- 27 Jan, 2019 5 commits
-
-
Christian Brauner authored
Otherwise musl's getmntent_r() parser will fail. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Since liblxc is completely in control of the mount entry file we should only consider a parse successful when EOF is reached. Closes #2798. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Add template-options to help output
-
Christian Brauner authored
Avoid hardcoded string length
-
Rachid Koucha authored
Use strlen() on "state" variable instead of harcoded value 6. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 26 Jan, 2019 6 commits
-
-
Christian Brauner authored
Avoid risk of "too far memory read"
-
Christian Brauner authored
Avoid double lxc-freeze/unfreeze
-
Rachid Koucha authored
As we call "lxc_add_state_client(fd, handler, (lxc_state_t *)req->data)" which supposes that the last parameter is a table of MAX_STATE entries when calling memcpy(): memcpy(newclient->states, states, sizeof(newclient->states)) Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Update freezer.c
-
Rachid Koucha authored
If we call lxc-freeze multiple times for an already frozen container, LXC triggers useless freezing by writing into the "freezer.state" cgroup file. This is the same when we call lxc-unfreeze multiple times. Checking the current state with a LXC_CMD_GET_STATE (calling c->state) would permit to check if the container is FROZEN or not. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Rachid Koucha authored
Suppressed hard coded values for state and array's maximum index. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 21 Jan, 2019 4 commits
-
-
Wolfgang Bumiller authored
Revert "seccomp: add rules for specified architecture only"
-
Christian Brauner authored
This reverts commit f1bcfc79. The reverted branch breaks starting all seccomp confined containers. Not even a containers with our standard seccomp profile starts correctly. This is strong evidence that these changes have never been tested even with a standard workload. That is unacceptable! We are still happy to merge that feature but going forward we want tests that verify that standard workloads and new features work correctly. seccomp is a crucial part of our security story and I will not let the be compromised by missing tests! Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
seccomp: add rules for specified architecture only
-
LiFeng authored
If the architecture is specified in the seccomp configuration, like: ``` 2 whitelist errno 1 [x86_64] accept allow accept4 allow ``` We shoud add rules only for amd64 instead of add rules for x32/i386/amd64. 1. If the [arch] was not specified in seccomp config, add seccomp rules for all all compat architectures. 2. If the [arch] specified in seccomp config irrelevant to native host arch, the rules will be ignored. 3. If specified [all] in seccomp config, add seccomp rules for all compat architectures. 4. If specified [arch] as same as native host arch, add seccomp rules for the native host arch. 5. If specified [arch] was not native host arch, but compat to host arch, add seccomp rules for the specified arch only, NOT add seccomp rules for native arch. Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 18 Jan, 2019 4 commits
-
-
Christian Brauner authored
Fixing hooks functionality Android where 'sh' is placed under /system
-
Christian Brauner authored
Handle alternative loop device location on Android
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-
- 17 Jan, 2019 4 commits
-
-
Christian Brauner authored
conf.c: fix memory leak and mount error
-
Christian Brauner authored
Fix memory leak in cgroup_exit
-
LiFeng authored
Add free memory pointed by struct cgroup_ops *ops Signed-off-by:LiFeng <lifeng68@huawei.com>
-
t00416110 authored
1. cleanup namespace memory 2. fix bug when ro mount not setted, mount propagation will be skipped. Signed-off-by:t00416110 <tanyifeng1@huawei.com>
-
- 16 Jan, 2019 1 commit
-
-
Christian Brauner authored
start: __lxc_start return -1 when start fails
-
- 15 Jan, 2019 1 commit
-
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 11 Jan, 2019 1 commit
-
-
Wolfgang Bumiller authored
network: prefix veth interface name with uid info
-
- 10 Jan, 2019 4 commits
-
-
hn authored
Signed-off-by:
Hajo Noerenberg <hajo-github@noerenberg.de> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
start: handle missing CLONE_NEWCGROUP
-
Christian Brauner authored
If cgroup namespaces are not supported we should just record it in the log and move on. Cc: Ondrej Kubik <ondrej.kubik@canonical.com> Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Wolfgang Bumiller authored
cgroups: try to handle layouts with no cgroups
-
- 08 Jan, 2019 5 commits
-
-
Christian Brauner authored
Cc: Ondrej Kubik <ondrej.kubik@canonical.com> Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Fixing compile error when compiling for android
-
Ondrej Kubik authored
Signed-off-by:Ondrej Kubik <ondrej.kubik@canonical.com>
-
Christian Brauner authored
trivial fix: unprivileged veth devices (e.g. vethFWABHX) never contain 'Z' char
-
hn authored
fix: unprivileged veth devices (e.g. vethFWABHX) never contain 'Z' character in the randomly generated device name part because for modulo one does not need to substract 1 from strlen(). Signed-off-by:Hajo Noerenberg <hajo-github@noerenberg.de>
-
- 07 Jan, 2019 5 commits
-
-
Stéphane Graber authored
terminal: remove sigwinch command
-
Stéphane Graber authored
storage: do not destroy pre-existing rootfs
-
Stéphane Graber authored
cgfsng: do not free container_full_path on error
-
Stéphane Graber authored
lxccontainer: fix container copy
-
Stéphane Graber authored
confile: add lxc.seccomp.allow_nesting
-