]>
git.ipfire.org Git - thirdparty/lxc.git/log 
Christian Brauner  [Mon, 16 Aug 2021 08:56:51 +0000  (10:56 +0200)]  
cgroups: use semantically clean check in cpuset1_cpus_initialize()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 13 Aug 2021 22:36:21 +0000  (00:36  +0200)]  
cgroups: fix cpumask handling
Link: https://discuss.linuxcontainers.org/t/lxc-4-0-9-lxc-start-sigabrt-on-systems-with-defined-offline-cpus-and-a-total-number-of-cpus-divisible-by-32  
Signed-off-by: Jim Ferrigno <jim.ferrigno@oracle.com> 
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 13 Aug 2021 19:37:02 +0000  (21:37 +0200)]  
cgroups: fix comments in cpuset1_initialize()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 13 Aug 2021 19:35:30 +0000  (21:35 +0200)]  
Revert "cgroups: fix cpu bitmasks"
This reverts commit 
e0f7296a6d537f0d2eb5fbc6d7f9e007d11d516a .
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 12 Aug 2021 07:00:00 +0000  (09:00 +0200)]  
cgroups: s/calloc/zalloc/gSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Jim Ferrigno  [Wed, 11 Aug 2021 18:44:32 +0000  (14:44 -0400)]  
cgroups: fix cpu bitmasks
Link: https://discuss.linuxcontainers.org/t/lxc-4-0-9-lxc-start-sigabrt-on-systems-with-defined-offline-cpus-and-a-total-number-of-cpus-divisible-by-32  
Signed-off-by: Jim Ferrigno <jim.ferrigno@oracle.com> 
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 11 Aug 2021 15:46:54 +0000  (17:46 +0200)]  
mainloop: disable IORING_SETUP_SQPOLL for nowSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 11 Aug 2021 14:54:34 +0000  (16:54 +0200)]  
mainloop: add comments about multishot and oneshot cleanupSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 11 Aug 2021 13:58:58 +0000  (15:58 +0200)]  
mainloop: s/handler_name/name/gSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 11 Aug 2021 13:52:12 +0000  (15:52 +0200)]  
mainloop: move variables into tighter scopeSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 11 Aug 2021 13:43:18 +0000  (15:43 +0200)]  
memory_utils: make cleanup handler as unusedSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 11 Aug 2021 09:03:13 +0000  (11:03 +0200)]  
mainloop: fix io_uring cleanup handlingSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 10 Aug 2021 15:57:26 +0000  (17:57 +0200)]  
mainloop: remove CANCEL_RAISE flagSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 10 Aug 2021 15:42:41 +0000  (17:42 +0200)]  
mainloop: minor fixesSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Tycho Andersen  [Tue, 10 Aug 2021 14:45:21 +0000  (08:45 -0600)]  
mainloop: s,sys/poll,pollSigned-off-by: Tycho Andersen <tycho@tycho.pizza> 
Simon Deziel  [Tue, 10 Aug 2021 14:35:12 +0000  (10:35 -0400)]  
lxc-download: add LXC version/compat level to user-agentSigned-off-by: Simon Deziel <simon.deziel@canonical.com> 
Christian Brauner  [Fri, 4 Jun 2021 16:21:04 +0000  (18:21 +0200)]  
mainloop: add io_uring supportSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Thomas Parrott  [Tue, 10 Aug 2021 10:32:30 +0000  (11:32 +0100)]  
doc: Adds mention of ability to specify manual IPv4 broadcast addressSigned-off-by: Thomas Parrott <thomas.parrott@canonical.com> 
Christian Brauner  [Fri, 4 Jun 2021 13:13:14 +0000  (15:13 +0200)]  
tree-wide: s/lxc_epoll_descr/lxc_async_descr/gSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 6 Aug 2021 07:45:33 +0000  (09:45 +0200)]  
conf: log session keyring failure on WARN levelSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 4 Aug 2021 10:31:07 +0000  (12:31 +0200)]  
cgroups: log at warning instead of error levelSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Edênis Freindorfer Azevedo  [Sun, 4 Jul 2021 14:25:40 +0000  (11:25 -0300)]  
Improve bash completion.Signed-off-by: Edenis Freindorfer Azevedo <edenisfa@gmail.com> 
Edênis Freindorfer Azevedo  [Mon, 28 Jun 2021 17:25:25 +0000  (14:25 -0300)]  
