Reformat table.

This commit is contained in:
Adam Ierymenko 2015-11-23 10:11:46 -08:00
parent 6e5feaba3a
commit 1e4a40e772

View file

@ -15,7 +15,6 @@ When an RPC for a socket() is received by the Netcon service from the intercepte
Upon the first call to a intercept-overriden system call, a Unix-domain socket is opened between the Netcon service and the application's intercept. This socket provides us the ability to pass file descriptors of newly-created socketpairs to the intercept (used as the read/write buffer). More specifically, after the socketpair creation, one end is kept in a table entry in Netcon and one end is sent to the intercept.
### Building from Source (and Installing)
Build zerotier-intercept library:
@ -115,7 +114,6 @@ Future:
- Added logic (RPC_MAP_REQ) to check whether a given AF_LOCAL socket is mapped to anything
inside the service instance.
20151027 Added Redis-server support:
- Added extra logic to detect socket re-issuing and consequent service-side double mapping.
@ -123,7 +121,6 @@ Future:
a result, Redis will close the socket and re-open it. The server will now test for closures
during mapping and will eliminate any mappings to broken pipes.
20151021 Added Node.js support:
- syscall(long number, ...) is now intercepted and re-directs the __NR_accept4 call to our intercepted accept4() function
@ -140,6 +137,3 @@ Future:
- Careful attention should be given to how arguments are passed in the intercepted syscall() function, this differs for
32/64-bit systems