Age | Commit message (Collapse) | Author | |
---|---|---|---|
2021-02-22 | Merge release-20210208.0-80-gc5a4e1000 (automated) | gVisor bot | |
2021-02-22 | unix: sendmmsg and recvmsg have to cap a number of message to UIO_MAXIOV | Andrei Vagin | |
Reported-by: syzbot+f2489ba0b999a45d1ad1@syzkaller.appspotmail.com PiperOrigin-RevId: 358866218 | |||
2021-02-20 | Merge release-20210208.0-78-g93fc09248 (automated) | gVisor bot | |
2021-02-19 | Don't hold baseEndpoint.mu while calling EventUpdate(). | Nicolas Lacasse | |
This removes a three-lock deadlock between fdnotifier.notifier.mu, epoll.EventPoll.listsMu, and baseEndpoint.mu. A lock order comment was added to epoll/epoll.go. Also fix unsafe access of baseEndpoint.connected/receiver. PiperOrigin-RevId: 358515191 | |||
2021-02-19 | Merge release-20210208.0-76-g5e22ab93e (automated) | gVisor bot | |
2021-02-19 | control.Proc.Exec should default to root pid namespace if none provided. | Nicolas Lacasse | |
PiperOrigin-RevId: 358445320 | |||
2021-02-19 | Merge release-20210208.0-74-gec7f44f36 (automated) | gVisor bot | |
2021-02-18 | Make socketops reflect correct sndbuf value for host UDS. | Bhasker Hariharan | |
Also skips a test if the setsockopt to increase send buffer did not result in an increase. This is possible when the underlying socket is a host backed unix domain socket as in such cases gVisor does not permit increasing SO_SNDBUF. PiperOrigin-RevId: 358285158 | |||
2021-02-18 | Merge release-20210208.0-73-gf80a857a4 (automated) | gVisor bot | |
2021-02-18 | Bump build constraints to Go 1.18 | Michael Pratt | |
These are bumped to allow early testing of Go 1.17. Use will be audited closer to the 1.17 release. PiperOrigin-RevId: 358278615 | |||
2021-02-18 | Merge release-20210208.0-71-g2a2cb29e1 (automated) | gVisor bot | |
2021-02-18 | Validate IGMP packets | Arthur Sfez | |
This change also adds support for Router Alert option processing on incoming packets, a new stat for Router Alert option, and exports all the IP-option related stats. Fixes #5491 PiperOrigin-RevId: 358238123 | |||
2021-02-18 | Merge release-20210208.0-65-g1fc2c5f75 (automated) | gVisor bot | |
2021-02-17 | Move Name() out of netstack Matcher. It can live in the sentry. | Kevin Krakauer | |
PiperOrigin-RevId: 358078157 | |||
2021-02-18 | Merge release-20210208.0-64-gf051ec646 (automated) | gVisor bot | |
2021-02-17 | Add gohacks.Slice/StringHeader. | Jamie Liu | |
See https://github.com/golang/go/issues/19367 for rationale. Note that the upstream decision arrived at in that thread, while useful for some of our use cases, doesn't account for all of our SliceHeader use cases (we often use SliceHeader to extract pointers from slices in a way that avoids bounds checking and/or handles nil slices correctly) and also doesn't exist yet. PiperOrigin-RevId: 358071574 | |||
2021-02-17 | Merge release-20210208.0-63-g4bc7daf91 (automated) | gVisor bot | |
2021-02-17 | Check for directory emptiness in VFS1 overlay rmdir(). | Jamie Liu | |
Note that this CL reorders overlayEntry.copyMu before overlayEntry.dirCacheMu in the overlayFileOperations.IterateDir() => readdirEntries() path - but this lock ordering is already required by overlayRemove/Bind() => overlayEntry.markDirectoryDirty(), so this actually just fixes an inconsistency. PiperOrigin-RevId: 358047121 | |||
2021-02-12 | Merge release-20210208.0-52-g845d0a65f (automated) | gVisor bot | |
2021-02-11 | [rack] TLP: ACK Processing and PTO scheduling. | Ayush Ranjan | |
This change implements TLP details enumerated in https://tools.ietf.org/html/draft-ietf-tcpm-rack-08#section-7.5.3 Fixes #5085 PiperOrigin-RevId: 357125037 | |||
2021-02-12 | Merge release-20210201.0-92-g34614c398 (automated) | gVisor bot | |
2021-02-11 | Unconditionally check for directory-ness in overlay.filesystem.UnlinkAt(). | Jamie Liu | |
PiperOrigin-RevId: 357106080 | |||
2021-02-12 | Merge release-20210201.0-90-g4314bb0b2 (automated) | gVisor bot | |
2021-02-11 | Internal change. | gVisor bot | |
