- 13 Apr, 2018 5 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Serge Hallyn authored
Merge pull request #2274 from brauner/2018-04-13/fix_seccomp_with_personality_and_64bit_kernel_32_bit_userspace seccomp: handle arch inversion
-
Christian Brauner authored
This commit deals with different kernel and userspace layouts and nesting. Here are three examples: 1. 64bit kernel and 64bit userspace running 32bit containers 2. 64bit kernel and 32bit userspace running 64bit containers 3. 64bit kernel and 64bit userspace running 32bit containers running 64bit containers Two things to lookout for: 1. The compat arch that is detected might have already been present in the main context. So check that it actually hasn't been and only then add it. 2. The contexts don't need merging if the architectures are the same and also can't be. With these changes I can run all crazy/weird combinations with proper seccomp isolation. Closes #654. Link: https://bugs.chromium.org/p/chromium/issues/detail?id=832366Reported-by:
Chirantan Ekbote <chirantan@chromium.org> Reported-by:
Sonny Rao <sonnyrao@chromium.org> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
conf: fix net type checks in run_script_argv()
-
Jakub Skokan authored
Signed-off-by:Jakub Skokan <jakub.skokan@havefun.cz>
-
- 12 Apr, 2018 3 commits
-
-
Serge Hallyn authored
conf: ret-try devpts mount without gid=5 on error
-
Christian Brauner authored
When starting application containers without a mapping for container root are started, a dummy bind-mount target for lxc-init needs to be created. This will not always work directly under "/" when e.g. permissions are missing due to the ownership and/or mode of "/". We can try to work around this by using the P_tmpdir as defined in POSIX which should usually land us in /tmp where basically everyone can create files. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
We should always default to mounting devpts with gid=5 but we should fallback to mounting without gid=5. This let's us cover use-cases such as container started with only a single mapping e.g.: lxc.idmap = u 1000 1000 1 lxc.idmap = g 1000 1000 1 Closes #2257. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 11 Apr, 2018 3 commits
-
-
Serge Hallyn authored
attach: try to always drop supplementary groups
-
Serge Hallyn authored
rootfs pinning: On NFS, make file hidden but don't delete it
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 10 Apr, 2018 2 commits
-
-
Stéphane Graber authored
attach: always drop supplementary groups
-
Christian Brauner authored
Closes #2248. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 09 Apr, 2018 7 commits
-
-
Christian Brauner authored
Mergeable branch for C0deAi fixes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
C0deAi authored
Closes #2262. Signed-off-by:
C0deAi <techsupport@mycode.ai> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
C0deAi authored
Closes #2262. Signed-off-by:
C0deAi <techsupport@mycode.ai> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
C0deAi authored
Value stored is never read. Closes #2262. Signed-off-by:
C0deAi <techsupport@mycode.ai> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Closes #1704. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fix compilation with static libcap and shared gnutls
-
- 07 Apr, 2018 1 commit
-
-
Fabrice Fontaine authored
Commit c06ed219 has broken compilation with a static libcap and a shared gnutls. This results in a build failure on init_lxc_static if gnutls is a shared library as init_lxc_static is built with -all-static option (see src/lxc/Makefile.am) and AC_CHECK_LIB adds gnutls to LIBS. This commit fix the issue by removing default behavior of AC_CHECK_LIB and handling manually GNUTLS_LIBS and HAVE_LIBGNUTLS Fixes: - http://autobuild.buildroot.net/results/b655d6853c25a195df28d91512b3ffb6c654fc90Signed-off-by:
Fabrice Fontaine <fontaine.fabrice@gmail.com>
-
- 06 Apr, 2018 4 commits
-
-
Christian Brauner authored
Fix temp file creation
-
Christian Brauner authored
lxc_make_tmpfile() uses mkstemp() internally, and thus expects the template to contain 'XXXXXX' and be writable. Signed-off-by:
Thomas Moschny <thomas.moschny@gmx.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
lxc_make_tmpfile() uses mkstemp() internally, and thus expects the template to contain 'XXXXXX' and be writable. Signed-off-by:
Thomas Moschny <thomas.moschny@gmx.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Guido Jäkel authored
On NFS, avoid random names of the root pin file due to "NFS silly renaming" but use a fixed hidden name instead.
-
- 05 Apr, 2018 1 commit
-
-
Serge Hallyn authored
fix signal sending in lxc.init
-
- 04 Apr, 2018 1 commit
-
-
Tycho Andersen authored
The problem here is that these two clauses were ordered backwards: we first check if the signal came from not the init pid, and if it did, then we give a notice and return. The comment notes that this is intended to protect against SIGCHLD, but we don't in fact know if the signal is a SIGCHLD yet, because that's tested in the next hunk. The symptom is that if I e.g. send SIGTERM from the outside world to the container init, it ignores it and gives this notice. If we re-order these clauses, it forwards non SIGCHLD signals, and ignores SIGCHLD signals from things that aren't the real container process. Signed-off-by:Tycho Andersen <tycho@tycho.ws>
-
- 03 Apr, 2018 2 commits
-
-
Christian Brauner authored
doc: Tweak Japanese translation in lxc.container.conf(5)
-
KATOH Yasufumi authored
Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
- 02 Apr, 2018 3 commits
-
-
Christian Brauner authored
-
Fengtu Wang authored
Signed-off-by:
Fengtu Wang <wangfengtu@huawei.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
confile: expand lxc.environment
-
- 31 Mar, 2018 1 commit
-
-
Christian Brauner authored
When a bare environment variable is specified then retrieve the value from the current environment. For example, setting lxc.environment = PATH will cause LXC to inherit the value of PATH from the current environment. Suggested-by:
Jonathan Calmels <jcalmels@nvidia.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 30 Mar, 2018 3 commits
-
-
Stéphane Graber authored
bugfixes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
If they aren't available fallback to BSD flock()s. Closes #2245. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 29 Mar, 2018 4 commits
-
-
Christian Brauner authored
lxc-oci: cmd parsing and less verbose umoci
-
Felix Abecassis authored
Signed-off-by:Felix Abecassis <fabecassis@nvidia.com>
-
Felix Abecassis authored
Don't use the -r option of jq, since it will strip the double quotes. Fixes: #2195 Signed-off-by:Felix Abecassis <fabecassis@nvidia.com>
-
Christian Brauner authored
Closes #2241. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-