Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-06-24 | Merge 87df9aab (automated) | gVisor bot | |
2019-06-24 | Use correct statx syscall number for amd64. | Nicolas Lacasse | |
The previous number was for the arm architecture. Also change the statx tests to force them to run on gVisor, which would have caught this issue. PiperOrigin-RevId: 254846831 | |||
2019-06-24 | Merge b21b1db7 (automated) | gVisor bot | |
2019-06-24 | Allow to change logging options using 'runsc debug' | Fabricio Voznika | |
New options are: runsc debug --strace=off|all|function1,function2 runsc debug --log-level=warning|info|debug runsc debug --log-packets=true|false Updates #407 PiperOrigin-RevId: 254843128 | |||
2019-06-22 | Merge 35719d52 (automated) | gVisor bot | |
2019-06-22 | Implement statx. | Nicolas Lacasse | |
We don't have the plumbing for btime yet, so that field is left off. The returned mask indicates that btime is absent. Fixes #343 PiperOrigin-RevId: 254575752 | |||
2019-06-22 | Merge ab6774ce (automated) | gVisor bot | |
2019-06-21 | gvisor/fs: getdents returns 0 if offset is equal to FileMaxOffset | Andrei Vagin | |
FileMaxOffset is a special case when lseek(d, 0, SEEK_END) has been called. PiperOrigin-RevId: 254498777 | |||
2019-06-21 | Merge 6f933a93 (automated) | gVisor bot | |
2019-06-21 | Merge ae4ef32b (automated) | gVisor bot | |
2019-06-21 | Merge 72737532 (automated) | gVisor bot | |
2019-06-21 | ext4 block group descriptor implementation in disk layout package. | Ayush Ranjan | |
PiperOrigin-RevId: 254482180 | |||
2019-06-21 | Merge 5ba16d51 (automated) | gVisor bot | |
2019-06-21 | Add list of stuck tasks to panic message | Fabricio Voznika | |
PiperOrigin-RevId: 254450309 | |||
2019-06-21 | Merge c0317b28 (automated) | gVisor bot | |
2019-06-21 | Merge f94653b3 (automated) | gVisor bot | |
2019-06-21 | kernel: call t.mu.Unlock() explicitly in WithMuLocked | Andrei Vagin | |
defer here doesn't improve readability, but we know it slower that the explicit call. PiperOrigin-RevId: 254441473 | |||
2019-06-21 | Merge 335fd987 (automated) | gVisor bot | |
2019-06-21 | Merge 054b5632 (automated) | gVisor bot | |
2019-06-21 | Update comment | Fabricio Voznika | |
PiperOrigin-RevId: 254428866 | |||
2019-06-21 | Merge dc36c34a (automated) | gVisor bot | |
2019-06-20 | Merge 3c7448ab (automated) | gVisor bot | |
2019-06-20 | Merge 292f70cb (automated) | gVisor bot | |
2019-06-20 | Preallocate auth.NewAnonymousCredentials() in contexttest.TestContext. | Jamie Liu | |
Otherwise every call to, say, fs.ContextCanAccessFile() in a benchmark using contexttest allocates new auth.Credentials, a new auth.UserNamespace, ... PiperOrigin-RevId: 254261051 | |||
2019-06-20 | Add package docs to seqfile and ramfs | Michael Pratt | |
These are the only packages missing docs: https://godoc.org/gvisor.dev/gvisor PiperOrigin-RevId: 254261022 | |||
2019-06-20 | Merge 0b213507 (automated) | gVisor bot | |
2019-06-20 | Implement madvise(MADV_DONTFORK) | Neel Natu | |
PiperOrigin-RevId: 254253777 | |||
2019-06-20 | Merge b46ec370 (automated) | gVisor bot | |
2019-06-20 | Merge 7e495156 (automated) | gVisor bot | |
2019-06-19 | Deflake SendFileTest_Shutdown. | Ian Gudger | |
The sendfile syscall's backing doSplice contained a race with regard to blocking. If the first attempt failed with syserror.ErrWouldBlock and then the blocking file became ready before registering a waiter, we would just return the ErrWouldBlock (even if we were supposed to block). PiperOrigin-RevId: 254114432 | |||
2019-06-20 | Merge c2d87d5d (automated) | gVisor bot | |
2019-06-19 | Merge 9781128d (automated) | gVisor bot | |
2019-06-19 | Merge 773423a9 (automated) | gVisor bot | |
2019-06-19 | Merge 9d2efaac (automated) | gVisor bot | |
2019-06-19 | Merge 29f9e4fa (automated) | gVisor bot | |
2019-06-19 | fileOp{On,At} should pass the remaning symlink traversal count. | Nicolas Lacasse | |
And methods that do more traversals should use the remaining count rather than resetting. PiperOrigin-RevId: 254041720 | |||
2019-06-19 | Merge f7428af9 (automated) | gVisor bot | |
2019-06-19 | Add MountNamespace to task. | Nicolas Lacasse | |
This allows tasks to have distinct mount namespace, instead of all sharing the kernel's root mount namespace. Currently, the only way for a task to get a different mount namespace than the kernel's root is by explicitly setting a different MountNamespace in CreateProcessArgs, and nothing does this (yet). In a follow-up CL, we will set CreateProcessArgs.MountNamespace when creating a new container inside runsc. Note that "MountNamespace" is a poor term for this thing. It's more like a distinct VFS tree. When we get around to adding real mount namespaces, this will need a better naem. PiperOrigin-RevId: 254009310 | |||
2019-06-19 | Merge ca245a42 (automated) | gVisor bot | |
2019-06-18 | Attempt to fix TestPipeWritesAccumulate | Fabricio Voznika | |
Test fails because it's reading 4KB instead of the expected 64KB. Changed the test to read pipe buffer size instead of hardcode and added some logging in case the reason for failure was not pipe buffer size. PiperOrigin-RevId: 253916040 | |||
2019-06-18 | Merge 546b2948 (automated) | gVisor bot | |
2019-06-18 | Merge 0e07c94d (automated) | gVisor bot | |
2019-06-18 | Merge bdb19b82 (automated) | gVisor bot | |
2019-06-18 | Merge ec15fb11 (automated) | gVisor bot | |
2019-06-18 | Merge 8ab0848c (automated) | gVisor bot | |
2019-06-18 | gvisor/fs: don't update file.offset for sockets, pipes, etc | Andrei Vagin | |
sockets, pipes and other non-seekable file descriptors don't use file.offset, so we don't need to update it. With this change, we will be able to call file operations without locking the file.mu mutex. This is already used for pipes in the splice system call. PiperOrigin-RevId: 253746644 | |||
2019-06-18 | Merge 66cc0e9f (automated) | gVisor bot | |
2019-06-17 | Merge 99d28637 (automated) | gVisor bot | |
2019-06-14 | Merge a8608c50 (automated) | gVisor bot | |
2019-06-14 | Merge 3d71c627 (automated) | gVisor bot | |