Create rules to add/remove symlinks for bash completion.Signed-off-by: Edenis Freindorfer Azevedo <edenisfa@gmail.com> 
Edênis Freindorfer Azevedo  [Mon, 5 Jul 2021 20:34:23 +0000  (17:34 -0300)]  
Fix typo on documentation for `lxc-{attach,execute}`.Signed-off-by: Edenis Freindorfer Azevedo <edenisfa@gmail.com> 
Edênis Freindorfer Azevedo  [Mon, 5 Jul 2021 15:42:12 +0000  (12:42 -0300)]  
Fix typo on documentation for `lxc-autostart`.Signed-off-by: Edenis Freindorfer Azevedo <edenisfa@gmail.com> 
Stéphane Graber  [Mon, 13 Sep 2021 12:41:51 +0000  (08:41 -0400)]  
Merge pull request #3969 from brauner/2021-09-03.fixes.stable
Christian Brauner  [Mon, 13 Sep 2021 12:11:05 +0000  (14:11 +0200)]  
tests: fix config file tests
Link: https://bugs.launchpad.net/bugs/1943441  
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Stéphane Graber  [Mon, 9 Aug 2021 17:18:44 +0000  (13:18 -0400)]  
doc/api-extensions: Grammar fixSigned-off-by: Stéphane Graber <stgraber@ubuntu.com> 
Christian Brauner  [Mon, 9 Aug 2021 13:59:26 +0000  (15:59 +0200)]  
lsm/apparmor: use cleanup macroSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Mon, 9 Aug 2021 13:58:53 +0000  (15:58 +0200)]  
lsm/apparmor: log failure to write AppArmor profileSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 5 Aug 2021 14:16:33 +0000  (16:16 +0200)]  
network: fix container with empty network namespacesFixes: #3922 Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 3 Aug 2021 12:40:28 +0000  (14:40 +0200)]  
tests: add test for rootfs mount optionsSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 3 Aug 2021 11:16:45 +0000  (13:16 +0200)]  
conf: allow mount options for rootfs when using new mount apiSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 3 Aug 2021 10:51:24 +0000  (12:51 +0200)]  
mount_utils: make some mount helpers static inlineSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 3 Aug 2021 10:13:01 +0000  (12:13 +0200)]  
conf: let parse_vfs_attr() handle legacy mount flags as wellSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 3 Aug 2021 07:22:46 +0000  (09:22 +0200)]  
conf: log failure to create tty mountpointSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Mon, 2 Aug 2021 17:16:54 +0000  (19:16 +0200)]  
conf: refactor lxc_recv_ttys_from_child()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Mon, 2 Aug 2021 16:47:44 +0000  (18:47 +0200)]  
conf: fix logging in lxc_idmapped_mounts_child()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Mon, 2 Aug 2021 13:30:03 +0000  (15:30 +0200)]  
mount_utils: introduce mount_at()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Sat, 31 Jul 2021 08:19:57 +0000  (10:19 +0200)]  
terminal: fail on unknown error during TIOCGPTPEERSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Sat, 31 Jul 2021 08:17:36 +0000  (10:17 +0200)]  
terminal: move native terminal allocation from error logging to infoSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Sat, 31 Jul 2021 08:14:39 +0000  (10:14 +0200)]  
conf: handle kernels without TIOCGPTPEERSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 12:28:17 +0000  (14:28 +0200)]  
start: allow containers to use a native consoleSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 11:49:15 +0000  (13:49 +0200)]  
terminal: remove unused argument from lxc_devpts_terminal()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 11:13:28 +0000  (13:13 +0200)]  
conf: rework console setupSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 11:02:01 +0000  (13:02 +0200)]  
file_utils: add open_at_same()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 07:40:40 +0000  (09:40 +0200)]  
conf: use mount_fd() during console mountingSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 07:27:54 +0000  (09:27 +0200)]  
conf: use mount_fd() in lxc_setup_dev_console()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 07:20:22 +0000  (09:20 +0200)]  
