Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: google/gvisor
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: release-20250224.0
Choose a base ref
...
head repository: google/gvisor
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: release-20250304.0
Choose a head ref
  • 13 commits
  • 91 files changed
  • 8 contributors

Commits on Feb 19, 2025

  1. shim: add support for containerd v2 metrics

    Add support for v2 containerd metrics in the shim, v2 metrics are only used when runsc is run with --system-cgroup=true.
    Containerd requires v2 metrics when the host is run with CGroupsV2.
    This issue was noticed when attempting to gather metrics on AL2023 which defaults to CGroupsV2.
    
    Fixes: #11472
    Signed-off-by: Champ-Goblem <cameron@northflank.com>
    Champ-Goblem committed Feb 19, 2025
    Copy the full SHA
    b602afb View commit details

Commits on Feb 25, 2025

  1. Merge pull request #11473 from Champ-Goblem:shim-add-cgroup-v2-metric…

    …s-support
    
    PiperOrigin-RevId: 730560110
    gvisor-bot committed Feb 25, 2025
    Copy the full SHA
    86abc85 View commit details

Commits on Feb 28, 2025

  1. Fix Go workflow with permissions needed to write to PR statuses.

    PiperOrigin-RevId: 732128622
    ayushr2 authored and gvisor-bot committed Feb 28, 2025
    Copy the full SHA
    fa0fbae View commit details
  2. test: add syscall_test() perf argument

    PiperOrigin-RevId: 732194076
    nixprime authored and gvisor-bot committed Feb 28, 2025
    Copy the full SHA
    3885a28 View commit details

Commits on Mar 1, 2025

  1. test/runner: do not emit --gtest_filter=main.test

    PiperOrigin-RevId: 732286578
    nixprime authored and gvisor-bot committed Mar 1, 2025
    Copy the full SHA
    4a157b8 View commit details
  2. test/runner: ignore warnings about rlimits being lower than recommended

    PiperOrigin-RevId: 732302179
    nixprime authored and gvisor-bot committed Mar 1, 2025
    Copy the full SHA
    b4cc9c5 View commit details
  3. gofer: fix ref drop when racily-unlinked synthetic file is invalidated

    PiperOrigin-RevId: 732340885
    nixprime authored and gvisor-bot committed Mar 1, 2025
    Copy the full SHA
    d71a9b3 View commit details

Commits on Mar 3, 2025

  1. Fix restore with pending exec session

    Exec'd processes cannot be stitched back to the original caller
    and are killed after restore. So ignore failures
    to restore host FDs (generally stdio) that belong
    to them.
    
    Fixes #11439
    
    PiperOrigin-RevId: 732972054
    fvoznika authored and gvisor-bot committed Mar 3, 2025
    Copy the full SHA
    0c17600 View commit details
  2. Update gVisor's containerd quick start.

    Adding ctr instructions for an easier verification.
    
    PiperOrigin-RevId: 733017114
    milantracy authored and gvisor-bot committed Mar 3, 2025
    Copy the full SHA
    c822fc9 View commit details
  3. goferfs: Add S/R support for open FDs to deleted files.

    This support is only needed when the gofer mount in question is writable.
    By default, the rootfs has an overlayfs applied, so the gofer lower layer is
    not writabled. But if you are using --overlay2=none, then this change should
    allow you to save sandbox with open FDs to deleted files in rootfs.
    
    Updates #11425
    
    PiperOrigin-RevId: 733021267
    ayushr2 authored and gvisor-bot committed Mar 3, 2025
    Copy the full SHA
    f06d4e7 View commit details

Commits on Mar 4, 2025

  1. kvm: enable CPUID faulting on all VCPUs

    This feature is controlled by an MSR; MSRs are per-CPU.
    
    The Intel SDM doesn't document CPUID faulting, at least as of the Dec 2024
    revision; despite the deleted comment in ring0/kernel_amd64.go, there is no
    Vol. 3 Table 2-43, and every table in Vol. 4 ("Model-Specific Registers") lists
    bit 31 in MSR_PLATFORM_INFO as "reserved". The only documentation seems to be
    that cited by Linux's e9ea1e7f53b85 ("x86/arch_prctl: Add
    ARCH_[GET|SET]_CPUID"): "Intel Virtualization Technology FlexMigration
    Application Note" 323850-004, 2012. This document positions CPUID faulting as
    an alternative way to support cross-CPU migration for VMs that don't use VMX;
    consequently it does not clarify if CPUID faulting is effective in guest ("VMX
    non-root") mode, or if the CPUID VM exit takes precedence. If the former is the
    case then CPUID faulting is probably faster than setting app CPUID with
    KVM_SET_CPUID2, and vice versa. But regardless, this is much simpler.
    
    PiperOrigin-RevId: 733113944
    nixprime authored and gvisor-bot committed Mar 4, 2025
    Copy the full SHA
    2247ace View commit details
  2. urpc: Add logging for requests and responses.

    This helps debugging `runsc` issues involving RPC overload, and helps
    connect multiple `runsc` invocations' logs to their corresponding handling
    in the Sentry.
    
    PiperOrigin-RevId: 733123936
    EtiennePerot authored and gvisor-bot committed Mar 4, 2025
    Copy the full SHA
    18de31b View commit details
  3. Fix spec validation for entrypoint.

    The OCI spec has entrypoint as the first argument in specs.Process.Args.
    During testing, we observed inconsistencies in entrypoint resolution: it
    was resolved during checkpoint but not during restore (or vice versa),
    leading to spec validation failures. This CL corrects this by comparing the
    absolute paths of entrypoints in spec validation.
    
    PiperOrigin-RevId: 733200146
    nybidari authored and gvisor-bot committed Mar 4, 2025
    Copy the full SHA
    c050619 View commit details
Loading