- 28 Jan, 2019 4 commits
-
-
Stéphane Graber authored
conf: check for successful mount entry parse
-
Christian Brauner authored
doc: Add lxc.seccomp.allow_nesting to Japanese lxc.container.conf(5)
-
KATOH Yasufumi authored
Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
Serge Hallyn authored
compiler: remove deprecated and unneeded header
-
- 27 Jan, 2019 15 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
/etc/resolv.conf grows indefinitely
-
Rachid Koucha authored
This file grows indefinitely : upon each DHCP lease renew, the "nameserver ..dns..." line is added at the end of the file. Make a "grep" in the file to make sure that the same line does not already exist. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Otherwise musl's getmntent_r() parser will fail. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Create /var/run
-
Rachid Koucha authored
Some programs like "who" need this directory to work (this permits the of /var/run/utmp file). Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Use BUSYBOX_EXE variable in configure_busybox()
-
Rachid Koucha authored
As "which busybox" is stored in BUSYBOX_EXE global variable at startup, use it wherever it is needed. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Since liblxc is completely in control of the mount entry file we should only consider a parse successful when EOF is reached. Closes #2798. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Installation of default.script for udhcpc
-
Rachid Koucha authored
The busybox template installs default.script in /usr/share/udhcpc/. But the pathname of "default.script" may vary from one busybox build to another. As the pathname is displayed in udhcpc's help, grab it from it. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Add template-options to help output
-
Christian Brauner authored
Avoid hardcoded string length
-
Rachid Koucha authored
Use strlen() on "state" variable instead of harcoded value 6. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 26 Jan, 2019 6 commits
-
-
Christian Brauner authored
Avoid risk of "too far memory read"
-
Christian Brauner authored
Avoid double lxc-freeze/unfreeze
-
Rachid Koucha authored
As we call "lxc_add_state_client(fd, handler, (lxc_state_t *)req->data)" which supposes that the last parameter is a table of MAX_STATE entries when calling memcpy(): memcpy(newclient->states, states, sizeof(newclient->states)) Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Christian Brauner authored
Update freezer.c
-
Rachid Koucha authored
If we call lxc-freeze multiple times for an already frozen container, LXC triggers useless freezing by writing into the "freezer.state" cgroup file. This is the same when we call lxc-unfreeze multiple times. Checking the current state with a LXC_CMD_GET_STATE (calling c->state) would permit to check if the container is FROZEN or not. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Rachid Koucha authored
Suppressed hard coded values for state and array's maximum index. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 21 Jan, 2019 4 commits
-
-
Wolfgang Bumiller authored
Revert "seccomp: add rules for specified architecture only"
-
Christian Brauner authored
This reverts commit f1bcfc79. The reverted branch breaks starting all seccomp confined containers. Not even a containers with our standard seccomp profile starts correctly. This is strong evidence that these changes have never been tested even with a standard workload. That is unacceptable! We are still happy to merge that feature but going forward we want tests that verify that standard workloads and new features work correctly. seccomp is a crucial part of our security story and I will not let the be compromised by missing tests! Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
seccomp: add rules for specified architecture only
-
LiFeng authored
If the architecture is specified in the seccomp configuration, like: ``` 2 whitelist errno 1 [x86_64] accept allow accept4 allow ``` We shoud add rules only for amd64 instead of add rules for x32/i386/amd64. 1. If the [arch] was not specified in seccomp config, add seccomp rules for all all compat architectures. 2. If the [arch] specified in seccomp config irrelevant to native host arch, the rules will be ignored. 3. If specified [all] in seccomp config, add seccomp rules for all compat architectures. 4. If specified [arch] as same as native host arch, add seccomp rules for the native host arch. 5. If specified [arch] was not native host arch, but compat to host arch, add seccomp rules for the specified arch only, NOT add seccomp rules for native arch. Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 18 Jan, 2019 4 commits
-
-
Christian Brauner authored
Fixing hooks functionality Android where 'sh' is placed under /system
-
Christian Brauner authored
Handle alternative loop device location on Android
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-
ondra authored
Signed-off-by:ondra <ondrak@localhost.localdomain>
-
- 17 Jan, 2019 4 commits
-
-
Christian Brauner authored
conf.c: fix memory leak and mount error
-
Christian Brauner authored
Fix memory leak in cgroup_exit
-
LiFeng authored
Add free memory pointed by struct cgroup_ops *ops Signed-off-by:LiFeng <lifeng68@huawei.com>
-
t00416110 authored
1. cleanup namespace memory 2. fix bug when ro mount not setted, mount propagation will be skipped. Signed-off-by:t00416110 <tanyifeng1@huawei.com>
-
- 16 Jan, 2019 1 commit
-
-
Christian Brauner authored
start: __lxc_start return -1 when start fails
-
- 15 Jan, 2019 1 commit
-
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 11 Jan, 2019 1 commit
-
-
Wolfgang Bumiller authored
network: prefix veth interface name with uid info
-