- 21 Jan, 2019 2 commits
-
-
Christian Brauner authored
seccomp: add rules for specified architecture only
-
LiFeng authored
If the architecture is specified in the seccomp configuration, like: ``` 2 whitelist errno 1 [x86_64] accept allow accept4 allow ``` We shoud add rules only for amd64 instead of add rules for x32/i386/amd64. 1. If the [arch] was not specified in seccomp config, add seccomp rules for all all compat architectures. 2. If the [arch] specified in seccomp config irrelevant to native host arch, the rules will be ignored. 3. If specified [all] in seccomp config, add seccomp rules for all compat architectures. 4. If specified [arch] as same as native host arch, add seccomp rules for the native host arch. 5. If specified [arch] was not native host arch, but compat to host arch, add seccomp rules for the specified arch only, NOT add seccomp rules for native arch. Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 18 Jan, 2019 4 commits
-
-
Christian Brauner authored
Fixing hooks functionality Android where 'sh' is placed under /system
-
Christian Brauner authored
Handle alternative loop device location on Android
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-
- 17 Jan, 2019 4 commits
-
-
Christian Brauner authored
conf.c: fix memory leak and mount error
-
Christian Brauner authored
Fix memory leak in cgroup_exit
-
LiFeng authored
Add free memory pointed by struct cgroup_ops *ops Signed-off-by:LiFeng <lifeng68@huawei.com>
-
t00416110 authored
1. cleanup namespace memory 2. fix bug when ro mount not setted, mount propagation will be skipped. Signed-off-by:t00416110 <tanyifeng1@huawei.com>
-
- 16 Jan, 2019 1 commit
-
-
Christian Brauner authored
start: __lxc_start return -1 when start fails
-
- 15 Jan, 2019 1 commit
-
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 11 Jan, 2019 1 commit
-
-
Wolfgang Bumiller authored
network: prefix veth interface name with uid info
-
- 10 Jan, 2019 4 commits
-
-
hn authored
Signed-off-by:
Hajo Noerenberg <hajo-github@noerenberg.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
start: handle missing CLONE_NEWCGROUP
-
Christian Brauner authored
If cgroup namespaces are not supported we should just record it in the log and move on. Cc: Ondrej Kubik <ondrej.kubik@canonical.com> Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Wolfgang Bumiller authored
cgroups: try to handle layouts with no cgroups
-
- 08 Jan, 2019 5 commits
-
-
Christian Brauner authored
Cc: Ondrej Kubik <ondrej.kubik@canonical.com> Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixing compile error when compiling for android
-
Ondrej Kubik authored
Signed-off-by:Ondrej Kubik <ondrej.kubik@canonical.com>
-
Christian Brauner authored
trivial fix: unprivileged veth devices (e.g. vethFWABHX) never contain 'Z' char
-
hn authored
fix: unprivileged veth devices (e.g. vethFWABHX) never contain 'Z' character in the randomly generated device name part because for modulo one does not need to substract 1 from strlen(). Signed-off-by:Hajo Noerenberg <hajo-github@noerenberg.de>
-
- 07 Jan, 2019 8 commits
-
-
Stéphane Graber authored
terminal: remove sigwinch command
-
Stéphane Graber authored
storage: do not destroy pre-existing rootfs
-
Stéphane Graber authored
cgfsng: do not free container_full_path on error
-
Stéphane Graber authored
lxccontainer: fix container copy
-
Stéphane Graber authored
confile: add lxc.seccomp.allow_nesting
-
Christian Brauner authored
Closes #2741. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
This adds the lxc.seccomp.allow_nesting api extension. If lxc.seccomp.allow_nesting is set to 1 then seccomp profiles will be stacked. This way nested containers can load their own seccomp policy on top of the policy that the outer container might have applied. Cc: Simon Fels <simon.fels@canonical.com> Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
We need to strip the prefix from the container's source path before trying to update the file. Closes #2380. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 06 Jan, 2019 2 commits
-
-
Christian Brauner authored
Revert "Set c to NULL after freeing it"
-
S.Çağlar Onur authored
Signed-off-by:S.Çağlar Onur <caglar@10ur.org>
-
- 04 Jan, 2019 2 commits
-
-
Christian Brauner authored
conf: use SYSERROR on lxc_write_to_file errors
-
Wolfgang Bumiller authored
Signed-off-by:Wolfgang Bumiller <w.bumiller@proxmox.com>
-
- 26 Dec, 2018 2 commits
-
-
Christian Brauner authored
Set c to NULL after freeing it
-
S.Çağlar Onur authored
Signed-off-by:S.Çağlar Onur <caglar@10ur.org>
-
- 17 Dec, 2018 2 commits
-
-
Stéphane Graber authored
lxccontainer: fix mount api (mount_injection_file)
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 16 Dec, 2018 1 commit
-
-
Christian Brauner authored
Closes #2752. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 13 Dec, 2018 1 commit
-
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-