]>
git.ipfire.org Git - thirdparty/lxc.git/log
Donghwa Jeong [Mon, 18 Jun 2018 02:30:41 +0000 (11:30 +0900)]
secure coding: strcpy => strlcpy
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Christian Brauner [Fri, 15 Jun 2018 11:37:47 +0000 (13:37 +0200)]
coverity: #
1437027
Read from pointer after free
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 11:36:37 +0000 (13:36 +0200)]
coverity: #
1425855
String not null terminated
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 11:35:09 +0000 (13:35 +0200)]
coverity: #
1425789
Unchecked return value from library
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 10:56:19 +0000 (12:56 +0200)]
coverity: #
1425846
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 10:55:06 +0000 (12:55 +0200)]
coverity: #
1425840
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 10:50:47 +0000 (12:50 +0200)]
coverity: #
1425837
String not null terminated
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 10:43:48 +0000 (12:43 +0200)]
coverity: #
1425825
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 10:41:09 +0000 (12:41 +0200)]
coverity: #
1425824
Missing break in switch
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:54:14 +0000 (11:54 +0200)]
coverity: #
1425819
Resource leak
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:52:04 +0000 (11:52 +0200)]
coverity: #
1425818
Dereference after null check
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:49:10 +0000 (11:49 +0200)]
coverity: #
1425813
Resource leak
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:47:31 +0000 (11:47 +0200)]
coverity: #
1425810
Explicit null dereferenced
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:43:15 +0000 (11:43 +0200)]
coverity: #
1425799
Logically dead code
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:42:18 +0000 (11:42 +0200)]
coverity: #
1425793
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:40:53 +0000 (11:40 +0200)]
coverity: #
1425792
Insecure temporary file
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:37:11 +0000 (11:37 +0200)]
coverity: #
1425789
Unchecked return value from library
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:35:10 +0000 (11:35 +0200)]
coverity: #
1425771
Insecure temporary file
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Jun 2018 09:33:34 +0000 (11:33 +0200)]
coverity: #
1425770
Insecure temporary file
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 14 Jun 2018 22:17:01 +0000 (00:17 +0200)]
include: add getgrgid_r()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Donghwa Jeong [Fri, 15 Jun 2018 02:11:48 +0000 (11:11 +0900)]
storage: Resource leak
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Christian Brauner [Thu, 14 Jun 2018 20:17:08 +0000 (22:17 +0200)]
coverity: #
1425768
Untrusted array index read
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 14 Jun 2018 20:10:26 +0000 (22:10 +0200)]
coverity: #
1425767
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 14 Jun 2018 20:09:14 +0000 (22:09 +0200)]
coverity: #
1425766
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 14 Jun 2018 20:05:09 +0000 (22:05 +0200)]
coverity: #
1425760
Use of untrusted scalar value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2xsec [Thu, 14 Jun 2018 15:19:22 +0000 (00:19 +0900)]
coverity: #
1425778
Out-of-bounds write
Signed-off-by: 2xsec <dh48.jeong@samsung.com>
2xsec [Thu, 14 Jun 2018 13:55:47 +0000 (22:55 +0900)]
coverity: #
1437017
Uninitialized pointer
Signed-off-by: 2xsec <dh48.jeong@samsung.com>
Donghwa Jeong [Thu, 14 Jun 2018 10:06:11 +0000 (19:06 +0900)]
fix getgrgid() thread safe issue
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Thu, 14 Jun 2018 06:32:03 +0000 (15:32 +0900)]
fix getpwuid() thread safe issue
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Thu, 14 Jun 2018 01:36:46 +0000 (10:36 +0900)]
coverity: #
1436916
Resource leak
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Tue, 12 Jun 2018 09:16:35 +0000 (18:16 +0900)]
attach: fix double free
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Tue, 12 Jun 2018 08:09:13 +0000 (17:09 +0900)]
fix getpwnam() thread safe issue
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Christian Brauner [Mon, 11 Jun 2018 11:15:48 +0000 (13:15 +0200)]
tools: restore lxc-create log behavior
Older versions of lxc-create used to set log_file to "none" when a log priority
but no log file was specified on the command line. Let's restore this behavior.
