gvisor/runsc/sandbox
Fabricio Voznika 9f33fe64f2 Fixes to runsc cgroups
When loading cgroups for another process, `/proc/self` was used in
a few places, causing the end state to be a mix of the process
and self. This is now fixes to always use the proper `/proc/[pid]`
path.

Added net_prio and net_cls to the list of optional controllers. This
is to allow runsc to execute then these cgroups are disabled as long
as there are no net_prio and net_cls limits that need to be applied.

Deflake TestMultiContainerEvent.

Closes #5875
Closes #5887

PiperOrigin-RevId: 372242687
2021-05-05 17:39:29 -07:00
..
BUILD Allow runsc to generate coverage reports. 2021-04-16 17:56:16 -07:00
network.go [op] Replace syscall package usage with golang.org/x/sys/unix in runsc/. 2021-03-06 22:07:07 -08:00
network_unsafe.go [op] Replace syscall package usage with golang.org/x/sys/unix in runsc/. 2021-03-06 22:07:07 -08:00
sandbox.go Fixes to runsc cgroups 2021-05-05 17:39:29 -07:00