- 05 Feb, 2019 1 commit
-
-
tomponline authored
Closed #1825 Signed-off-by:tomponline <tomp@tomp.uk>
-
- 01 Feb, 2019 3 commits
-
-
Stéphane Graber authored
cgroups: use of /sys/kernel/cgroup/delegate file
-
Stéphane Graber authored
Revert "conf: remove extra MS_BIND with sysfs:mixed"
-
Christian Brauner authored
This file contains the files one needs to chown to successfully delegate cgroup files to unprivileged users. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 31 Jan, 2019 2 commits
-
-
Christian Brauner authored
freezer: non-functional changes
-
Christian Brauner authored
Fix the coding style in a few files. Fixes: db1228b3 ("Avoid hardcoded string length") Fixes: 71fc9c04 ("Avoid risk of "too far memory read"") Fixes: 2341916a ("Avoid double lxc-freeze/unfreeze") Fixes: 9eb9ce3e ("Update freezer.c") Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 29 Jan, 2019 2 commits
-
-
Christian Brauner authored
More accurate error msg for template file
-
Rachid Koucha authored
When calling lxc-create, if the template exists but is not executable, we end with the following error messages which make believe that the template file does not exist when it is merely a execute access problem: lxc-create: ctn00: utils.c: get_template_path: 918 No such file or directory - bad template: /.../lxc-busybox lxc-create: ctn00: lxccontainer.c: do_lxcapi_create: 1786 Unknown template "/.../lxc-busybox" lxc-create: ctn00: tools/lxc_create.c: main: 327 Failed to create container ctn00 Actually internally the errno is lost as the following code triggers a useless access to (strace output): access("/.../lxc-busybox", X_OK) = -1 ENOENT (No such file or directory) With the above fix, we get a more explicit error message when the template file is missing the "execute" bit: lxc-create: bbc: utils.c: get_template_path: 917 Permission denied - Bad template pathname: /tmp/azerty lxc-create: bbc: lxccontainer.c: do_lxcapi_create: 1816 Unknown template "/tmp/azerty" lxc-create: bbc: tools/lxc_create.c: main: 331 Failed to create container bbc With the above fix, we get a more explicit error message when the pathname of the template file is incorrect: lxc-create: bbc: utils.c: get_template_path: 917 No such file or directory - Bad template pathname: /tmp/qwerty lxc-create: bbc: lxccontainer.c: do_lxcapi_create: 1816 Unknown template "/tmp/qwerty" lxc-create: bbc: tools/lxc_create.c: main: 331 Failed to create container bbc Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 28 Jan, 2019 4 commits
-
-
Stéphane Graber authored
conf: check for successful mount entry parse
-
Christian Brauner authored
doc: Add lxc.seccomp.allow_nesting to Japanese lxc.container.conf(5)
-
KATOH Yasufumi authored
Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
Serge Hallyn authored
compiler: remove deprecated and unneeded header
-
- 27 Jan, 2019 15 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
/etc/resolv.conf grows indefinitely
-
Rachid Koucha authored
This file grows indefinitely : upon each DHCP lease renew, the "nameserver ..dns..." line is added at the end of the file. Make a "grep" in the file to make sure that the same line does not already exist. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Otherwise musl's getmntent_r() parser will fail. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Create /var/run
-
Rachid Koucha authored
Some programs like "who" need this directory to work (this permits the of /var/run/utmp file). Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Use BUSYBOX_EXE variable in configure_busybox()
-
Rachid Koucha authored
As "which busybox" is stored in BUSYBOX_EXE global variable at startup, use it wherever it is needed. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Since liblxc is completely in control of the mount entry file we should only consider a parse successful when EOF is reached. Closes #2798. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Installation of default.script for udhcpc
-
Rachid Koucha authored
The busybox template installs default.script in /usr/share/udhcpc/. But the pathname of "default.script" may vary from one busybox build to another. As the pathname is displayed in udhcpc's help, grab it from it. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Add template-options to help output
-
Christian Brauner authored
Avoid hardcoded string length
-
Rachid Koucha authored
Use strlen() on "state" variable instead of harcoded value 6. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 26 Jan, 2019 6 commits
-
-
Christian Brauner authored
Avoid risk of "too far memory read"
-
Christian Brauner authored
Avoid double lxc-freeze/unfreeze
-
Rachid Koucha authored
As we call "lxc_add_state_client(fd, handler, (lxc_state_t *)req->data)" which supposes that the last parameter is a table of MAX_STATE entries when calling memcpy(): memcpy(newclient->states, states, sizeof(newclient->states)) Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Update freezer.c
-
Rachid Koucha authored
If we call lxc-freeze multiple times for an already frozen container, LXC triggers useless freezing by writing into the "freezer.state" cgroup file. This is the same when we call lxc-unfreeze multiple times. Checking the current state with a LXC_CMD_GET_STATE (calling c->state) would permit to check if the container is FROZEN or not. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Rachid Koucha authored
Suppressed hard coded values for state and array's maximum index. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 21 Jan, 2019 4 commits
-
-
Wolfgang Bumiller authored
Revert "seccomp: add rules for specified architecture only"
-
Christian Brauner authored
This reverts commit f1bcfc79. The reverted branch breaks starting all seccomp confined containers. Not even a containers with our standard seccomp profile starts correctly. This is strong evidence that these changes have never been tested even with a standard workload. That is unacceptable! We are still happy to merge that feature but going forward we want tests that verify that standard workloads and new features work correctly. seccomp is a crucial part of our security story and I will not let the be compromised by missing tests! Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
seccomp: add rules for specified architecture only
-
LiFeng authored
If the architecture is specified in the seccomp configuration, like: ``` 2 whitelist errno 1 [x86_64] accept allow accept4 allow ``` We shoud add rules only for amd64 instead of add rules for x32/i386/amd64. 1. If the [arch] was not specified in seccomp config, add seccomp rules for all all compat architectures. 2. If the [arch] specified in seccomp config irrelevant to native host arch, the rules will be ignored. 3. If specified [all] in seccomp config, add seccomp rules for all compat architectures. 4. If specified [arch] as same as native host arch, add seccomp rules for the native host arch. 5. If specified [arch] was not native host arch, but compat to host arch, add seccomp rules for the specified arch only, NOT add seccomp rules for native arch. Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 18 Jan, 2019 3 commits
-
-
Christian Brauner authored
Fixing hooks functionality Android where 'sh' is placed under /system
-
Christian Brauner authored
Handle alternative loop device location on Android
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-