summaryrefslogtreecommitdiffhomepage
path: root/runsc/sandbox
AgeCommit message (Expand)Author
2019-06-24Allow to change logging options using 'runsc debug'Fabricio Voznika
2019-06-21Delete dangling comment line.Nicolas Lacasse
2019-06-20Drop extra characterMichael Pratt
2019-06-18Kill sandbox process when 'runsc do' exitsFabricio Voznika
2019-06-18Add Container/Sandbox args struct for creationFabricio Voznika
2019-06-13Update canonical repository.Adin Scannell
2019-06-12Allow 'runsc do' to run without rootFabricio Voznika
2019-06-11Use net.HardwareAddr for FDBasedLink.LinkAddressFabricio Voznika
2019-06-06Add multi-fd support to fdbased endpoint.Bhasker Hariharan
2019-06-03Remove 'clearStatus' option from container.Wait*PID()Fabricio Voznika
2019-05-30Add support for collecting execution trace to runsc.Bhasker Hariharan
2019-05-15gvisor/runsc: use a veth link address instead of generating a new oneAndrei Vagin
2019-05-02runsc: don't create an empty network namespace if NetworkHost is setAndrei Vagin
2019-05-02Add [simple] network support to 'runsc do'Fabricio Voznika
2019-04-29Change copyright notice to "The gVisor Authors"Michael Pratt
2019-04-29Allow and document bug ids in gVisor codebase.Nicolas Lacasse
2019-04-26Bump the AF_PACKET socket rcv buf size to 4MB by default.Bhasker Hariharan
2019-04-23Replace os.File with fd.FD in fsgoferFabricio Voznika
2019-04-11Add 'runsc do' commandFabricio Voznika
2019-03-29gvisor/runsc: enable generic segmentation offload (GSO)Andrei Vagin
2019-03-18Add support for mount propagationFabricio Voznika
2019-03-11Add profiling commands to runscFabricio Voznika
2019-01-31Remove license commentsMichael Pratt
2019-01-29runsc: reap a sandbox process only in sandbox.Wait()Andrei Vagin
2019-01-28check isRootNS by ns inodeShijiang Wei
2019-01-22Don't bind-mount runsc into a sandbox mntnsAndrei Vagin
2019-01-18Scrub runsc error messagesFabricio Voznika
2019-01-18Start a sandbox process in a new userns only if CAP_SETUID is setAndrei Vagin
2019-01-18runsc: create a new proc mount if the sandbox process is running in a new pidnsAndrei Vagin
2019-01-14runsc: set up a minimal chroot from the sandbox processAndrei Vagin
2019-01-11runsc: Collect zombies of sandbox and gofer processesAndrei Vagin
2019-01-09Restore to original cgroup after sandbox and gofer processes are createdFabricio Voznika
2019-01-03Apply chroot for --network=host tooFabricio Voznika
2018-12-28Simplify synchronization between runsc and sandbox processFabricio Voznika
2018-12-06A sandbox process should wait until it has not been moved into cgroupsAndrei Vagin
2018-11-15Allow sandbox.Wait to be called after the sandbox has exited.Nicolas Lacasse
2018-11-05Fix race between start and destroyFabricio Voznika
2018-11-01Make error messages a bit more user friendly.Ian Lewis
2018-10-23Track paths and provide a rename hook.Adin Scannell
2018-10-21Updated cleanup code to be more explicit about ignoring errors.Ian Lewis
2018-10-19Use correct company name in copyright headerIan Gudger
2018-10-18Resolve mount paths while setting up root fs mountFabricio Voznika
2018-10-17runsc: Support job control signals for the root container.Nicolas Lacasse
2018-10-16Bump sandbox start and stop timeouts.Nicolas Lacasse
2018-10-15Never send boot process stdio to application stdio.Nicolas Lacasse
2018-10-11Make the gofer process enter namespacesFabricio Voznika
2018-10-11Make Wait() return the sandbox exit status if the sandbox has exited.Nicolas Lacasse
2018-10-11Make debug log file name configurableFabricio Voznika
2018-10-11Add bare bones unsupported syscall loggingFabricio Voznika
2018-10-10runsc: Pass controlling TTY by FD in the *new* process, not current process.Nicolas Lacasse