]>
git.ipfire.org Git - thirdparty/lxc.git/log
Thomas Parrott [Tue, 9 Jun 2020 12:04:21 +0000 (13:04 +0100)]
network: Adds calls to free_ovs_veth_vlan_args in setup_veth_ovs_bridge_vlan
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 12:03:37 +0000 (13:03 +0100)]
network: Fix int type in log message
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 12:02:54 +0000 (13:02 +0100)]
network: Adds free_ovs_veth_vlan_args and allows trunks field to be freed
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 12:01:36 +0000 (13:01 +0100)]
network: Removes unused ip_proxy_args
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 11:03:40 +0000 (12:03 +0100)]
network: Fix coverity issue, dont initialise string pointers in setup_veth_ovs_bridge_vlan
This is needed by lxc_ovs_setup_bridge_vlan_exec.
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 11:03:06 +0000 (12:03 +0100)]
network: Fix coverity issue, leaking data in lxc_ovs_setup_bridge_vlan_exec
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 11:01:41 +0000 (12:01 +0100)]
confile: Fix coverity issue, missing return in get_config_net_veth_vlan_tagged_id
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Christian Brauner [Tue, 9 Jun 2020 09:38:36 +0000 (11:38 +0200)]
Merge pull request #3439 from tomponline/tp-nic-veth-vlan-ovs
NIC: Veth OVS bridge VLAN support
Thomas Parrott [Mon, 8 Jun 2020 10:34:43 +0000 (11:34 +0100)]
network: Updates instantiate_veth to support OVS VLAN setup
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Mon, 8 Jun 2020 10:34:27 +0000 (11:34 +0100)]
network: Adds OVS VLAN setup functions
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Tue, 9 Jun 2020 08:18:55 +0000 (09:18 +0100)]
network: Updates netlink_open handling in lxc_ipvlan_create
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 14:59:58 +0000 (15:59 +0100)]
doc: Adds documentation for veth vlan bridge options
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 16:45:47 +0000 (17:45 +0100)]
network: Updates instantiate_veth to set bridge vlan settings
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 16:45:30 +0000 (17:45 +0100)]
network: Adds bridge vlan management functions
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 13:14:43 +0000 (14:14 +0100)]
tests: Adds test for lxc.net.0.veth.vlan.tagged.id config key
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 14:27:48 +0000 (15:27 +0100)]
tests: Adds test for bridge vlan "none" value
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 10:08:41 +0000 (11:08 +0100)]
tests: Adds test for lxc.net.0.veth.vlan.id config key
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 16:44:34 +0000 (17:44 +0100)]
confile/utils: Adds freeing of priv.veth_attr.vlan_tagged_ids
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 14:30:34 +0000 (15:30 +0100)]
confile/utils: Adds veth vlan tagged ID tracing to lxc_log_configured_netdevs
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 10:07:15 +0000 (11:07 +0100)]
confile/utils: Adds veth mode and vlan ID tracing to lxc_log_configured_netdevs
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 16:44:13 +0000 (17:44 +0100)]
confile: Adds validation for lxc.net.veth.vlan.tagged.id
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 10:06:49 +0000 (11:06 +0100)]
confile: Adds validation for lxc.net.veth.vlan.id
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 10:08:19 +0000 (11:08 +0100)]
network: Adds veth vlan_id, vlan_id_set and vlan_tagged_ids
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 16:02:03 +0000 (17:02 +0100)]
macro: Adds BRIDGE_VLAN_ID_MAX constant
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 14:27:20 +0000 (15:27 +0100)]
macro: Adds constant for BRIDGE_VLAN_NONE mode
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 16:44:55 +0000 (17:44 +0100)]
macro: Adds bridge VLAN constants
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Thu, 4 Jun 2020 13:16:09 +0000 (14:16 +0100)]
api/extensions: Adds network_bridge_vlan API extension
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Wed, 3 Jun 2020 10:26:35 +0000 (11:26 +0100)]
network: Adds check for bridge link interface existence in instantiate_veth
To avoid misleading errors about openvswitch when non-existent bridge link interface specified.
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Thomas Parrott [Mon, 8 Jun 2020 12:24:08 +0000 (13:24 +0100)]
macro: Adds UINT_TO_PTR and PTR_TO_USHORT helpers
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Christian Brauner [Wed, 3 Jun 2020 10:54:32 +0000 (12:54 +0200)]
Merge pull request #3434 from tomponline/tp-copying
.gitignore: Ignores COPYING file created by make
Thomas Parrott [Wed, 3 Jun 2020 10:06:12 +0000 (11:06 +0100)]
.gitignore: Ignores COPYING file created by make
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Christian Brauner [Tue, 2 Jun 2020 13:03:36 +0000 (15:03 +0200)]
Merge pull request #3432 from smoser/fix/lxc-usernsexec-test-do-create-user
lxc-test-usernsexec: If user is root, then create and use non-root user.