conf: use mount_fd() helper when mounting ttysSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 07:15:14 +0000  (09:15 +0200)]  
mount_utils: add mount_fd()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Fri, 30 Jul 2021 07:07:50 +0000  (09:07 +0200)]  
conf: stash pty_nr in struct lxc_terminalSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 17:00:32 +0000  (19:00 +0200)]  
conf: move lxc_create_ttys() before pivot rootSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 16:39:26 +0000  (18:39 +0200)]  
terminal: split out lxc_devpts_terminal() helperSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 16:25:19 +0000  (18:25 +0200)]  
string_utils: cast __s64 to long long signed int
Link: https://launchpadlibrarian.net/550723147/buildlog_snap_ubuntu_focal_ppc64el_lxd-latest-edge_BUILDING.txt.gz  
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 13:52:52 +0000  (15:52 +0200)]  
conf: merge devpts setup and move before pivot rootSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 13:46:17 +0000  (15:46 +0200)]  
terminal: don't use ttyname_r() for native terminal allocationSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 12:32:21 +0000  (14:32 +0200)]  
conf: add and use mount_beneath_fd()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 12:16:39 +0000  (14:16 +0200)]  
conf: update commentSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 12:15:51 +0000  (14:15 +0200)]  
conf: use a relative path in symlinkat()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 09:00:51 +0000  (11:00 +0200)]  
conf: s/lxc_setup_devpts_parent/lxc_recv_devpts_from_child/gSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 08:46:59 +0000  (10:46 +0200)]  
conf: attach devpts mount directly when new mount api can be usedSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 13:39:04 +0000  (15:39 +0200)]  
conf: set source property for devptsSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 29 Jul 2021 13:26:17 +0000  (15:26 +0200)]  
conf: surface failures to setup consoleSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Stéphane Graber  [Wed, 28 Jul 2021 19:13:52 +0000  (15:13 -0400)]  
Fix typosSigned-off-by: Stéphane Graber <stgraber@ubuntu.com> 
Christian Brauner  [Wed, 28 Jul 2021 16:39:31 +0000  (18:39 +0200)]  
conf: ensure devpts_fd is set to -EBADFSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 28 Jul 2021 15:25:38 +0000  (17:25 +0200)]  
terminal: ttyname_r() returns an error number on failureSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 28 Jul 2021 14:38:36 +0000  (16:38 +0200)]  
conf: use new mount api for devpts setupSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Petr Malat  [Mon, 19 Jul 2021 10:28:45 +0000  (12:28 +0200)]  
bpf: bpf_devices_cgroup_supported() should check if bpf() is availableSigned-off-by: Petr Malat <oss@malat.biz> 
Petr Malat  [Mon, 19 Jul 2021 19:51:25 +0000  (21:51 +0200)]  
lxc_setup_ttys: Handle existing ttyN file without underlying deviceSigned-off-by: Petr Malat <oss@malat.biz> 
Stoiko Ivanov  [Tue, 20 Jul 2021 08:30:36 +0000  (10:30 +0200)]  
cgroups: remove unneeded variables from cgroup_tree_createSigned-off-by: Stoiko Ivanov <s.ivanov@proxmox.com> 
Stoiko Ivanov  [Mon, 19 Jul 2021 14:55:43 +0000  (16:55 +0200)]  
cgroups: populate hierarchy for device cgroup
With the changes introduced in:
b7b1e3a34ce28b01206c48227930ff83d399e7b6 
the hierarchy-struct did not have the path_lim set anymore, which is
needed by setup_limits_legacy (->cg_legacy_set_data->lxc_write_openat)
to actually access the cgroup directory.
The issue can be reproduced with a container config having
```
lxc.cgroup.devices.deny = a
```
(or any lxc.cgroup.devices entry) set on a system booted with
systemd.unified_cgroup_hierarchy=0.
This affects all privileged containers on PVE (due to the default
devices.deny entry).
