- 29 Jun, 2021 11 commits
-
-
Christian Brauner authored
Fixes: #3881 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Tomasz Blaszczak authored
When an item is added to an array, then the array is realloc()ed (to size+1), and the item is copied (strdup()) to the array. Thus, when an item is removed from an array, allocated memory pointed by the item (not the item itself) should be freed, successive items should be left-shifted and the array realloc()ed again (size-1). Additional changes: - Initialize an array in list_all_containers(). Signed-off-by:Tomasz Blaszczak <tomasz.blaszczak@consult.red>
-
Tomasz Blaszczak authored
and the item is copied (strdup()) to the array. Thus, when an item is removed from an array, memory allocated for that item should be freed, successive items should be left-shifted and the array realloc()ed again (size-1). Additional changes: - If strdup() fails in add_to_array(), then an array should be realloc()ed again to original size. - Initialize an array in list_all_containers(). Signed-off-by:Tomasz Blaszczak <tomasz.blaszczak@consult.red>
-
Christian Brauner authored
Fixes: #3703 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 14 Jun, 2021 5 commits
-
-
Ruben Jenster authored
The LISTEN_FDS environment variable defines the number of file descriptors that should be inherited by the container, in addition to stdio. The LISTEN_FDS environment variable is defined in the OCI spec and used to support socket activation. Refs #3845 Signed-off-by:
Ruben Jenster <r.jenster@drachenfels.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
LiFeng authored
The function lxc_string_split_quoted and lxc_string_split_and_trim use realloc to reduce the memory. But the result may be NULL, the the returned memory will be uninitialized Signed-off-by:LiFeng <lifeng68@huawei.com>
-
Christian Brauner authored
This is needed for lxcri. Fixes: #3862 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
This indicates that LXC supports idmapping the rootfs and idmapped lxc.mount.entry entries. Link: https://github.com/lxc/lxd/issues/8870Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Don't include skipped containers in the failed count. Fixes: #3857 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 08 Jun, 2021 3 commits
-
-
Christian Brauner authored
Link: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1931064Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixes: #3853 Suggested-by:
Tycho Andersen <tycho@tycho.pizza> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Pablo Correa Gómez authored
Closes #3093 Closes #3602 Add support for nftables firewall rules if `nft` command line interface is available in the system Signed-off-by:Pablo Correa Gómez <ablocorrea@hotmail.com>
-
- 28 May, 2021 16 commits
-
-
Christian Brauner authored
Some users report that compilation fails because of reports that this variable can be used uninitialized. Initialize it to silence the compiler. Fixes: https://github.com/lxc/lxc/issues/3850Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixes: Coverity 1484906 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Make sure we catch any weird behavior. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Wei Mingzhi authored
Signed-off-by:Wei Mingzhi <weimingzhi@baidu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 17 May, 2021 1 commit
-
-
Christian Brauner authored
At the prior location we we're placed between sending and receiving networking information over the data socket causing the startup to fail. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 12 May, 2021 4 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixes: #3838 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixes: #3838 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixes: #3836 Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-