1. 08 Jul, 2021 2 commits
  2. 05 Jul, 2021 11 commits
  3. 01 Jul, 2021 6 commits
    • Merge pull request #3891 from brauner/2021-07-01.fixes · a0f38dbf
      Stéphane Graber authored
      cgroups: handle funky cgroup layouts
    • Merge pull request #3892 from brauner/2021-07-01.fixes.2 · d31bfd24
      Stéphane Graber authored
      terminal: ensure newlines are turned into newlines+carriage return fo…
    • Merge pull request #3893 from brauner/2021-07-01.fixes.3 · 161b0ff4
      Stéphane Graber authored
      cmd/lxc-checkconfig: list cgroup namespaces and rename confusing ns_c…
    • cgroups: handle funky cgroup layouts · f4afdfbe
      Christian Brauner authored
      Old versions of Docker emulate a cgroup namespace by bind-mounting the
      container's cgroup over the corresponding controller:
      
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/systemd rw,nosuid,nodev,noexec,relatime master:11 - cgroup cgroup rw,xattr,name=systemd
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/net_cls,net_prio rw,nosuid,nodev,noexec,relatime master:15 - cgroup cgroup rw,net_cls,net_prio
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/cpu,cpuacct rw,nosuid,nodev,noexec,relatime master:16 - cgroup cgroup rw,cpu,cpuacct
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/memory rw,nosuid,nodev,noexec,relatime master:17 - cgroup cgroup rw,memory
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/devices rw,nosuid,nodev,noexec,relatime master:18 - cgroup cgroup rw,devices
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/hugetlb rw,nosuid,nodev,noexec,relatime master:19 - cgroup cgroup rw,hugetlb
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/perf_event rw,nosuid,nodev,noexec,relatime master:20 - cgroup cgroup rw,perf_event
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/cpuset rw,nosuid,nodev,noexec,relatime master:21 - cgroup cgroup rw,cpuset
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/blkio rw,nosuid,nodev,noexec,relatime master:22 - cgroup cgroup rw,blkio
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/pids rw,nosuid,nodev,noexec,relatime master:23 - cgroup cgroup rw,pids
      /kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98.scope /sys/fs/cgroup/freezer rw,nosuid,nodev,noexec,relatime master:24 - cgroup cgroup rw,freezer
      
      New versions of LXC always stash a file descriptor for the root of the
      cgroup mount at /sys/fs/cgroup and then resolve the current cgroup
      parsed from /proc/{1,self}/cgroup relative to that file descriptor. This
      doesn't work when the caller's cgroup is mouned over the controllers.
      Older versions of LXC simply counted such layouts as having no cgroups
      available for delegation at all and moved on provided no cgroup limits
      were requested. But mainline LXC would fail such layouts. While I would
      argue that failing such layouts is the semantically clean approach we
      shouldn't regress users so make mainline LXC treat such cgroup layouts
      as having no cgroups available for delegation.
      
      Fixes: #3890
      Signed-off-by: 's avatarChristian Brauner <christian.brauner@ubuntu.com>
  4. 30 Jun, 2021 4 commits
  5. 29 Jun, 2021 8 commits
  6. 28 Jun, 2021 4 commits
  7. 25 Jun, 2021 1 commit
    • Resize array in remove_from_array() and fix a crash · 5364ae41
      Tomasz Blaszczak authored
      When an item is added to an array, then the array is realloc()ed (to size+1),
      and the item is copied (strdup()) to the array.
      Thus, when an item is removed from an array, allocated memory pointed by
      the item (not the item itself) should be freed, successive items should
      be left-shifted and the array realloc()ed again (size-1).
      
      Additional changes:
      - Initialize an array in list_all_containers().
      Signed-off-by: 's avatarTomasz Blaszczak <tomasz.blaszczak@consult.red>
  8. 23 Jun, 2021 1 commit
  9. 16 Jun, 2021 2 commits
  10. 14 Jun, 2021 1 commit