Signed-off-by: Stoiko Ivanov <s.ivanov@proxmox.com> 
Stéphane Graber  [Fri, 16 Jul 2021 20:30:14 +0000  (16:30 -0400)]  
Release LXC 4.0.10Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> 
Christian Brauner  [Thu, 15 Jul 2021 20:09:31 +0000  (22:09 +0200)]  
terminal: fix error handlingFixes: f382bcc6d820 ("terminal: log TIOCGPTPEER failure less alarmingly") Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 15 Jul 2021 16:47:27 +0000  (18:47 +0200)]  
af_unix: report error when no fd is to be sentFixes: #3624 Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 15 Jul 2021 16:37:22 +0000  (18:37 +0200)]  
terminal: log TIOCGPTPEER failure less alarminglyFixes: #3625 Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 15 Jul 2021 16:18:25 +0000  (18:18 +0200)]  
sync: fix log messageFixes: #3875 Suggested-by: Hank.shi <shk242673@163.com> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 15 Jul 2021 16:16:39 +0000  (18:16 +0200)]  
start: fix logging messageFixes: #3875 Suggested-by: Hank.shi <shk242673@163.com> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 15 Jul 2021 08:37:47 +0000  (10:37 +0200)]  
initutils: include pthread.h
Otherwise we might end up with implicit function declaration warnings.
Link: https://jenkins.linuxcontainers.org/job/lxc-build-android/8915/console  
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Serge Hallyn  [Thu, 15 Jul 2021 03:17:40 +0000  (22:17 -0500)]  
doc/common_options: add trace and alert loglevelsSigned-off-by: Serge Hallyn <serge@hallyn.com> 
Christian Brauner  [Thu, 8 Jul 2021 12:49:26 +0000  (14:49 +0200)]  
file_utils: surface ENOENT when falling back to openat()
Link: https://discuss.linuxcontainers.org/t/error-failed-to-retrieve-pid-of-executing-child-process  
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Mon, 5 Jul 2021 10:19:31 +0000  (12:19 +0200)]  
lxc_unshare: fix network device handling
We were passing the wrong PID. Fix this!
Link: https://discuss.linuxcontainers.org/t/problem-with-moving-interface-new-network-namespace-in-lxc-unshare  
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Mon, 5 Jul 2021 10:11:42 +0000  (12:11 +0200)]  
lxc_unshare: make mount table privateSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Wolfgang Bumiller  [Mon, 5 Jul 2021 08:53:41 +0000  (10:53 +0200)]  
confile: allow including nonexisting directoriesSigned-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com> 
Wolfgang Bumiller  [Mon, 5 Jul 2021 07:02:36 +0000  (09:02 +0200)]  
conf: userns.conf: include userns.conf.dSigned-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com> 
KATOH Yasufumi  [Mon, 5 Jul 2021 03:00:32 +0000  (12:00 +0900)]  
doc: Fix typo in English lxc.container.conf(5)Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp> 
KATOH Yasufumi  [Mon, 5 Jul 2021 02:44:30 +0000  (11:44 +0900)]  
doc: Add new idmap= option to Japanese lxc.container.conf(5)
Update for commit 
1852be904823e3532af38efc5ef55d3fb931e616 
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp> 
KATOH Yasufumi  [Mon, 5 Jul 2021 02:23:49 +0000  (11:23 +0900)]  
doc: Append description of net type field
Update for commit 
320061b34fea7d7f280b0a421dddeac7dac7f1bf 
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp> 
KATOH Yasufumi  [Sun, 27 Jun 2021 15:10:09 +0000  (00:10  +0900)]  
doc: Add eBPF-based device controller semantics to Japanese man page
Update for commit 
5025f3a69053bbddbe6c76ffb55b4bbd5759dcc8 
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp> 
Christian Brauner  [Thu, 1 Jul 2021 11:39:46 +0000  (13:39 +0200)]  
cmd/lxc-checkconfig: list cgroup namespaces and rename confusing ns_cgroup entry
Link: https://discuss.linuxcontainers.org/t/cgroup-namespace-required-in-lxc-checkconfig-and-config-cgroup-ns  
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 1 Jul 2021 08:22:56 +0000  (10:22 +0200)]  
terminal: ensure newlines are turned into newlines+carriage return for terminal outputFixes: #3879 Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Thu, 1 Jul 2021 07:51:30 +0000  (09:51 +0200)]  