PiperOrigin-RevId: 357090170 | |||
2021-02-11 | Merge release-20210201.0-87-gc833eed80 (automated) | gVisor bot | |
2021-02-11 | Implement semtimedop. | Jing Chen | |
PiperOrigin-RevId: 357031904 | |||
2021-02-11 | Merge release-20210201.0-86-gae8d966f5 (automated) | gVisor bot | |
2021-02-11 | Assign controlling terminal when tty is opened and support NOCTTY | Kevin Krakauer | |
PiperOrigin-RevId: 357015186 | |||
2021-02-11 | Merge release-20210201.0-84-g81ea0016e (automated) | gVisor bot | |
2021-02-10 | Support setgid directories in tmpfs and kernfs | Kevin Krakauer | |
PiperOrigin-RevId: 356868412 | |||
2021-02-11 | Merge release-20210201.0-82-g97a36d169 (automated) | gVisor bot | |
2021-02-10 | Don't allow to umount the namespace root mount | Andrei Vagin | |
Linux does the same thing. Reported-by: syzbot+6c79385c930c929d1d9e@syzkaller.appspotmail.com PiperOrigin-RevId: 356854562 | |||
2021-02-10 | Merge release-20210201.0-75-gb9db7db3b (automated) | gVisor bot | |
2021-02-10 | Merge pull request #5267 from lubinszARM:pr_usr_lazy_fp | gVisor bot | |
PiperOrigin-RevId: 356762859 | |||
2021-02-10 | Merge release-20210201.0-72-g298c129cc (automated) | gVisor bot | |
2021-02-09 | Add support for setting SO_SNDBUF for unix domain sockets. | Bhasker Hariharan | |
The limits for snd/rcv buffers for unix domain socket is controlled by the following sysctls on linux - net.core.rmem_default - net.core.rmem_max - net.core.wmem_default - net.core.wmem_max Today in gVisor we do not expose these sysctls but we do support setting the equivalent in netstack via stack.Options() method. But AF_UNIX sockets in gVisor can be used without netstack, with hostinet or even without any networking stack at all. Which means ideally these sysctls need to live as globals in gVisor. But rather than make this a big change for now we hardcode the limits in the AF_UNIX implementation itself (which in itself is better than where we were before) where it SO_SNDBUF was hardcoded to 16KiB. Further we bump the initial limit to a default value of 208 KiB to match linux from the paltry 16 KiB we use today. Updates #5132 PiperOrigin-RevId: 356665498 | |||
2021-02-10 | Merge release-20210201.0-70-gf6de413c3 (automated) | gVisor bot | |
2021-02-09 | Add cleanup TODO for integer-based proc files. | Dean Deng | |
PiperOrigin-RevId: 356645022 | |||
2021-02-09 | Merge release-20210201.0-65-g2b978d874 (automated) | gVisor bot | |
2021-02-09 | Collapse code that always returns error | Tamir Duberstein | |
PiperOrigin-RevId: 356536548 | |||
2021-02-09 | Merge release-20210201.0-64-gfe4f47896 (automated) | gVisor bot | |
2021-02-09 | kernel: reparentLocked has to update children maps of old and new parents | Andrei Vagin | |
Reported-by: syzbot+9ffc71246fe72c73fc25@syzkaller.appspotmail.com PiperOrigin-RevId: 356536113 | |||
2021-02-09 | Merge release-20210201.0-63-gd6dbe6e5c (automated) | gVisor bot | |
2021-02-09 | pipe: writeLocked has to return ErrWouldBlock if the pipe is full | Andrei Vagin | |
PiperOrigin-RevId: 356450303 | |||
2021-02-09 | Merge release-20210201.0-59-gbf4968e17 (automated) | gVisor bot | |
2021-02-08 | exec: don't panic if an elf file is malformed | Andrei Vagin | |
Reported-by: syzbot+d54bc27a15aefe52c330@syzkaller.appspotmail.com PiperOrigin-RevId: 356406975 | |||
2021-02-09 | Merge release-20210201.0-56-ge51f775cb (automated) | gVisor bot | |
2021-02-08 | [go-marshal] Remove binary package reference from syscalls package. | Ayush Ranjan | |
Fixes a bug in our getsockopt(2) implementation which was incorrectly using binary.Size() instead of Marshallable.SizeBytes(). PiperOrigin-RevId: 356396551 | |||
2021-02-06 | Merge release-20210125.0-89-g120c8e346 (automated) | gVisor bot | |
2021-02-05 | Replace TaskFromContext(ctx).Kernel() with KernelFromContext(ctx) | Ting-Yu Wang | |
Panic seen at some code path like control.ExecAsync where ctx does not have a Task. Reported-by: syzbot+55ce727161cf94a7b7d6@syzkaller.appspotmail.com PiperOrigin-RevId: 355960596 |