Closes #2392.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Donghwa Jeong [Mon, 11 Jun 2018 05:51:16 +0000 (14:51 +0900)]
coverity: #
1425781
Resource leak
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Mon, 11 Jun 2018 02:10:58 +0000 (11:10 +0900)]
arguments: improve some operations
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Jonathan Calmels [Fri, 8 Jun 2018 23:58:11 +0000 (16:58 -0700)]
conf: only use newuidmap and newgidmap when necessary
Signed-off-by: Jonathan Calmels <jcalmels@nvidia.com>
Donghwa Jeong [Fri, 8 Jun 2018 07:38:56 +0000 (16:38 +0900)]
coverity: #
1425836
Resource leak
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Fri, 8 Jun 2018 02:22:18 +0000 (11:22 +0900)]
coverity: #
1425849
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Fri, 8 Jun 2018 02:20:08 +0000 (11:20 +0900)]
coverity: #
1425841
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Fri, 8 Jun 2018 02:16:31 +0000 (11:16 +0900)]
coverity: #
1425795
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Fri, 8 Jun 2018 02:14:40 +0000 (11:14 +0900)]
coverity: #
1425794
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Fri, 8 Jun 2018 02:12:52 +0000 (11:12 +0900)]
coverity: #
1425779
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Fri, 8 Jun 2018 02:11:03 +0000 (11:11 +0900)]
coverity: #
1425777
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Stéphane Graber [Tue, 5 Jun 2018 21:13:57 +0000 (17:13 -0400)]
Fix typo
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
duguhaotian [Wed, 30 May 2018 02:25:40 +0000 (10:25 +0800)]
support tls in cross-compile
AC_RUN_IFELSE will fail in cross-compile,
we can use AC_COMPILE_IFELSE replace.
Signed-off-by: duguhaotian <duguhaotian@gmail.com>
Christian Brauner [Mon, 4 Jun 2018 10:49:05 +0000 (12:49 +0200)]
conf: copy mountinfo for remount_all_slave()
While a container reads mountinfo from proc fs, the mountinfo can be changed by
the kernel anytime. This has caused critical issues on some devices.
Signed-off-by: Donghwa Jeong dh48.jeong@samsung.com
Reported-by: Donghwa Jeong dh48.jeong@samsung.com
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 1 Jun 2018 17:53:06 +0000 (19:53 +0200)]
tree-wide: handle EINTR in some read()/write()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 31 May 2018 10:18:02 +0000 (12:18 +0200)]
start: log unknown info.si_code
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Donghwa Jeong [Thu, 31 May 2018 08:58:08 +0000 (17:58 +0900)]
start: fix waitpid() blocking issue
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Christian Brauner [Wed, 30 May 2018 13:34:03 +0000 (15:34 +0200)]
confile: improve strprint()
POSIX specifies [1]:
"If the value of n is zero on a call to snprintf(), nothing shall be written,
the number of bytes that would have been written had n been sufficiently large
excluding the terminating null shall be returned, and s may be a null pointer."
But in case there are any non-sane libcs out there that do actually dereference
the buffer when when 0 is passed as length to snprintf() let's give them a
dummy buffer.
[1]: The Open Group Base Specifications Issue 7, 2018 edition
IEEE Std 1003.1-2017 (Revision of IEEE Std 1003.1-2008)
Copyright © 2001-2018 IEEE and The Open Group
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Reported-by: Donghwa Jeong <dh48.jeong@samsung.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Donghwa Jeong [Tue, 29 May 2018 13:01:27 +0000 (22:01 +0900)]
conf: va_end was not called.
