mirror of
https://github.com/checkpoint-restore/criu.git
synced 2026-01-23 10:16:41 +00:00
CAP_CHECKPOINT_RESTORE does not give access to /proc/$pid/map_files in user namespaces. In order to test that CRIU in unprivileged mode can dump and restore anonymous shared memory pages we will run the maps00 tests in a user namespace. Signed-off-by: Younes Manton <ymanton@ca.ibm.com> |
||
|---|---|---|
| .. | ||
| build | ||
| ci | ||
| nmk | ||
| crit-setup.py | ||
| criu-ns | ||
| fake-restore.sh | ||
| feature-tests.mak | ||
| fetch-clang-format.sh | ||
| flake8.cfg | ||
| install-criu-image-streamer.sh | ||
| install-debian-pkgs.sh | ||
| magic-gen.py | ||
| protobuf-gen.sh | ||
| systemd-autofs-restart.sh | ||
| tmp-files.sh | ||