Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-12-10 | Merge release-20191129.0-36-gf6e87be (automated) | gVisor bot | |
2019-12-10 | Let socket.ControlMessages Release() the underlying transport.ControlMessages. | Dean Deng | |
PiperOrigin-RevId: 284804370 | |||
2019-12-10 | Merge release-20191129.0-34-gc15be3f (automated) | gVisor bot | |
2019-12-10 | Add all upstream syscalls to tables | Michael Pratt | |
Package strace is missing some syscalls we actually implement (e.g., getrandom). We also see newer syscalls sometimes (e.g., membarrier) that would be handy to have formatted. Let's go ahead and add all syscalls in the latest upstream release (v5.4), even though we only intend to implement v4.4. None of them are implemented, just included as placeholders. PiperOrigin-RevId: 284797577 | |||
2019-12-09 | Merge release-20191129.0-27-g898dcc2 (automated) | gVisor bot | |
2019-12-09 | Redirect TODOs to gvisor.dev | Fabricio Voznika | |
PiperOrigin-RevId: 284606233 | |||
2019-12-06 | Merge release-20191129.0-7-g13f0f60 (automated) | gVisor bot | |
2019-12-05 | Implement F_GETOWN_EX and F_SETOWN_EX. | Ian Gudger | |
Some versions of glibc will convert F_GETOWN fcntl(2) calls into F_GETOWN_EX in some cases. PiperOrigin-RevId: 284089373 | |||
2019-12-02 | Merge release-20191114.0-45-g9194aab (automated) | gVisor bot | |
2019-12-02 | Support sending IP_TOS and IPV6_TCLASS control messages with hostinet sockets. | Dean Deng | |
There are two potential ways of sending a TOS byte with outgoing packets: including a control message in sendmsg, or setting the IP_TOS/IPV6_TCLASS socket options (for IPV4 and IPV6 respectively). This change lets hostinet support the former. PiperOrigin-RevId: 283346737 | |||
2019-11-28 | Merge release-20191114.0-41-g684f757 (automated) | gVisor bot | |
2019-11-27 | Add support for receiving TOS and TCLASS control messages in hostinet. | Dean Deng | |
This involves allowing getsockopt/setsockopt for the corresponding socket options, as well as allowing hostinet to process control messages received from the actual recvmsg syscall. PiperOrigin-RevId: 282851425 | |||
2019-11-27 | Merge release-20191114.0-39-g20279c3 (automated) | gVisor bot | |
2019-11-26 | Allow open(O_TRUNC) and (f)truncate for proc files. | Ian Lewis | |
This allows writable proc and devices files to be opened with O_CREAT|O_TRUNC. This is encountered most frequently when interacting with proc or devices files via the command line. e.g. $ echo 8192 1048576 4194304 > /proc/sys/net/ipv4/tcp_rmem Also adds a test to test the behavior of open(O_TRUNC), truncate, and ftruncate on named pipes. Fixes #1116 PiperOrigin-RevId: 282677425 | |||
2019-11-27 | Merge release-20191114.0-36-g519ceab (automated) | gVisor bot | |
2019-11-26 | Mark execveat as supported for linux64_arm64. | Dean Deng | |
PiperOrigin-RevId: 282667122 | |||
2019-11-20 | Merge release-20191114.0-16-g012102e (automated) | gVisor bot | |
2019-11-20 | Pass OpenTruncate to gofer in Open call when opening file with O_TRUNC. | Nicolas Lacasse | |
Note that the Sentry still calls Truncate() on the file before calling Open. A new p9 version check was added to ensure that the p9 server can handle the the OpenTruncate flag. If not, then the flag is stripped before sending. PiperOrigin-RevId: 281609112 | |||
2019-11-15 | Merge release-20191104.0-44-gaf323eb (automated) | gVisor bot | |
2019-11-14 | Fix return codes for {get,set}sockopt for some nullptr cases. | Ting-Yu Wang | |
Updates #1092 PiperOrigin-RevId: 280547239 | |||
2019-11-15 | Merge release-20191104.0-43-g339536d (automated) | gVisor bot | |
2019-11-14 | Check that a file is a regular file with open(O_TRUNC). | Kevin Krakauer | |
It was possible to panic the sentry by opening a cache revalidating folder with O_TRUNC|O_CREAT. Avoids breaking php tests. PiperOrigin-RevId: 280533213 | |||
