Skip to content

Commit 5fd0566

Browse files
author
Kubernetes Submit Queue
authored
Merge pull request kubernetes#43652 from Random-Liu/avoid-kubelet-panic
Automatic merge from submit-queue (batch tested with PRs 43653, 43654, 43652) CRI: Check nil pointer to avoid kubelet panic. When working on the containerd kubernetes integration, I casually returns an empty `sandboxStatus.Linux{}`, but it cause kubelet to panic. This won't happen when runtime returns valid data, but we should not make the assumption here. /cc @yujuhong @feiskyer
2 parents 2a61cfb + 9186d15 commit 5fd0566

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

pkg/kubelet/kuberuntime/kuberuntime_manager.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -386,7 +386,7 @@ func (m *kubeGenericRuntimeManager) podSandboxChanged(pod *v1.Pod, podStatus *ku
386386
}
387387

388388
// Needs to create a new sandbox when network namespace changed.
389-
if sandboxStatus.Linux != nil && sandboxStatus.Linux.Namespaces.Options != nil &&
389+
if sandboxStatus.Linux != nil && sandboxStatus.Linux.Namespaces != nil && sandboxStatus.Linux.Namespaces.Options != nil &&
390390
sandboxStatus.Linux.Namespaces.Options.HostNetwork != kubecontainer.IsHostNetworkPod(pod) {
391391
glog.V(2).Infof("Sandbox for pod %q has changed. Need to start a new one", format.Pod(pod))
392392
return true, sandboxStatus.Metadata.Attempt + 1, ""

0 commit comments

Comments
 (0)