Scott Moser [Mon, 1 Jun 2020 16:10:29 +0000 (12:10 -0400)]
lxc-test-usernsexec: If user is root, then create and use non-root user.
Previously if the user was root, then the test would just skip
running (and exit 0). The lxc test environment is run as root.
So, instead of never doing anything there, we create a user,
make sure it is in /etc/sub{ug}id and then execute the test as that
user.
If user is already non-root, then just execute the tests as before.
Signed-off-by: Scott Moser <smoser@brickies.net>
Stéphane Graber [Fri, 29 May 2020 20:42:04 +0000 (16:42 -0400)]
Merge pull request #3428 from smoser/test/add-usernsexec-test
Add test of lxc-usernsexec
Scott Moser [Fri, 29 May 2020 14:31:21 +0000 (10:31 -0400)]
Add test of lxc-usernsexec
The test executes lxc-usernsexec to create some files and chmod them.
Then makes assertions on the uid and gid of those files from outside.
Signed-off-by: Scott Moser <smoser@brickies.net>
Stéphane Graber [Mon, 25 May 2020 18:03:32 +0000 (14:03 -0400)]
Merge pull request #3424 from brauner/2020-05-25/fixes
api_extensions: add "pidfd"
Christian Brauner [Mon, 25 May 2020 17:49:10 +0000 (19:49 +0200)]
api_extensions: add "pidfd"
Somehow it's documented but wasn't ever added.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Fri, 22 May 2020 17:28:17 +0000 (13:28 -0400)]
travis: Restrict coverity to gcc on bionic on amd64
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Stéphane Graber [Wed, 20 May 2020 12:54:42 +0000 (08:54 -0400)]
Merge pull request #3422 from brauner/2020-05-20/usernsexec_fixes
lxc-usernsexec: improvements
Christian Brauner [Wed, 20 May 2020 10:14:21 +0000 (12:14 +0200)]
lxc-usernsexec: don't fail on setgroups()
We can fail to setgroups() when "deny" has been set which we need to set when
we are a fully unprivileged user.
Closes: 3420.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 20 May 2020 10:10:54 +0000 (12:10 +0200)]
lxc-usernsexec: dumb down from error to warning message
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 19 May 2020 08:33:55 +0000 (10:33 +0200)]
Merge pull request #3419 from brauner/2020-05-19/network_phys_fixes
network: use __instantiate_ns_common() in instantiate_ns_phys() too
Christian Brauner [Tue, 19 May 2020 07:09:24 +0000 (09:09 +0200)]
network: use __instantiate_ns_common() in instantiate_ns_phys() too
Fixes: https://lists.linuxcontainers.org/pipermail/lxc-users/2020-May/015245.html
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Mon, 18 May 2020 18:19:10 +0000 (14:19 -0400)]
Merge pull request #3418 from brauner/2020-05-18/android_fixes
bionic: s/lxc_raw_execveat()/execveat()/g
Christian Brauner [Mon, 18 May 2020 18:02:37 +0000 (20:02 +0200)]
bionic: s/lxc_raw_execveat()/execveat()/g
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Mon, 18 May 2020 16:41:21 +0000 (12:41 -0400)]
Merge pull request #3417 from brauner/2020-05-15/fixes
network: fix {mac,ip,v}lan device creation
Christian Brauner [Mon, 18 May 2020 15:11:26 +0000 (17:11 +0200)]
network: fix {mac,ip,v}lan device creation
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Mon, 18 May 2020 01:35:35 +0000 (21:35 -0400)]
Merge pull request #3415 from brauner/2020-05-15/fixes
network: restore old behavior
Christian Brauner [Fri, 15 May 2020 19:14:15 +0000 (21:14 +0200)]
network: restore old behavior
I introduced a regression: when users didn't specify a specific name via
lxc.net.<idx>.name then the device would retain the random name it received
when we created it. Before we would use the "eth%d" syntax to get the kernel to
assign a fixed name. Restore that behavior.
Closes: #3407.
