- 28 Jun, 2019 2 commits
-
-
Christian Brauner authored
fix memory leak in do_storage_create
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 27 Jun, 2019 2 commits
-
-
Christian Brauner authored
cgfsng: fix memory leak in lxc_cpumask_to_cpulist
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 20 Jun, 2019 4 commits
-
-
Stéphane Graber authored
cgfsng: write cpuset.mems of correct ancestor
-
Christian Brauner authored
Reported-by:
Free Ekanayaka <free.ekanayaka@canonical.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
parse.c: fix fd leak from memfd_create
-
t00416110 authored
Signed-off-by:t00416110 <tanyifeng1@huawei.com>
-
- 18 Jun, 2019 2 commits
-
-
Christian Brauner authored
lxc.pc.in: add libs.private for static linking
-
Serge Hallyn authored
None of them seem to support pkg-config themselves, else we could add them to Requires.private. Signed-off-by:Serge Hallyn <shallyn@cisco.com>
-
- 16 Jun, 2019 1 commit
-
-
Christian Brauner authored
Fixed file descriptor leak for network namespace
-
- 15 Jun, 2019 2 commits
-
-
Rachid Koucha authored
In privileged mode, the container startup looses a file descriptor for "handler->nsfd[LX_NS_NET]". At line 1782, we preserve the namespaces file descriptor (in privileged mode, the network namespace is also preserved) : for (i = 0; i < LXC_NS_MAX; i++) if (handler->ns_on_clone_flags & ns_info[i].clone_flag) INFO("Cloned %s", ns_info[i].flag_name); if (!lxc_try_preserve_namespaces(handler, handler->ns_on_clone_flags, handler->pid)) { ERROR("Failed to preserve cloned namespaces for lxc.hook.stop"); goto out_delete_net; } Then at line 1830, we preserve one more time the network namespace : ret = lxc_try_preserve_ns(handler->pid, "net"); if (ret < 0) { if (ret != -EOPNOTSUPP) { SYSERROR("Failed to preserve net namespace"); goto out_delete_net; } The latter overwrites the file descriptor already stored in handler->nsfd[LXC_NS_NET] at line 1786. So, this fix checks that the entry is not already filled. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Serge Hallyn authored
[RFC\ Switch from gnutls to openssl for sha1
-
- 14 Jun, 2019 3 commits
-
-
Stéphane Graber authored
network: fix lxc_netdev_rename_by_index()
-
Christian Brauner authored
Return an error code when the name is invalid instead of pretending that things are fine. Closes #3044. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Serge Hallyn authored
The reason for this is because openssl can be statically linked against, gnutls cannot. Signed-off-by:Serge Hallyn <shallyn@cisco.com>
-
- 13 Jun, 2019 2 commits
-
-
Christian Brauner authored
doc: add a note about shared ns + LSMs to Japanese doc
-
KATOH Yasufumi authored
Update for commit 8de90384Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-
- 12 Jun, 2019 4 commits
-
-
Stéphane Graber authored
seccomp: do not set SECCOMP_FILTER_FLAG_NEW_LISTENER
-
Christian Brauner authored
Centralize hook names
-
Christian Brauner authored
Do not set SECCOMP_FILTER_FLAG_NEW_LISTENER as seccomp attribute. Prior to libseccomp merging support for SECCOMP_RET_USER_NOTIF there was a libseccomp specific attribute that needed to be set before SECCOMP_RET_USER_NOTIF could be used. This has been removed. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Rachid Koucha authored
The hook string names must not be repeated in the source code to facilitate future changes Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 11 Jun, 2019 13 commits
-
-
Stéphane Graber authored
seccomp: add ifdefine for SECCOMP_FILTER_FLAG_NEW_LISTENER
-
Christian Brauner authored
So that we can deal with older kernels. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
seccomp: s/SCMP_FLTATR_NEW_LISTENER/SECCOMP_FILTER_FLAG_NEW_LISTENER/g
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
seccomp: align with upstream libseccomp
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Align with upstream libseccomp. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 07 Jun, 2019 1 commit
-
-
Christian Brauner authored
proposed fix for #2892 - fix lxcbasename in lxc/lxccontainer.c
-
- 06 Jun, 2019 1 commit
-
-
Stéphane Graber authored
start: generate new boot id on container start
-
- 05 Jun, 2019 3 commits
-
-
Christian Brauner authored
Closes #3027. BugLink: https://bugs.launchpad.net/bugs/1831258 Cc: Dimitri John Ledkov <xnox@ubuntu.com> Cc: Scott Moser <smoser@ubuntu.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Paul Romlow authored
Signed-off-by:Paul Romlow <paul@romlow.com>
-
Stéphane Graber authored
cgroups: prevent segfault
-