]> git.ipfire.org Git - thirdparty/lxc.git/commitdiff
api: add time_namespace extension
authorChristian Brauner <christian.brauner@ubuntu.com>
Thu, 25 Jun 2020 22:45:18 +0000 (00:45 +0200)
committerChristian Brauner <christian.brauner@ubuntu.com>
Thu, 25 Jun 2020 23:03:24 +0000 (01:03 +0200)
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
doc/api-extensions.md
src/lxc/api_extensions.h

index e8b5eb08906ab50c206bd8c2453e9df9739fd1b5..d7b915d283217abbeb298bac5a79c8e3a7080312 100644 (file)
@@ -122,3 +122,8 @@ When running on kernels that support pidfds LXC will rely on them for most opera
 ## cgroup\_advanced\_isolation
 
 Privileged containers will usually be able to override the cgroup limits given to them. This introduces three new configuration keys `lxc.cgroup.dir.monitor`, `lxc.cgroup.dir.container`, and `lxc.cgroup.dir.container.inner`. The `lxc.cgroup.dir.monitor` and `lxc.cgroup.dir.container` keys can be used to set to place the `monitor` and the `container` into different cgroups. The `lxc.cgroup.dir.container.inner` key can be set to a cgroup that is concatenated with `lxc.cgroup.dir.container`. When `lxc.cgroup.dir.container.inner` is set the container will be placed into the `lxc.cgroup.dir.container.inner` cgroup but the limits will be set in the `lxc.cgroup.dir.container` cgroup. This way privileged containers cannot escape their cgroup limits.
+
+
+## time\_namespace
+
+This adds time namespace support to LXC.
index 2bbdc5e43a46bae95657409df89913c621420ddf..8061784c859d874c9c519ff185fbc7d7443f5d87 100644 (file)
@@ -41,6 +41,7 @@ static char *api_extensions[] = {
        "pidfd",
        "cgroup_advanced_isolation",
        "network_bridge_vlan",
+       "time_namespace",
 };
 
 static size_t nr_api_extensions = sizeof(api_extensions) / sizeof(*api_extensions);