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Donghwa Jeong [Mon, 28 May 2018 04:42:45 +0000 (13:42 +0900)]
network: fix socket handle leak
Signed-off-by: Donghwa Jeong <dh48.jeong@samsung.com>
Christian Brauner [Sat, 26 May 2018 12:22:51 +0000 (14:22 +0200)]
utils: fix task_blocking_signal()
Closes #2342.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 26 May 2018 01:22:58 +0000 (03:22 +0200)]
coverity: #
1435803
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 26 May 2018 01:21:05 +0000 (03:21 +0200)]
coverity: #
1435805
Logically dead code
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 25 May 2018 17:35:00 +0000 (19:35 +0200)]
tools: fix lxc-create with global config value II
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 25 May 2018 13:43:59 +0000 (15:43 +0200)]
tools: fix lxc-create with global config value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 24 May 2018 22:12:46 +0000 (00:12 +0200)]
confile: order architectures
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 24 May 2018 22:00:50 +0000 (00:00 +0200)]
lxccontainer: fix fd leaks when sending signals
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 24 May 2018 18:45:29 +0000 (20:45 +0200)]
utils: fix task_blocking_signal()
sscanf() skips whitespace anyway so don't account for tabs in case the file
layout changes.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 24 May 2018 18:29:48 +0000 (20:29 +0200)]
tree-wide: s/sigprocmask/pthread_sigmask()/g
The behavior of sigprocmask() is unspecified in multi-threaded programs. Let's
use pthread_sigmask() instead.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 22 May 2018 21:26:03 +0000 (23:26 +0200)]
lxc-init: skip signals that can't be caught
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Simos Xenitellis [Tue, 15 May 2018 11:34:38 +0000 (11:34 +0000)]
coverity: #
1425802
Resource leak
Signed-off-by: Simos Xenitellis <simos.lists@googlemail.com>
Christian Brauner [Tue, 15 May 2018 19:33:48 +0000 (21:33 +0200)]
capabilities: raise ambient capabilities
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Suggested-by: Jonathan Calmels <jcalmels@nvidia.com>
Christian Brauner [Sun, 13 May 2018 13:02:09 +0000 (15:02 +0200)]
config: allow read-write /sys in user namespace
Unprivileged containers can safely mount /sys as read-write. This also allows
systemd-udevd to be started in unprivileged containers.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Simos Xenitellis [Tue, 15 May 2018 11:37:14 +0000 (11:37 +0000)]
coverity: #
1425844
Resource leak
Signed-off-by: Simos Xenitellis <simos.lists@googlemail.com>
Simos Xenitellis [Tue, 15 May 2018 00:05:13 +0000 (00:05 +0000)]
coverity: #
1248106
Resource leak
Signed-off-by: Simos Xenitellis <simos.lists@googlemail.com>
Simos Xenitellis [Tue, 15 May 2018 00:19:12 +0000 (00:19 +0000)]
coverity: #
1425836
Resource leak
Signed-off-by: Simos Xenitellis <simos.lists@googlemail.com>
Christian Brauner [Tue, 15 May 2018 10:34:24 +0000 (12:34 +0200)]
coverity: #
1435603
Resource leak
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 15 May 2018 10:33:22 +0000 (12:33 +0200)]
coverity: #
1435604
Resource leak
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 11 May 2018 13:56:58 +0000 (15:56 +0200)]
Revert "tools: s/strncpy()/strlcpy()/g"
This reverts commit
2ec47d5149e73db97f7877d06d67cb11421097bb .
First, I forgot to actually replace strncpy() with strlcpy(). Second, we don't
want to \0-terminate since this is an abstract unix socket and this is not
required. Instead, let's simply use memcpy() which is more correct and also
silences gcc-8.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 11 May 2018 13:19:45 +0000 (15:19 +0200)]
tools: s/strncpy()/strlcpy()/g
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 11 May 2018 11:02:41 +0000 (13:02 +0200)]
CODING_STYLE: add section about using strlcpy()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 11 May 2018 10:58:11 +0000 (12:58 +0200)]
tree-wide: s/strncpy()/strlcpy()/g
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 11 May 2018 10:57:51 +0000 (12:57 +0200)]
strlcpy: add strlcpy() implementation
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 14 Oct 2018 09:42:29 +0000 (11:42 +0200)]
autodev: adapt to changes in Linux 4.18
Starting with commit
55956b59df33 ("vfs: Allow userns root to call mknod on owned filesystems.")
Linux will allow mknod() in user namespaces for userns root if CAP_MKNOD is
available.
However, these device nodes are useless since
static struct super_block *alloc_super(struct file_system_type *type, int flags,
struct user_namespace *user_ns)
{
/* <snip> */
if (s->s_user_ns != &init_user_ns)
s->s_iflags |= SB_I_NODEV;
/* <snip> */
}
will set the SB_I_NODEV flag on the filesystem. When a device node created in
non-init userns is open()ed the call chain will hit:
bool may_open_dev(const struct path *path)
{
return !(path->mnt->mnt_flags & MNT_NODEV) &&
!(path->mnt->mnt_sb->s_iflags & SB_I_NODEV);
}
which will cause an EPERM because the device node is located on an fs
owned by non-init-userns and thus doesn't grant access to device nodes due to
SB_I_NODEV.
