Age | Commit message (Expand) | Author |
2019-03-01 | Add semctl(GETPID) syscall | Fabricio Voznika |
2019-02-27 | Don't log twice to debug log when --log isn't set | Fabricio Voznika |
2019-02-25 | Fix cgroup when path is relative | Fabricio Voznika |
2019-02-22 | Rename ping endpoints to icmp endpoints. | Kevin Krakauer |
2019-02-14 | Don't allow writing or reading to TTY unless process group is in foreground. | Nicolas Lacasse |
2019-02-13 | Add support for using PACKET_RX_RING to receive packets. | Bhasker Hariharan |
2019-02-01 | Factor the subtargets method into a helper method with tests. | Nicolas Lacasse |
2019-01-31 | gvisor/gofer: Use pivot_root instead of chroot | Andrei Vagin |
2019-01-31 | Remove license comments | Michael Pratt |
2019-01-31 | runsc: check whether a container is deleted or not before setupContainerFS | Andrei Vagin |
2019-01-29 | runsc: reap a sandbox process only in sandbox.Wait() | Andrei Vagin |
2019-01-29 | Use recvmmsg() instead of readv() to read packets from NIC. | Bhasker Hariharan |
2019-01-28 | check isRootNS by ns inode | Shijiang Wei |
2019-01-28 | runsc: Only uninstall cgroup for sandbox stop. | Lantao Liu |
2019-01-25 | Make cacheRemoteRevalidating detect changes to file size | Fabricio Voznika |
2019-01-25 | Fix a nil pointer dereference bug in Container.Destroy() | ShiruRen |
2019-01-25 | Execute statically linked binary | Fabricio Voznika |
2019-01-22 | Don't bind-mount runsc into a sandbox mntns | Andrei Vagin |
2019-01-18 | Scrub runsc error messages | Fabricio Voznika |
2019-01-18 | Start a sandbox process in a new userns only if CAP_SETUID is set | Andrei Vagin |
2019-01-18 | runsc: create a new proc mount if the sandbox process is running in a new pidns | Andrei Vagin |
2019-01-16 | Prevent internal tmpfs mount to override files in /tmp | Fabricio Voznika |
2019-01-15 | Create working directory if it doesn't yet exist | Fabricio Voznika |
2019-01-14 | Remove fs.Handle, ramfs.Entry, and all the DeprecatedFileOperations. | Nicolas Lacasse |
2019-01-14 | runsc: set up a minimal chroot from the sandbox process | Andrei Vagin |
2019-01-11 | runsc: Collect zombies of sandbox and gofer processes | Andrei Vagin |
2019-01-09 | Restore to original cgroup after sandbox and gofer processes are created | Fabricio Voznika |
2019-01-07 | Undo changes in case of failure to create file/dir/symlink | Fabricio Voznika |
2019-01-03 | Apply chroot for --network=host too | Fabricio Voznika |
2019-01-02 | Automated rollback of changelist 225089593 | Michael Pratt |
2018-12-28 | Simplify synchronization between runsc and sandbox process | Fabricio Voznika |
2018-12-20 | Rename limits.MemoryPagesLocked to limits.MemoryLocked. | Jamie Liu |
2018-12-19 | Automated rollback of changelist 225861605 | Googler |
2018-12-17 | Expose internal testing flag | Michael Pratt |
2018-12-17 | Implement mlock(), kind of. | Jamie Liu |
2018-12-13 | container.Destroy should clean up container metadata even if other cleanups fail | Nicolas Lacasse |
2018-12-11 | Add "trace signal" option | Michael Pratt |
2018-12-10 | Open source system call tests. | Brian Geffon |
2018-12-10 | Internal change. | Nicolas Lacasse |
2018-12-07 | sentry: turn "dynamically-created" procfs files into static creation. | Zhaozhong Ni |
2018-12-06 | A sandbox process should wait until it has not been moved into cgroups | Andrei Vagin |
2018-12-04 | Max link traversals should be for an entire path. | Brian Geffon |
2018-12-03 | Internal change. | Googler |
2018-11-28 | Internal change. | Googler |
2018-11-28 | Fix crictl tests. | Kevin Krakauer |
2018-11-27 | Disable crictl tests | Michael Pratt |
2018-11-20 | Use RET_KILL_PROCESS if available in kernel | Fabricio Voznika |
2018-11-20 | Use math.Rand to generate a random test container id. | Nicolas Lacasse |
2018-11-20 | Internal change. | Nicolas Lacasse |
2018-11-20 | Add unsupported syscall events for get/setsockopt | Fabricio Voznika |