2019-11-08 | Merge release-20190806.1-383-gaf58a4e (automated) | gVisor bot | |
2019-11-08 | Automated rollback of changelist 278417533 | Kevin Krakauer | |
PiperOrigin-RevId: 279365629 | |||
2019-11-04 | Merge release-20190806.1-368-g4fdd69d (automated) | gVisor bot | |
2019-11-04 | Check that a file is a regular file with open(O_TRUNC). | Kevin Krakauer | |
It was possible to panic the sentry by opening a cache revalidating folder with O_TRUNC|O_CREAT. PiperOrigin-RevId: 278417533 | |||
2019-11-04 | Merge release-20190806.1-366-g3b4f544 (automated) | gVisor bot | |
2019-11-04 | Update membarrier bug | Michael Pratt | |
Updates #267 PiperOrigin-RevId: 278402684 | |||
2019-10-29 | Merge release-20190806.1-333-g29273b0 (automated) | gVisor bot | |
2019-10-29 | Disallow execveat on interpreter scripts with fd opened with O_CLOEXEC. | Dean Deng | |
When an interpreter script is opened with O_CLOEXEC and the resulting fd is passed into execveat, an ENOENT error should occur (the script would otherwise be inaccessible to the interpreter). This matches the actual behavior of Linux's execveat. PiperOrigin-RevId: 277306680 | |||
2019-10-26 | Merge release-20190806.1-329-g1c480ab (automated) | gVisor bot | |
2019-10-25 | Aggregate arguments for loading executables into a single struct. | Dean Deng | |
This change simplifies the function signatures of functions related to loading executables, such as LoadTaskImage, Load, loadBinary. PiperOrigin-RevId: 276821187 | |||
2019-10-24 | Merge release-20190806.1-318-gd9fd536 (automated) | gVisor bot | |
2019-10-24 | Handle AT_SYMLINK_NOFOLLOW flag for execveat. | Dean Deng | |
PiperOrigin-RevId: 276441249 | |||
2019-10-23 | Handle AT_EMPTY_PATH flag in execveat. | Dean Deng | |
PiperOrigin-RevId: 276419967 | |||
2019-10-22 | Merge release-20190806.1-304-gebe8001 (automated) | gVisor bot | |
2019-10-22 | Update const names to be Go style. | Ian Lewis | |
PiperOrigin-RevId: 276165962 | |||
2019-10-22 | Merge release-20190806.1-298-g070a8c2 (automated) | gVisor bot | |
2019-10-21 | Remove old TODO. | Nicolas Lacasse | |
PiperOrigin-RevId: 275956240 | |||
2019-10-21 | Merge release-20190806.1-297-g0b569b7 (automated) | gVisor bot | |
2019-10-21 | Add basic implementation of execveat syscall and associated tests. | Dean Deng | |
Allow file descriptors of directories as well as AT_FDCWD. PiperOrigin-RevId: 275929668 | |||
2019-10-16 | Reorder BUILD license and load functions in gvisor. | Kevin Krakauer | |
PiperOrigin-RevId: 275139066 | |||
2019-10-16 | Merge release-20190806.1-282-g8fe48dc (automated) | gVisor bot | |
2019-10-16 | Add sublevel to kernel version | Michael Pratt | |
Standard Linux kernel versions are VERSION.PATCHLEVEL.SUBLEVEL. e.g., 4.4.0, even when the sublevel is 0. Match this standard. PiperOrigin-RevId: 275125715 | |||
2019-10-16 | Merge release-20190806.1-279-gbbdcf44 (automated) | gVisor bot | |
2019-10-16 | Fix syscall changes lost in rebase | Michael Pratt | |
These syscalls were changed in the amd64 file around the time the arm64 PR was sent out, so their changes got lost. Updates #63 PiperOrigin-RevId: 275114194 | |||
2019-10-07 | Merge release-20190806.1-243-g8fce24d (automated) | gVisor bot | |
2019-10-07 | Merge pull request #753 from lubinszARM:pr_syscall_linux | gVisor bot | |
PiperOrigin-RevId: 273364848 | |||
2019-10-03 | Merge release-20190806.1-233-gdb218fd (automated) | gVisor bot | |
2019-10-03 | Don't report partialResult errors from sendfile | Andrei Vagin | |
The input file descriptor is always a regular file, so sendfile can't lose any data if it will not be able to write them to the output file descriptor. Reported-by: syzbot+22d22330a35fa1c02155@syzkaller.appspotmail.com PiperOrigin-RevId: 272730357 |