mirror of
https://github.com/linuxkit/linuxkit.git
synced 2026-04-04 22:10:49 +00:00
```
$ apk -U add procps
$ ps xf
1 ? Ss 0:05 /sbin/init
357 ? Ss 0:00 /bin/sh /etc/init.d/containerd
359 ? Sl 0:00 \_ /usr/bin/containerd
360 ? Ss 0:00 /bin/sh /etc/init.d/containers
432 ? Sl 0:00 \_ /usr/bin/runc run --bundle /containers/daemon/swa
466 ? Ssl 0:00 | \_ /usr/bin/swarmd --containerd-addr=/run/contai
427 ? Sl 0:00 \_ /usr/bin/runc run --bundle /containers/daemon/dhc
457 ? Ss 0:00 | \_ bin/sh /usr/local/bin/start_dhcpcd.sh
474 ? S 0:00 | \_ /sbin/dhcpcd --nobackground
429 ? Sl 0:00 \_ /usr/bin/runc run --bundle /containers/daemon/rng
576 ? Ss 0:00 \_ /bin/tini /usr/sbin/rngd -f
580 ? S 0:00 \_ /usr/sbin/rngd -f
```
becomes
```
$ ps xf
1 ? Ss 0:06 /sbin/init
358 ? Ss 0:00 /bin/sh /etc/init.d/containers
426 ? Sl 0:00 \_ /usr/bin/runc run --bundle /containers/daemon/dhc
458 ? Ss 0:00 | \_ /sbin/dhcpcd --nobackground
431 ? Sl 0:00 \_ /usr/bin/runc run --bundle /containers/daemon/swa
460 ? Ssl 0:00 | \_ /usr/bin/swarmd --containerd-addr=/run/contai
428 ? Sl 0:00 \_ /usr/bin/runc run --bundle /containers/daemon/rng
574 ? Ss 0:00 \_ /bin/tini /usr/sbin/rngd -f
578 ? S 0:00 \_ /usr/sbin/rngd -f
356 ? Ssl 0:00 /usr/bin/containerd
```
Specifically these are gone:
357 ? Ss 0:00 /bin/sh /etc/init.d/containerd
457 ? Ss 0:00 | \_ bin/sh /usr/local/bin/start_dhcpcd.sh
Signed-off-by: Ian Campbell <ian.campbell@docker.com>
Projects
We aim to provide a set of open spaces for collaboration to help move projects towards production. Projects should usually
at a minimum provide a README of how to get started using the project with Moby, and a roadmap document explaining what
the aims are and how to contribute. Most projects will probably provide a way to run the project in a custom Moby build
in its current state, which ideally will be integrated in the Moby CI so there are checks that it builds and runs. Over
time we hope that many projects will graduate into the recommended production defaults, but other projects may remain as
ongoing projects, such as kernel hardening.
If you want to create a project, please submit a pull request to create a new directory here.
Current projects
- Kernel Self Protection Project enhancements
- Mirage SDK privilege separation for userspace services
- Wireguard cryptographic enforced container network separation
- OKernel intra-kernel protection using EPT (HPE)
- eBPF iovisor eBPF tools
- AWS AWS build support
- Swarmd Standalone swarmkit based orchestrator
Current projects not yet documented
- Clear Linux integration (Intel)
- VMWare support (VMWare)
- ARM port and secure boot integration (ARM)