This commit enables LXC to deal with such kernels.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 10 May 2018 22:54:47 +0000 (00:54 +0200)]
network: adhere to IFNAMSIZ limit
The additional \0-byte space added is not needed since IFNAMSIZ needs to
include the \0-byte.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 10 May 2018 22:52:33 +0000 (00:52 +0200)]
network: silence gcc-8
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 10 May 2018 18:25:08 +0000 (20:25 +0200)]
utils: account for terminating \0 byte
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 1 May 2018 15:27:51 +0000 (17:27 +0200)]
coverity: #
1425744
Dereference after null check
userns_exec_{1,full} are called from functions that might not have a conf.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 1 May 2018 14:59:19 +0000 (16:59 +0200)]
genl: remove
These files have never been used and as such have no dependencies in the
codebase whatsoever. So remove them. If we need them we can simply pull them
out of the git history.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Tycho Andersen [Wed, 9 May 2018 01:29:06 +0000 (01:29 +0000)]
execute: account for -o path option count
This always works fine... until your exec() fails and you try to go and
free it, you've overwritten the allocator's metadata (and potentially other
stuff) and it fails.
Signed-off-by: Tycho Andersen <tycho@tycho.ws>
Christian Brauner [Thu, 23 Aug 2018 21:11:13 +0000 (23:11 +0200)]
lxc-unshare: add missing declaration
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 8 May 2018 15:58:36 +0000 (17:58 +0200)]
execute: do not check inherited fds again
This is already done in do_lxcapi_start{l}() so a) no need to do it again here
and b) this would close the state socket pair sockets, corrup the fd, and lead
to EBADF.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 4 May 2018 09:59:27 +0000 (11:59 +0200)]
execute: use static buffer
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Tycho Andersen [Thu, 3 May 2018 18:32:19 +0000 (18:32 +0000)]
fix logic for execute log file
The problem here is that lxc-init runs *inside* the container. So if a
person has the log file set to /home/$USER/foo, lxc-init ends up making a
directory /home/$USER/foo inside the container to put the log file in. What
we really want are the logs to be propagated from inside the container to
the outside. We accomplish this by passing an fd without O_CLOEXEC, and
telling lxc-init to log to that file.
Signed-off-by: Tycho Andersen <tycho@tycho.ws>
Christian Brauner [Mon, 30 Apr 2018 10:18:23 +0000 (12:18 +0200)]
coverity: #
1435263
Use after free
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 14:58:06 +0000 (16:58 +0200)]
lxccontainer: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 14:56:58 +0000 (16:56 +0200)]
lxccontainer: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 13:08:46 +0000 (15:08 +0200)]
lxccontainer: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 12:53:12 +0000 (14:53 +0200)]
lxccontainer: do_lxcapi_unfreeze()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 12:52:40 +0000 (14:52 +0200)]
lxccontainer: do_lxcapi_freeze()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 12:49:36 +0000 (14:49 +0200)]
lxccontainer: do_lxcapi_is_running()
There's no need to do string comparisons.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 12:48:08 +0000 (14:48 +0200)]
lxccontainer: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 29 Apr 2018 11:39:28 +0000 (13:39 +0200)]
lxccontainer: use thread-safe *_OFD_* locks
If they aren't available fallback to BSD flock()s.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 28 Apr 2018 22:50:50 +0000 (00:50 +0200)]
coverity: #
1435198
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 28 Apr 2018 22:38:29 +0000 (00:38 +0200)]
coverity: #
1435205
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 28 Apr 2018 22:22:54 +0000 (00:22 +0200)]
coverity: #
1435207
Unchecked return value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 28 Apr 2018 22:21:33 +0000 (00:21 +0200)]
coverity: #
1435208
Unused value
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
LiFeng [Tue, 24 Apr 2018 19:10:15 +0000 (15:10 -0400)]
Fix memory leak in list_active_containers
Signed-off-by: LiFeng <lifeng68@huawei.com>