summaryrefslogtreecommitdiffhomepage
path: root/runsc
AgeCommit message (Expand)Author
2019-03-05Priority-inheritance futex implementationFabricio Voznika
2019-03-05Add uncaught signal message to the user logFabricio Voznika
2019-03-01Add semctl(GETPID) syscallFabricio Voznika
2019-02-27Don't log twice to debug log when --log isn't setFabricio Voznika
2019-02-25Fix cgroup when path is relativeFabricio Voznika
2019-02-22Rename ping endpoints to icmp endpoints.Kevin Krakauer
2019-02-14Don't allow writing or reading to TTY unless process group is in foreground.Nicolas Lacasse
2019-02-13Add support for using PACKET_RX_RING to receive packets.Bhasker Hariharan
2019-02-01Factor the subtargets method into a helper method with tests.Nicolas Lacasse
2019-01-31gvisor/gofer: Use pivot_root instead of chrootAndrei Vagin
2019-01-31Remove license commentsMichael Pratt
2019-01-31runsc: check whether a container is deleted or not before setupContainerFSAndrei Vagin
2019-01-29runsc: reap a sandbox process only in sandbox.Wait()Andrei Vagin
2019-01-29Use recvmmsg() instead of readv() to read packets from NIC.Bhasker Hariharan
2019-01-28check isRootNS by ns inodeShijiang Wei
2019-01-28runsc: Only uninstall cgroup for sandbox stop.Lantao Liu
2019-01-25Make cacheRemoteRevalidating detect changes to file sizeFabricio Voznika
2019-01-25Fix a nil pointer dereference bug in Container.Destroy()ShiruRen
2019-01-25Execute statically linked binaryFabricio Voznika
2019-01-22Don't bind-mount runsc into a sandbox mntnsAndrei Vagin
2019-01-18Scrub runsc error messagesFabricio Voznika
2019-01-18Start a sandbox process in a new userns only if CAP_SETUID is setAndrei Vagin
2019-01-18runsc: create a new proc mount if the sandbox process is running in a new pidnsAndrei Vagin
2019-01-16Prevent internal tmpfs mount to override files in /tmpFabricio Voznika
2019-01-15Create working directory if it doesn't yet existFabricio Voznika
2019-01-14Remove fs.Handle, ramfs.Entry, and all the DeprecatedFileOperations.Nicolas Lacasse
2019-01-14runsc: set up a minimal chroot from the sandbox processAndrei Vagin
2019-01-11runsc: Collect zombies of sandbox and gofer processesAndrei Vagin
2019-01-09Restore to original cgroup after sandbox and gofer processes are createdFabricio Voznika
2019-01-07Undo changes in case of failure to create file/dir/symlinkFabricio Voznika
2019-01-03Apply chroot for --network=host tooFabricio Voznika
2019-01-02Automated rollback of changelist 225089593Michael Pratt
2018-12-28Simplify synchronization between runsc and sandbox processFabricio Voznika
2018-12-20Rename limits.MemoryPagesLocked to limits.MemoryLocked.Jamie Liu
2018-12-19Automated rollback of changelist 225861605Googler
2018-12-17Expose internal testing flagMichael Pratt
2018-12-17Implement mlock(), kind of.Jamie Liu
2018-12-13container.Destroy should clean up container metadata even if other cleanups failNicolas Lacasse
2018-12-11Add "trace signal" optionMichael Pratt
2018-12-10Open source system call tests.Brian Geffon
2018-12-10Internal change.Nicolas Lacasse
2018-12-07sentry: turn "dynamically-created" procfs files into static creation.Zhaozhong Ni
2018-12-06A sandbox process should wait until it has not been moved into cgroupsAndrei Vagin
2018-12-04Max link traversals should be for an entire path.Brian Geffon
2018-12-03Internal change.Googler
2018-11-28Internal change.Googler
2018-11-28Fix crictl tests.Kevin Krakauer
2018-11-27Disable crictl testsMichael Pratt
2018-11-20Use RET_KILL_PROCESS if available in kernelFabricio Voznika
2018-11-20Use math.Rand to generate a random test container id.Nicolas Lacasse