1. 02 Dec, 2019 8 commits
  2. 08 Oct, 2019 1 commit
  3. 11 Aug, 2019 24 commits
  4. 27 Jun, 2019 1 commit
  5. 21 Jun, 2019 1 commit
  6. 20 Jun, 2019 2 commits
  7. 18 Jun, 2019 3 commits
    • lxc.pc.in: add libs.private for static linking · a8c9620f
      Serge Hallyn authored
      None of them seem to support pkg-config themselves, else we could add
      them to Requires.private.
      Signed-off-by: 's avatarSerge Hallyn <shallyn@cisco.com>
    • Fixed file descriptor leak for network namespace · d8337fde
      Rachid Koucha authored
      In privileged mode, the container startup looses a file descriptor for "handler->nsfd[LX_NS_NET]". At line 1782, we preserve the namespaces file descriptor (in privileged mode, the network namespace is also preserved) :
      	for (i = 0; i < LXC_NS_MAX; i++)
      		if (handler->ns_on_clone_flags & ns_info[i].clone_flag)
      			INFO("Cloned %s", ns_info[i].flag_name);
      
      	if (!lxc_try_preserve_namespaces(handler, handler->ns_on_clone_flags, handler->pid)) {
      		ERROR("Failed to preserve cloned namespaces for lxc.hook.stop");
      		goto out_delete_net;
      	}
      
      Then at line 1830, we preserve one more time the network namespace :
      		ret = lxc_try_preserve_ns(handler->pid, "net");
      		if (ret < 0) {
      			if (ret != -EOPNOTSUPP) {
      				SYSERROR("Failed to preserve net namespace");
      				goto out_delete_net;
      			}
      The latter overwrites the file descriptor already stored in handler->nsfd[LXC_NS_NET] at line 1786.
      
      So, this fix checks that the entry is not already filled.
      Signed-off-by: 's avatarRachid Koucha <rachid.koucha@gmail.com>
    • network: fix lxc_netdev_rename_by_index() · 5a631a2f
      Christian Brauner authored
      Return an error code when the name is invalid instead of pretending that things
      are fine.
      
      Closes #3044.
      Signed-off-by: 's avatarChristian Brauner <christian.brauner@ubuntu.com>