- 03 Jul, 2019 9 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
cgroups: hande cpuset initialization race
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
network: remove faulty restriction
-
Christian Brauner authored
Reported-by:
Thomas Parrott <thomas.parrott@canonical.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 02 Jul, 2019 5 commits
-
-
Stéphane Graber authored
start: unify network creation
-
Christian Brauner authored
Closes #3066. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Make sure that network creation happens at the same time for containers started by privileged and unprivileged users. The only reason we didn't do this so far was to avoid sending network device ifindices around in the privileged case. Link: https://github.com/lxc/lxc/issues/3066Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
bugfixes
-
Stéphane Graber authored
lxccontainer: rework seccomp notify api function
-
- 30 Jun, 2019 1 commit
-
-
Christian Brauner authored
Move code/variable in smaller scope
-
- 29 Jun, 2019 1 commit
-
-
Rachid Koucha authored
In start.c, do not fill path[] table if not necessary Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
- 28 Jun, 2019 2 commits
-
-
Christian Brauner authored
fix memory leak in do_storage_create
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 27 Jun, 2019 12 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
cgfsng: fix memory leak in lxc_cpumask_to_cpulist
-
LiFeng authored
Signed-off-by:LiFeng <lifeng68@huawei.com>
-
- 21 Jun, 2019 1 commit
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 20 Jun, 2019 4 commits
-
-
Stéphane Graber authored
cgfsng: write cpuset.mems of correct ancestor
-
Christian Brauner authored
Reported-by:
Free Ekanayaka <free.ekanayaka@canonical.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
parse.c: fix fd leak from memfd_create
-
t00416110 authored
Signed-off-by:t00416110 <tanyifeng1@huawei.com>
-
- 18 Jun, 2019 2 commits
-
-
Christian Brauner authored
lxc.pc.in: add libs.private for static linking
-
Serge Hallyn authored
None of them seem to support pkg-config themselves, else we could add them to Requires.private. Signed-off-by:Serge Hallyn <shallyn@cisco.com>
-
- 16 Jun, 2019 1 commit
-
-
Christian Brauner authored
Fixed file descriptor leak for network namespace
-
- 15 Jun, 2019 2 commits
-
-
Rachid Koucha authored
In privileged mode, the container startup looses a file descriptor for "handler->nsfd[LX_NS_NET]". At line 1782, we preserve the namespaces file descriptor (in privileged mode, the network namespace is also preserved) : for (i = 0; i < LXC_NS_MAX; i++) if (handler->ns_on_clone_flags & ns_info[i].clone_flag) INFO("Cloned %s", ns_info[i].flag_name); if (!lxc_try_preserve_namespaces(handler, handler->ns_on_clone_flags, handler->pid)) { ERROR("Failed to preserve cloned namespaces for lxc.hook.stop"); goto out_delete_net; } Then at line 1830, we preserve one more time the network namespace : ret = lxc_try_preserve_ns(handler->pid, "net"); if (ret < 0) { if (ret != -EOPNOTSUPP) { SYSERROR("Failed to preserve net namespace"); goto out_delete_net; } The latter overwrites the file descriptor already stored in handler->nsfd[LXC_NS_NET] at line 1786. So, this fix checks that the entry is not already filled. Signed-off-by:Rachid Koucha <rachid.koucha@gmail.com>
-
Serge Hallyn authored
[RFC\ Switch from gnutls to openssl for sha1
-