- 01 Apr, 2020 1 commit
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 31 Mar, 2020 1 commit
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 30 Mar, 2020 7 commits
-
-
Stéphane Graber authored
cgroups: handle older kernels (e.g. v4.9)
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
On olders kernels the restrictions to move processes between cgroups are different than they are on newer kernels. Specifically, we're running into the following check: if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) && !uid_eq(cred->euid, tcred->uid) && !uid_eq(cred->euid, tcred->suid)) ret = -EACCES; which dictates that in order to move a process into a cgroup one either needs to be global root (no restrictions apply) or the effective uid of the process trying to move the process and the {saved}uid of the process that is supposed to be moved need to be identical. The new attaching logic we did didn't fulfill this criterion for because it's not present on new kernels. Closes https://github.com/lxc/lxd/issues/7104. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
verify cgroup controller name
-
Wolfgang Bumiller authored
validate that a cgroup controller name is a valid zero-terminated string before passing it to `cgroup_ops->get_cgroup()`. Signed-off-by:Wolfgang Bumiller <w.bumiller@proxmox.com>
-
- 28 Mar, 2020 7 commits
-
-
Stéphane Graber authored
tree-wide: fixes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Cc: cenxianlong <cenxianlong@huawei.com> Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
monitor process exited by signal SIGKILL, clean cgroup resource by th…
-
Stéphane Graber authored
cgroups: please compilers
-
cenxianlong authored
Writing the value 0 to a cgroup.procs file causes the writing process to be moved to the corresponding cgroup Signed-off-by:cenxianlong <cenxianlong@huawei.com>
-
- 27 Mar, 2020 18 commits
-
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
cgroups: use hidden directory for attaching cgroup
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
conf: simplify userns_exec_minimal()
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
attach: fixes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
This reverts commit ba7ca43b. Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
tree-wide: fixes
-
Wolfgang Bumiller authored
Particularly important for lxc_cmd_handler() handles client input and should not be capable of canceling the main loop, some syscall return values leaked through overlapping with LXC_MAINLOOP_ERROR, causing unauthorized clients connecting to the command socket to shutdown the main loop. In turn, signal_handler() receiving unexpected `signalfd_siginfo` struct sizes seems like a reason to bail (since it's a kernel interface). Signed-off-by:
Wolfgang Bumiller <w.bumiller@proxmox.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
There's a fundamental problem with futexes and setid calls and the go runtime. POSIX requires that when one thread setids all threas must setids and it uses futexes and signals to synchronize the state across threads. This causes deadlocks which means we can't use the pretty solution I first implemented. Instead we need to chown after we create the directory. I might come up with something smarter later but for now this will do. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
conf: rework and fix leak in userns_exec_1()
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
We didn't account for cgroup_attach() succeeding and just tried to attach to the same cgroup again which doesn't make sense. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
- 26 Mar, 2020 6 commits
-
-
Stéphane Graber authored
cgroups: fix attaching to the unified cgroup
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
tree-wide: fixes
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-