- 03 Jul, 2019 4 commits
-
-
Stéphane Graber authored
cgroups: hande cpuset initialization race
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
network: remove faulty restriction
-
Christian Brauner authored
Reported-by:
Thomas Parrott <thomas.parrott@canonical.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 02 Jul, 2019 5 commits
-
-
Stéphane Graber authored
start: unify network creation
-
Christian Brauner authored
Closes #3066. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Make sure that network creation happens at the same time for containers started by privileged and unprivileged users. The only reason we didn't do this so far was to avoid sending network device ifindices around in the privileged case. Link: https://github.com/lxc/lxc/issues/3066Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
bugfixes
-
Stéphane Graber authored
lxccontainer: rework seccomp notify api function
-
- 30 Jun, 2019 1 commit
-
-
Christian Brauner authored
Move code/variable in smaller scope
-
- 29 Jun, 2019 1 commit
-
-
Rachid Koucha authored
In start.c, do not fill path[] table if not necessary Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 28 Jun, 2019 2 commits
-
-
Christian Brauner authored
fix memory leak in do_storage_create
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 27 Jun, 2019 12 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
cgfsng: fix memory leak in lxc_cpumask_to_cpulist
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 21 Jun, 2019 1 commit
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 20 Jun, 2019 4 commits
-
-
Stéphane Graber authored
cgfsng: write cpuset.mems of correct ancestor
-
Christian Brauner authored
Reported-by:
Free Ekanayaka <free.ekanayaka@canonical.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
parse.c: fix fd leak from memfd_create
-
t00416110 authored
Signed-off-by:t00416110 <tanyifeng1@huawei.com>
-
- 18 Jun, 2019 2 commits
-
-
Christian Brauner authored
lxc.pc.in: add libs.private for static linking
-
Serge Hallyn authored
None of them seem to support pkg-config themselves, else we could add them to Requires.private. Signed-off-by:Serge Hallyn <shallyn@cisco.com>
-
- 16 Jun, 2019 1 commit
-
-
Christian Brauner authored
Fixed file descriptor leak for network namespace
-
- 15 Jun, 2019 2 commits
-
-
Rachid Koucha authored
In privileged mode, the container startup looses a file descriptor for "handler->nsfd[LX_NS_NET]". At line 1782, we preserve the namespaces file descriptor (in privileged mode, the network namespace is also preserved) : for (i = 0; i < LXC_NS_MAX; i++) if (handler->ns_on_clone_flags & ns_info[i].clone_flag) INFO("Cloned %s", ns_info[i].flag_name); if (!lxc_try_preserve_namespaces(handler, handler->ns_on_clone_flags, handler->pid)) { ERROR("Failed to preserve cloned namespaces for lxc.hook.stop"); goto out_delete_net; } Then at line 1830, we preserve one more time the network namespace : ret = lxc_try_preserve_ns(handler->pid, "net"); if (ret < 0) { if (ret != -EOPNOTSUPP) { SYSERROR("Failed to preserve net namespace"); goto out_delete_net; } The latter overwrites the file descriptor already stored in handler->nsfd[LXC_NS_NET] at line 1786. So, this fix checks that the entry is not already filled. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Serge Hallyn authored
[RFC\ Switch from gnutls to openssl for sha1
-
- 14 Jun, 2019 3 commits
-
-
Stéphane Graber authored
network: fix lxc_netdev_rename_by_index()
-
Christian Brauner authored
Return an error code when the name is invalid instead of pretending that things are fine. Closes #3044. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Serge Hallyn authored
The reason for this is because openssl can be statically linked against, gnutls cannot. Signed-off-by:Serge Hallyn <shallyn@cisco.com>
-
- 13 Jun, 2019 2 commits
-
-
Christian Brauner authored
doc: add a note about shared ns + LSMs to Japanese doc
-
KATOH Yasufumi authored
Update for commit 8de90384Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-