[lxc-devel] [lxc/lxc] 82866e: Enable default seccomp profile for all distros
GitHub
noreply at github.com
Thu Jul 3 19:58:52 UTC 2014
Branch: refs/heads/stable-1.0
Home: https://github.com/lxc/lxc
Commit: 82866e3c00f6ad5271378cd9102afd12c843e588
https://github.com/lxc/lxc/commit/82866e3c00f6ad5271378cd9102afd12c843e588
Author: Stéphane Graber <stgraber at ubuntu.com>
Date: 2014-07-03 (Thu, 03 Jul 2014)
Changed paths:
M config/templates/Makefile.am
M config/templates/centos.common.conf.in
M config/templates/centos.userns.conf.in
A config/templates/common.seccomp
M config/templates/debian.common.conf.in
M config/templates/debian.userns.conf.in
M config/templates/fedora.common.conf.in
M config/templates/fedora.userns.conf.in
M config/templates/gentoo.common.conf.in
M config/templates/gentoo.moresecure.conf.in
M config/templates/gentoo.userns.conf.in
M config/templates/oracle.common.conf.in
M config/templates/oracle.userns.conf.in
M config/templates/plamo.common.conf.in
M config/templates/plamo.userns.conf.in
R config/templates/ubuntu.priv.seccomp
Log Message:
-----------
Enable default seccomp profile for all distros
This updates the common config to include Serge's seccomp profile by
default for privileged containers.
Signed-off-by: Stéphane Graber <stgraber at ubuntu.com>
Acked-by: Serge E. Hallyn <serge.hallyn at ubuntu.com>
Commit: a8fe4754c9da6cce95aeb042f6fc015cd6e5569b
https://github.com/lxc/lxc/commit/a8fe4754c9da6cce95aeb042f6fc015cd6e5569b
Author: Serge Hallyn <serge.hallyn at ubuntu.com>
Date: 2014-07-03 (Thu, 03 Jul 2014)
Changed paths:
M src/lxc/conf.c
Log Message:
-----------
chown_mapped_root: don't try chgrp if we don't own the file
New kernels require that to have privilege over a file, your
userns must have the old and new groups mapped into your userns.
So if a file is owned by our uid but another groupid, then we
have to chgrp the file to our primary group before we can try
(in a new user namespace) to chgrp the file to a group id in the
namespace.
But in some cases (when cloning) the file may already be mapped
into the container. Now we cannot chgrp the file to our own
primary group - and we don't have to.
So detect that case. Only try to chgrp the file to our primary
group if the file is owned by our euid (i.e. not by the container)
and the owning group is not already mapped into the container by
default.
With this patch, I'm again able to both create and clone containers
with no errors again.
Reported-by: S.Çağlar Onur <caglar at 10ur.org>
Signed-off-by: Serge Hallyn <serge.hallyn at ubuntu.com>
Acked-by: Stéphane Graber <stgraber at ubuntu.com>
Commit: c4c3f631ab8a8066ca5320ef158118a699fecaf1
https://github.com/lxc/lxc/commit/c4c3f631ab8a8066ca5320ef158118a699fecaf1
Author: Rodrigo Vaz <rodrigo at heroku.com>
Date: 2014-07-03 (Thu, 03 Jul 2014)
Changed paths:
M src/lxc/lxc_start.c
M src/lxc/lxccontainer.c
Log Message:
-----------
make the container exit code propagate to lxc-start exit code when appropriate
Signed-off-by: Rodrigo Sampaio Vaz <rodrigo at heroku.com>
Acked-by: Serge Hallyn <serge.hallyn at ubuntu.com>
Compare: https://github.com/lxc/lxc/compare/3a8c6134711b...c4c3f631ab8a
More information about the lxc-devel
mailing list