- 20 Apr, 2018 1 commit
-
-
Thomas Petazzoni authored
lxc_monitor.c uses offsetof(), so it should include <stddef.h>. Otherwise the build fails with the musl C library: tools/lxc_monitor.c: In function ‘lxc_abstract_unix_connect’: tools/lxc_monitor.c:324:9: warning: implicit declaration of function ‘offsetof’ [-Wimplicit-function-declaration] offsetof(struct sockaddr_un, sun_path) + len + 1); ^~~~~~~~ tools/lxc_monitor.c:324:18: error: expected expression before ‘struct’ offsetof(struct sockaddr_un, sun_path) + len + 1); ^~~~~~ Signed-off-by:Thomas Petazzoni <thomas.petazzoni@bootlin.com>
-
- 19 Apr, 2018 1 commit
-
-
Christian Brauner authored
lxc-oci: mkdir the download directory
-
- 18 Apr, 2018 4 commits
-
-
Felix Abecassis authored
Signed-off-by:Felix Abecassis <fabecassis@nvidia.com>
-
Serge Hallyn authored
seccomp: handle arch inversion - The Architecture Strikes Back
-
Christian Brauner authored
LXC generates and loads the seccomp-bpf filter in the host/container which spawn the new container. In other words, userspace N is responsible for generating and loading the seccomp-bpf filter which restricts userspace N + 1. Assume 64bit kernel and 32bit userspace running a 64bit container. In this case the 32-bit x86 userspace is used to create a seccomp-bpf filter for a 64-bit userspace. Unless one explicitly adds the 64-bit ABI to the libseccomp filter, or adjusts the default behavior for "BAD_ARCH", *all* 64-bit x86 syscalls will be blocked. Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com> Suggested-by:
Paul Moore <paul@paul-moore.com>
-
Christian Brauner authored
Rename "compat_ctx" to "contexts" and "compat_arch" to "architectures". Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 15 Apr, 2018 3 commits
-
-
Christian Brauner authored
Closes #2280. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 13 Apr, 2018 6 commits
-
-
Stéphane Graber authored
seccomp: handle all errors
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Serge Hallyn authored
Merge pull request #2274 from brauner/2018-04-13/fix_seccomp_with_personality_and_64bit_kernel_32_bit_userspace seccomp: handle arch inversion
-
Christian Brauner authored
This commit deals with different kernel and userspace layouts and nesting. Here are three examples: 1. 64bit kernel and 64bit userspace running 32bit containers 2. 64bit kernel and 32bit userspace running 64bit containers 3. 64bit kernel and 64bit userspace running 32bit containers running 64bit containers Two things to lookout for: 1. The compat arch that is detected might have already been present in the main context. So check that it actually hasn't been and only then add it. 2. The contexts don't need merging if the architectures are the same and also can't be. With these changes I can run all crazy/weird combinations with proper seccomp isolation. Closes #654. Link: https://bugs.chromium.org/p/chromium/issues/detail?id=832366Reported-by:
Chirantan Ekbote <chirantan@chromium.org> Reported-by:
Sonny Rao <sonnyrao@chromium.org> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
conf: fix net type checks in run_script_argv()
-
Jakub Skokan authored
Signed-off-by:Jakub Skokan <jakub.skokan@havefun.cz>
-
- 12 Apr, 2018 3 commits
-
-
Serge Hallyn authored
conf: ret-try devpts mount without gid=5 on error
-
Christian Brauner authored
When starting application containers without a mapping for container root are started, a dummy bind-mount target for lxc-init needs to be created. This will not always work directly under "/" when e.g. permissions are missing due to the ownership and/or mode of "/". We can try to work around this by using the P_tmpdir as defined in POSIX which should usually land us in /tmp where basically everyone can create files. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
We should always default to mounting devpts with gid=5 but we should fallback to mounting without gid=5. This let's us cover use-cases such as container started with only a single mapping e.g.: lxc.idmap = u 1000 1000 1 lxc.idmap = g 1000 1000 1 Closes #2257. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 11 Apr, 2018 3 commits
-
-
Serge Hallyn authored
attach: try to always drop supplementary groups
-
Serge Hallyn authored
rootfs pinning: On NFS, make file hidden but don't delete it
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 10 Apr, 2018 2 commits
-
-
Stéphane Graber authored
attach: always drop supplementary groups
-
Christian Brauner authored
Closes #2248. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 09 Apr, 2018 7 commits
-
-
Christian Brauner authored
Mergeable branch for C0deAi fixes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
C0deAi authored
Closes #2262. Signed-off-by:
C0deAi <techsupport@mycode.ai> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
C0deAi authored
Closes #2262. Signed-off-by:
C0deAi <techsupport@mycode.ai> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
C0deAi authored
Value stored is never read. Closes #2262. Signed-off-by:
C0deAi <techsupport@mycode.ai> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Closes #1704. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fix compilation with static libcap and shared gnutls
-
- 07 Apr, 2018 1 commit
-
-
Fabrice Fontaine authored
Commit c06ed219 has broken compilation with a static libcap and a shared gnutls. This results in a build failure on init_lxc_static if gnutls is a shared library as init_lxc_static is built with -all-static option (see src/lxc/Makefile.am) and AC_CHECK_LIB adds gnutls to LIBS. This commit fix the issue by removing default behavior of AC_CHECK_LIB and handling manually GNUTLS_LIBS and HAVE_LIBGNUTLS Fixes: - http://autobuild.buildroot.net/results/b655d6853c25a195df28d91512b3ffb6c654fc90Signed-off-by:
Fabrice Fontaine <fontaine.fabrice@gmail.com>
-
- 06 Apr, 2018 4 commits
-
-
Christian Brauner authored
Fix temp file creation
-
Christian Brauner authored
lxc_make_tmpfile() uses mkstemp() internally, and thus expects the template to contain 'XXXXXX' and be writable. Signed-off-by:
Thomas Moschny <thomas.moschny@gmx.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
lxc_make_tmpfile() uses mkstemp() internally, and thus expects the template to contain 'XXXXXX' and be writable. Signed-off-by:
Thomas Moschny <thomas.moschny@gmx.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Guido Jäkel authored
On NFS, avoid random names of the root pin file due to "NFS silly renaming" but use a fixed hidden name instead.
-
- 05 Apr, 2018 1 commit
-
-
Serge Hallyn authored
fix signal sending in lxc.init
-
- 04 Apr, 2018 1 commit
-
-
Tycho Andersen authored
The problem here is that these two clauses were ordered backwards: we first check if the signal came from not the init pid, and if it did, then we give a notice and return. The comment notes that this is intended to protect against SIGCHLD, but we don't in fact know if the signal is a SIGCHLD yet, because that's tested in the next hunk. The symptom is that if I e.g. send SIGTERM from the outside world to the container init, it ignores it and gives this notice. If we re-order these clauses, it forwards non SIGCHLD signals, and ignores SIGCHLD signals from things that aren't the real container process. Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
- 03 Apr, 2018 2 commits
-
-
Christian Brauner authored
doc: Tweak Japanese translation in lxc.container.conf(5)
-
KATOH Yasufumi authored
Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
- 02 Apr, 2018 1 commit
-
-
Christian Brauner authored
-