containerd/sys
Claudia Beresford 544b985ff2 Don't fail on setting -ve oom score when rootless
This allows non-privileged users to use containerd.
If a non root user tried to set a negative oom score adjustment,
it will fail. Containerd should not fail if running rootless.

This is part of a larger track of work integrating containerd
into Cloudfoundry's garden with support for rootless.

[#156343443]

Signed-off-by: Danail Branekov <danailster@gmail.com>
2018-05-04 17:06:01 +01:00
..
env.go Don't fail on setting -ve oom score when rootless 2018-05-04 17:06:01 +01:00
epoll.go Licence header added 2018-02-19 10:32:26 +09:00
fds.go Licence header added 2018-02-19 10:32:26 +09:00
filesys_unix.go Licence header added 2018-02-19 10:32:26 +09:00
filesys_windows.go Licence header added 2018-02-19 10:32:26 +09:00
oom_unix_test.go Don't fail on setting -ve oom score when rootless 2018-05-04 17:06:01 +01:00
oom_unix.go Don't fail on setting -ve oom score when rootless 2018-05-04 17:06:01 +01:00
oom_windows.go Licence header added 2018-02-19 10:32:26 +09:00
proc.go Licence header added 2018-02-19 10:32:26 +09:00
reaper.go Licence header added 2018-02-19 10:32:26 +09:00
socket_unix.go Fix typo in CreateUnixSocket error message 2018-03-30 13:14:55 -07:00
socket_windows.go Licence header added 2018-02-19 10:32:26 +09:00
stat_bsd.go Licence header added 2018-02-19 10:32:26 +09:00
stat_unix.go Licence header added 2018-02-19 10:32:26 +09:00