- 07 Feb, 2018 1 commit
-
-
l00415420 authored
Set the same environment variables that were used when starting the container when attaching to the container. Signed-off-by:
LiFeng <lifeng68@huawei.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 06 Feb, 2018 2 commits
-
-
Serge Hallyn authored
cgroups: add unified hierarchy support
-
Serge Hallyn authored
tools: add UNPRIVILEGED field in fancy output mode
-
- 05 Feb, 2018 5 commits
-
-
Serge Hallyn authored
Sigterm handling
-
Christian Brauner authored
lxc-init: use SIGKILL after alarm timeout
-
Tycho Andersen authored
see comment for details. Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
Tycho Andersen authored
For the ->execute() case, we want to make sure the application dies when SIGHUP is received. The next patch will ignore SIGHUP in the lxc monitor, because tasks inside the container send SIGHUP to init to have it reload its config sometimes, and we don't want to do that with init.lxc, since it might actually kill the container if it forwards SIGHUP to the child and the child can't handle it. Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
Tycho Andersen authored
d76e3e1a inadvertently switched the alarm timeout from sigterm to sigkill. We really want sigkill here, so let's bring it back. Signed-off-by:
Tycho Andersen <tycho@tycho.ws>
-
- 02 Feb, 2018 2 commits
-
-
Christian Brauner authored
hooks: change the semantic of NVIDIA_VISIBLE_DEVICES=""
-
Felix Abecassis authored
With LXC, you can override the value of an environment variable to null, but you can't unset an existing variable. The NVIDIA hook was previously activated when NVIDIA_VISIBLE_DEVICES was set to null. As a result, it was not possible to disable the hook by overriding the environment variable in the configuration. The hook can now be disabled by setting NVIDIA_VISIBLE_DEVICES to null or to the new special value "void". Signed-off-by:Felix Abecassis <fabecassis@nvidia.com>
-
- 01 Feb, 2018 5 commits
-
-
Christian Brauner authored
debian: We must use iproute on wheezy
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
lsm: do not #ifdefine
-
Christian Brauner authored
Since we stopped linking against AppArmor we can now remove the conditional compilation. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Serge Hallyn authored
tools: make "-n" optional
-
- 31 Jan, 2018 8 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 30 Jan, 2018 2 commits
-
-
Stéphane Graber authored
confile_legacy: fix legacy network parser
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 29 Jan, 2018 1 commit
-
-
Serge Hallyn authored
lsm: simplifcations
-
- 27 Jan, 2018 5 commits
-
-
Christian Brauner authored
This lets users use the tools with "lxc-* -n <container-name>" or "lxc-* <container-name>". Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
seccomp.c: Use return instead of attribution and return
-
Marcos Paulo de Souza authored
Signed-off-by:Marcos Paulo de Souza <marcos.souza.org@gmail.com>
-
Christian Brauner authored
debian: Use iproute2 instead of iproute
-
Stéphane Graber authored
The package has pretty much always been iproute2 with iproute being an alias for it, the alias is now gone so we need to use iproute2. Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
- 26 Jan, 2018 6 commits
-
-
Christian Brauner authored
Unpriv fixups
-
Tycho Andersen authored
Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
Tycho Andersen authored
In particular, if we are already in a user namespace we are unprivileged, and doing things like moving the physical nics back to the host netns won't work. Let's do the same thing LXD does if euid == 0: inspect /proc/self/uid_map and see what that says. Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
Tycho Andersen authored
Consider the case where we're running in a user namespace but in the host's mount ns with the host's filesystem (something like lxc-usernsexec ... lxc-execute ...), in this case, we'll be euid 0, but we can't actually write to /run. Let's improve this locking check to make sure we can actually write to /run before we decide to actually use it as our locking dir. Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
Christian Brauner authored
[cgfsng] show wrong errno
-
duguhaotian authored
lxc_cgroup_set_data: h = get_hierarchy(controller); if h is NULL, now errno is old, it donot set new one. And then, cgfsng_setup_limits: if (lxc_cgroup_set_data(cg->subsystem, cg->value, d)) { if (do_devices && (errno == EACCES || errno == EPERM)) { WARN("Error setting %s to %s for %s", cg->subsystem, cg->value, d->name); continue; } SYSERROR("Error setting %s to %s for %s", cg->subsystem, cg->value, d->name); goto out; } SYSERROR will show old errno, make me confused. Signed-off-by:duguhaotian <duguhaotian@gmail.com>
-
- 24 Jan, 2018 1 commit
-
-
Stéphane Graber authored
bugfixes
-
- 23 Jan, 2018 2 commits
-
-
Christian Brauner authored
network.c: Remove ip_forward_set and callers
-
Marcos Paulo de Souza authored
The last user of ip_forward_set, lxc_ip_forward_on and lxc_ip_forward_off was in 2009: commit 92d38522 Author: Daniel Lezcano <dlezcano@fr.ibm.com> Date: Thu Oct 22 15:33:40 2009 +0200 remove test directory These functions are not called anymore. Signed-off-by:
Marcos Paulo de Souza <marcos.souza.org@gmail.com>
-