From 7a50ed7fe02fc180cdc8c608d0d29ac255d04c38 Mon Sep 17 00:00:00 2001 From: Dan Duvall Date: Sat, 15 Nov 2025 23:18:21 -0800 Subject: [PATCH] dockerfile: run buildkitd within a cgroup namespace for cgroup v2 Introduce a new entrypoint script for the Linux image that, if cgroup v2 is in use, creates a new cgroup and mount namespace for buildkitd within a new entrypoint using `unshare` and remounts `/sys/fs/cgroup` to restrict its view of the unified cgroup hierarchy. This will ensure its `init` cgroup and all OCI worker managed cgroups are kept beneath the root cgroup of the initial entrypoint process. When buildkitd is run in a managed environment like Kubernetes without its own cgroup namespace (the default behavior of privileged pods in Kubernetes where cgroup v2 is in use; see [cgroup v2 KEP][kep]), the OCI worker will spawn processes in cgroups that are outside of the cgroup hierarchy that was created for the buildkitd container, leading to incorrect resource accounting and enforcement which in turn can cause OOM errors and CPU contention on the node. Example behavior without this change: ```console root@k8s-node:/# cat /proc/$(pgrep -n buildkitd)/cgroup 0::/init root@k8s-node:/# cat /proc/$(pgrep -n some-build-process)/cgroup 0::/buildkit/{runc-container-id} ``` Example behavior with this change: ```console root@k8s-node:/# cat /proc/$(pgrep -n buildkitd)/cgroup 0::/kubepods/burstable/pod{pod-id}/{container-id}/init root@k8s-node:/# cat /proc/$(pgrep -n some-build-process)/cgroup 0::/kubepods/burstable/pod{pod-id}/{container-id}/buildkit/{runc-container-id} ``` Note this was developed as an alternative approach to moby/buildkit#6343 [kep]: https://github.com/kubernetes/enhancements/tree/6d3210f7dd5d547c8f7f6a33af6a09eb45193cd7/keps/sig-node/2254-cgroup-v2#cgroup-namespace Signed-off-by: Dan Duvall --- Dockerfile | 33 +++++++++++++++++++++++++++++++-- 1 file changed, 31 insertions(+), 2 deletions(-) diff --git a/Dockerfile b/Dockerfile index 9c1efb14dc84..7bcb1728f34c 100644 --- a/Dockerfile +++ b/Dockerfile @@ -205,7 +205,7 @@ FROM scratch AS release COPY --link --from=releaser /out/ / FROM alpine:${ALPINE_VERSION} AS buildkit-export-alpine -RUN apk add --no-cache fuse3 git openssh openssl pigz xz iptables ip6tables \ +RUN apk add --no-cache fuse3 git openssh openssl pigz xz iptables ip6tables util-linux-misc \ && ln -s fusermount3 /usr/bin/fusermount COPY --link examples/buildctl-daemonless/buildctl-daemonless.sh /usr/bin/ VOLUME /var/lib/buildkit @@ -380,8 +380,37 @@ EOT FROM buildkit-export AS buildkit-linux COPY --link --from=binaries / /usr/bin/ +COPY --link --chmod=755 <