-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Issues: google/gvisor
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
gVisor w/ containerd v2.x
type: enhancement
New feature or request
#11319
opened Dec 23, 2024 by
milantracy
Running KinD in Kubernetes Pod with gVisor RuntimeClass
type: bug
Something isn't working
#11313
opened Dec 20, 2024 by
ericjohansson89
Add option to disable container spec validation when restoring checkpoints
type: enhancement
New feature or request
#11307
opened Dec 18, 2024 by
cweld510
Make it easier to install gVisor in Docker Desktop
type: enhancement
New feature or request
#11238
opened Dec 2, 2024 by
EtiennePerot
Implement /proc/sys/user/max_user_namespaces ?
type: enhancement
New feature or request
#11210
opened Nov 22, 2024 by
Evolto2019
[checklocks]: source file and line number sometimes not printed
status: help wanted
Extra attention is needed
type: bug
Something isn't working
#11203
opened Nov 21, 2024 by
kahing
ACK lost when GSO enabled
area: networking
Issue related to networking
type: bug
Something isn't working
#11198
opened Nov 20, 2024 by
GerardGarcia
Sandbox process continues emitting logs to Something isn't working
boot
logs after sandbox has booted and user container has started
type: bug
#11168
opened Nov 12, 2024 by
jseba
Avoid sending a signal to the containers during checkpointing
type: enhancement
New feature or request
#11162
opened Nov 10, 2024 by
dawei-sdw
Add support for O_TMPFILE
type: bug
Something isn't working
#11143
opened Nov 8, 2024 by
BinaryKhaos
Update kernel version reported by uname -r
type: enhancement
New feature or request
#11117
opened Nov 4, 2024 by
thundergolfer
MSSQL container fails due to missing syscal argument
area: compatibility
Issue related to (Linux) kernel compatibility
type: bug
Something isn't working
#11112
opened Nov 4, 2024 by
liron-l
Networking: implement traffic shaping (throttle/rate limit) directly in gVisor
type: enhancement
New feature or request
#11109
opened Nov 3, 2024 by
norbjd
Support for GPU checkpointing in nvproxy
area: gpu
Issue related to sandboxed GPU access
type: enhancement
New feature or request
#11095
opened Oct 31, 2024 by
cweld510
What is gVisor? -- explain where runsc is at in the diagram...
#11088
opened Oct 29, 2024 by
JustinCappos
sshfs uses /dev/fuse, but got segmentation fault
type: bug
Something isn't working
#11086
opened Oct 27, 2024 by
iamryanchia
Starting GPU container with rootless runsc: operation not permitted
area: gpu
Issue related to sandboxed GPU access
type: bug
Something isn't working
#11076
opened Oct 22, 2024 by
sfc-gh-lshi
alternatives to readv() and writev() when the file descriptor is a TUN device
type: enhancement
New feature or request
#11071
opened Oct 22, 2024 by
Lanius-collaris
Discussion: Slack vs Discord vs Gitter
type: enhancement
New feature or request
#11033
opened Oct 13, 2024 by
milantracy
Option to ignore coredump exit codes from the sandboxed container init process
type: enhancement
New feature or request
#11000
opened Oct 7, 2024 by
jseba
Report AVX512_BF16 support in CPUID features
type: enhancement
New feature or request
#10991
opened Oct 4, 2024 by
jseba
PACKET_MMAP version 1/2 improvements
area: networking
Issue related to networking
type: enhancement
New feature or request
#10966
opened Sep 27, 2024 by
kevinGC
FATAL ERROR: error setting up chroot: error remounting chroot in read-only: device or resource busy
type: bug
Something isn't working
#10965
opened Sep 27, 2024 by
nt
Infiniband support
type: enhancement
New feature or request
#10906
opened Sep 13, 2024 by
TheQuantumFractal
Running filebench in gVisor
type: enhancement
New feature or request
#10901
opened Sep 12, 2024 by
Anjali05
Previous Next
ProTip!
Exclude everything labeled
bug
with -label:bug.