portforward.go | ||
container_remove.go | ||
container_start.go | ||
container_stats.go | ||
container_stats_list.go | ||
container_status.go | ||
container_stop.go | ||
container_updateruntimeconfig.go | ||
image_fs_info.go | ||
image_list.go | ||
image_pull.go | ||
image_remove.go | ||
image_status.go | ||
inspect.go | ||
inspect_test.go | ||
naming.go | ||
runtime_status.go | ||
sandbox_list.go | ||
sandbox_network.go | ||
sandbox_remove.go | ||
sandbox_run.go | ||
sandbox_status.go | ||
sandbox_stop.go | ||
server.go | ||
utils.go | ||
version.go |