Fixes: 8bf64b77ac8a ("network: rework network device creation")
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Fri, 15 May 2020 19:01:35 +0000 (14:01 -0500)]
Merge pull request #3412 from brauner/2020-05-15/clone3
clone3: add infrastructure and switch container creation to it
Christian Brauner [Fri, 15 May 2020 17:14:11 +0000 (19:14 +0200)]
Merge pull request #3414 from Blub/get-cgroup-path-compat
improve LXC_CMD_GET_CGROUP compatibility
Wolfgang Bumiller [Fri, 15 May 2020 14:33:34 +0000 (16:33 +0200)]
improve LXC_CMD_GET_CGROUP compatibility
When a newer lxc library communicates with an older one
(such as running an lxc 4.0 lxc-freeze on a longer running
container which was started while lxc was still at version
3), the LXC_CMD_GET_LIMITING_CGROUP command is not
available, causing the remote to just close the socket.
Catch this and try the previous command instead.
Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
Christian Brauner [Fri, 15 May 2020 14:05:27 +0000 (16:05 +0200)]
cgroups: be less alarming when creating cgroups
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 May 2020 12:13:07 +0000 (14:13 +0200)]
process_utils: make lxc use clone3() whenever possible
No more weird api quirks between architectures and cool new features.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 May 2020 13:59:50 +0000 (15:59 +0200)]
Merge pull request #3413 from Blub/dont-busy-loop-on-freeze
Don't busy loop on freeze with cgroupv2
Wolfgang Bumiller [Fri, 15 May 2020 13:07:35 +0000 (15:07 +0200)]
cgfsng: use EPOLLPRI when polling cgroup.events
EPOLLIN will always be true and therefore end up
busy-looping
Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
Wolfgang Bumiller [Fri, 15 May 2020 13:07:07 +0000 (15:07 +0200)]
cgfsng: deduplicate freeze code
Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
Wolfgang Bumiller [Fri, 15 May 2020 13:06:38 +0000 (15:06 +0200)]
mainloop: add lxc_mainloop_add_handler_events
in order to be able to listen for EPOLLPRI
Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
Christian Brauner [Fri, 15 May 2020 11:42:56 +0000 (13:42 +0200)]
process_utils: add clone3() support
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 May 2020 10:32:28 +0000 (12:32 +0200)]
process_utils: introduce new process_utils.{c,h}
This will be the central place for all process management helpers. This also
removes raw_syscalls.{c,h}.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 May 2020 09:48:25 +0000 (11:48 +0200)]
syscall_numbers: add clone3()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 May 2020 09:44:46 +0000 (11:44 +0200)]
syscall_numbers: handle ia64 syscall numbers correctly
They are offset by 1024.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Thu, 14 May 2020 19:19:45 +0000 (15:19 -0400)]
Merge pull request #3411 from brauner/master
console: only create detached mount when a console is requested
Christian Brauner [Thu, 14 May 2020 13:52:39 +0000 (15:52 +0200)]
console: only create detached mount when a console is requested
otherwise weird things might happen.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Wed, 13 May 2020 19:23:45 +0000 (15:23 -0400)]
Merge pull request #3410 from brauner/2020-05-13/fixes
reboot fixes
Christian Brauner [Wed, 13 May 2020 12:35:54 +0000 (14:35 +0200)]
log: cleanup syslog handling
Disable and enable syslog around lxc_check_inherited().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 13 May 2020 11:21:41 +0000 (13:21 +0200)]
start: cleanup file descriptor inheritance
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 13 May 2020 10:59:59 +0000 (12:59 +0200)]
start: fix container reboot
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 13 May 2020 10:39:28 +0000 (12:39 +0200)]
lxccontainer: use close_prot_errno_disarm() on state_socket_pair
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 13 May 2020 10:32:38 +0000 (12:32 +0200)]
start: remove unused lxc_zero_handler()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 13 May 2020 10:25:25 +0000 (12:25 +0200)]
lxccontainer: small cleanup to lxc_check_inherited() calls
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Tue, 12 May 2020 14:32:00 +0000 (10:32 -0400)]
Merge pull request #3408 from brauner/2020-05-11/fixes
network: fix key ordering independence
Christian Brauner [Mon, 11 May 2020 20:16:59 +0000 (22:16 +0200)]
confile: fix order independence of network keys
We need to make sure we don't overwrite values when they have already been set.
