- 20 May, 2018 1 commit
-
-
Christian Brauner authored
When using the LXC API multi-thread and users initialize a log: struct lxc_log log; log.name = "my-log"; lxc_log_init(&log); all threads will have the same "my-log" prefix even though thy might call lxc_container_new() in separate threads. There is currently no easy way to handle per-thread container name prefixes. To handle this carry a reference to the name of the container in struct lxc_conf and if no log.name was set, use it by default. This way each thread will get the container it is currently working on as a log-prefix. Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com> Reported-by:
duguhaotian <duguhaotian@gmail.com>
-
- 16 May, 2018 4 commits
-
-
Christian Brauner authored
Fixed resource leak in is_wlan() at network.c
-
Christian Brauner authored
Fixed resource leak in userns_exec_full()
-
Serge Hallyn authored
capabilities: raise ambient capabilities
-
Christian Brauner authored
Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com> Suggested-by:
Jonathan Calmels <jcalmels@nvidia.com>
-
- 15 May, 2018 13 commits
-
-
Stéphane Graber authored
config: allow read-write /sys in user namespace
-
Stéphane Graber authored
coverity
-
Christian Brauner authored
coverity: #1425844
-
Christian Brauner authored
Unprivileged containers can safely mount /sys as read-write. This also allows systemd-udevd to be started in unprivileged containers. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Simos Xenitellis authored
Resource leak Signed-off-by:Simos Xenitellis <simos.lists@googlemail.com>
-
Simos Xenitellis authored
Resource leak Signed-off-by:Simos Xenitellis <simos.lists@googlemail.com>
-
Simos Xenitellis authored
Resource leak Signed-off-by:Simos Xenitellis <simos.lists@googlemail.com>
-
Christian Brauner authored
Resource leak Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Resource leak Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Resource leak Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Update Japanese man pages
-
KATOH Yasufumi authored
fix "kB" to "KB", and tweak description. Update for commit 6d276edc and 6d276edc . Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-
KATOH Yasufumi authored
Update for commit 4160ef02Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-
- 11 May, 2018 12 commits
-
-
Stéphane Graber authored
tools: s/strncpy()/memcpy()/g
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
This reverts commit 2ec47d51. First, I forgot to actually replace strncpy() with strlcpy(). Second, we don't want to \0-terminate since this is an abstract unix socket and this is not required. Instead, let's simply use memcpy() which is more correct and also silences gcc-8. Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
tools: s/strncpy()/strlcpy()/g
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
tree-wide: s/strncpy()/strlcpy()/g
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
support case ignored suffix for sizes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
l00355512 authored
suffix of console max size and console buffer max size Signed-off-by:l00355512 <liuhao27@huawei.com>
-
- 10 May, 2018 10 commits
-
-
Stéphane Graber authored
gcc-8: silence
-
Christian Brauner authored
The additional \0-byte space added is not needed since IFNAMSIZ needs to include the \0-byte. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
confile: satisfy gcc-8
-
Christian Brauner authored
Apparently -Werror=stringop-overflow will trigger an error here even though this is completely valid since we now that we're definitely copying a \0-byte. Work around this gcc-8 quirk by using memcpy(). This shouldn't trigger the warning. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
coverity + code removal
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Dereference after null check userns_exec_{1,full} are called from functions that might not have a conf. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Time of check time of use Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Argument cannot be negative Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-