cgroups: handle funky cgroup layouts
Old versions of Docker emulate a cgroup namespace by bind-mounting the
container's cgroup over the corresponding controller:
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/systemd rw,nosuid,nodev,noexec,relatime master:11 - cgroup cgroup rw,xattr,name=systemd
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/net_cls,net_prio rw,nosuid,nodev,noexec,relatime master:15 - cgroup cgroup rw,net_cls,net_prio
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/cpu,cpuacct rw,nosuid,nodev,noexec,relatime master:16 - cgroup cgroup rw,cpu,cpuacct
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/memory rw,nosuid,nodev,noexec,relatime master:17 - cgroup cgroup rw,memory
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/devices rw,nosuid,nodev,noexec,relatime master:18 - cgroup cgroup rw,devices
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/hugetlb rw,nosuid,nodev,noexec,relatime master:19 - cgroup cgroup rw,hugetlb
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/perf_event rw,nosuid,nodev,noexec,relatime master:20 - cgroup cgroup rw,perf_event
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/cpuset rw,nosuid,nodev,noexec,relatime master:21 - cgroup cgroup rw,cpuset
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/blkio rw,nosuid,nodev,noexec,relatime master:22 - cgroup cgroup rw,blkio
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/pids rw,nosuid,nodev,noexec,relatime master:23 - cgroup cgroup rw,pids
/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7d4424e6_bb13_42f4_a47a_45a4828bf54d.slice/docker-
d0b3604b67ac7930dd34ba3a796627e3e4717d12309e90a4afe3f38b6816ac98 .scope /sys/fs/cgroup/freezer rw,nosuid,nodev,noexec,relatime master:24 - cgroup cgroup rw,freezer
New versions of LXC always stash a file descriptor for the root of the
cgroup mount at /sys/fs/cgroup and then resolve the current cgroup
parsed from /proc/{1,self}/cgroup relative to that file descriptor. This
doesn't work when the caller's cgroup is mouned over the controllers.
Older versions of LXC simply counted such layouts as having no cgroups
available for delegation at all and moved on provided no cgroup limits
were requested. But mainline LXC would fail such layouts. While I would
argue that failing such layouts is the semantically clean approach we
shouldn't regress users so make mainline LXC treat such cgroup layouts
as having no cgroups available for delegation.
Fixes: #3890 
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 30 Jun 2021 11:41:46 +0000  (13:41 +0200)]  
tests: add tests for read-only /sys with read-write /sys/devices/virtual/netSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Wed, 30 Jun 2021 11:22:15 +0000  (13:22 +0200)]  
conf: improve read-only /sys with read-write /sys/devices/virtual/netSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Simon Deziel  [Tue, 29 Jun 2021 15:50:09 +0000  (11:50 -0400)]  
initutils: close dirfd in error pathSigned-off-by: Simon Deziel <simon.deziel@canonical.com> 
Christian Brauner  [Tue, 29 Jun 2021 08:32:31 +0000  (10:32 +0200)]  
execute: ensure parent is notified about child exec and close all unneeded fdsSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 29 Jun 2021 08:32:05 +0000  (10:32 +0200)]  
network: log network devices while sendingSigned-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Christian Brauner  [Tue, 29 Jun 2021 08:31:17 +0000  (10:31 +0200)]  
initutils: use vfork() in lxc_container_init()Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> 
Tycho Andersen  [Mon, 28 Jun 2021 14:38:48 +0000  (08:38 -0600)]  
execute: don't exec init, call itSigned-off-by: Tycho Andersen <tycho@tycho.pizza> 
Tomasz Blaszczak  [Wed, 23 Jun 2021 07:17:05 +0000  (09:17 +0200)]  
When an item is added to an array, then the array is realloc()ed (to size+1),Signed-off-by: Tomasz Blaszczak <tomasz.blaszczak@consult.red> 
Christian Brauner  [Mon, 28 Jun 2021 07:44:20 +0000  (09:44 +0200)]  
cgroups: verify that hierarchies are non-emptyFixes: #3881 Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>