Closes: #3405.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Mon, 11 May 2020 07:16:33 +0000 (09:16 +0200)]
tools/lxc-ls: shut up lgtm more
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Thu, 7 May 2020 14:11:42 +0000 (10:11 -0400)]
Merge pull request #3403 from brauner/2020-05-07/fixes
fixes
Christian Brauner [Thu, 7 May 2020 13:01:30 +0000 (15:01 +0200)]
tools/lxc-ls: shutup lgtm
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 7 May 2020 12:56:26 +0000 (14:56 +0200)]
yum: remove unused module
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 7 May 2020 12:54:31 +0000 (14:54 +0200)]
tree-wide: this is all rather TODO than FIXME
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Tue, 5 May 2020 14:11:27 +0000 (10:11 -0400)]
Merge pull request #3399 from brauner/2020-05-09/compiler_hardening
compiler: more hardening
Christian Brauner [Tue, 5 May 2020 12:04:34 +0000 (14:04 +0200)]
compiler: support new access attributes
which will allow us to catch more oob accesses.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 5 May 2020 07:21:33 +0000 (09:21 +0200)]
gcc: add -Warray-bounds, -Wrestrict, -Wreturn-local-addr, -Wstringop-overflow
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Mon, 4 May 2020 17:38:43 +0000 (13:38 -0400)]
Merge pull request #3398 from brauner/2020-05-04/fixes
terminal: remove unneeded if condition
Christian Brauner [Mon, 4 May 2020 13:50:41 +0000 (15:50 +0200)]
terminal: remove unneeded if condition
Fixes: Coverity 1461742.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Mon, 4 May 2020 13:39:34 +0000 (09:39 -0400)]
Merge pull request #3397 from brauner/2020-05-03/fixes
conf: introduce userns_exec_mapped_root()
Christian Brauner [Mon, 4 May 2020 11:26:43 +0000 (13:26 +0200)]
conf: support console setup on containers without rootfs
This depends on the new mount api.
Closes #3164.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Mon, 4 May 2020 08:56:05 +0000 (10:56 +0200)]
conf: introduce userns_exec_mapped_root()
to avoid the overhead of calling to lxc-usernsexec whenever we can.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Sun, 3 May 2020 13:51:44 +0000 (09:51 -0400)]
Merge pull request #3396 from brauner/2020-05-03/fixes
cgroup: fixes
Christian Brauner [Sun, 3 May 2020 12:08:11 +0000 (14:08 +0200)]
cgroups: premount cgroups on cgroup2-only systems
Fixes: #3183
Cc: Thomas Moschny <thomas.moschny@gmx.de>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 3 May 2020 10:01:44 +0000 (12:01 +0200)]
common.conf: add cgroup2 default device limits
Fixes: #3183
Cc: Thomas Moschny <thomas.moschny@gmx.de>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 3 May 2020 09:59:15 +0000 (11:59 +0200)]
cgroups: ignore cgroup2 limits on non-cgroup2 layouts
Mixing cgroup2 and legacy cgroup systems such that some controllers are enabled
in legacy cgroup hierarchies and other controllers in the unified hierarchies
is simply not something we're supporting. Even systemd's hybrid layout (crazy)
doesn't bind controllers to the unified cgroup hierarchy.
Fixes: #3183
Cc: Thomas Moschny <thomas.moschny@gmx.de>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 22 Apr 2020 10:01:42 +0000 (12:01 +0200)]
Merge pull request #3392 from tomponline/tp-ipvlan-netlink
src/lxc/network: Fixes netlink attribute type 1 has an invalid length message
Thomas Parrott [Wed, 22 Apr 2020 09:11:07 +0000 (10:11 +0100)]
src/lxc/network: Fixes netlink attribute type 1 has an invalid length message
Fixes #3386
Signed-off-by: Thomas Parrott <thomas.parrott@canonical.com>
Christian Brauner [Tue, 21 Apr 2020 17:14:10 +0000 (19:14 +0200)]
Merge pull request #3391 from stgraber/master
apparmor: Allow boot_id
Stéphane Graber [Tue, 21 Apr 2020 17:09:07 +0000 (13:09 -0400)]
apparmor: Allow boot_id
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Christian Brauner [Thu, 16 Apr 2020 08:02:59 +0000 (10:02 +0200)]
configure: fix coverity builds
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Wed, 15 Apr 2020 21:39:18 +0000 (17:39 -0400)]
Merge pull request #3385 from brauner/2020-04-15/fixes
cgroups: fix cgroup limit braino
Christian Brauner [Wed, 15 Apr 2020 21:15:49 +0000 (23:15 +0200)]
cgroups: fix cgroup limit braino
Fixes: https://discuss.linuxcontainers.org/t/memory-limits-no-longer-being-applied/7429/7
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Wed, 15 Apr 2020 19:41:05 +0000 (15:41 -0400)]
Merge pull request #3384 from brauner/master
travis: coverity gets confused about the %m printf extension in glibc
Christian Brauner [Wed, 15 Apr 2020 19:27:53 +0000 (21:27 +0200)]
travis: coverity gets confused about the %m printf extension in glibc
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Wed, 15 Apr 2020 14:55:20 +0000 (10:55 -0400)]
Merge pull request #3383 from brauner/2020-04-15/fixes
log: set GNU_SOURCE as it might help coverity along