1. 23 3月, 2013 1 次提交
  2. 11 3月, 2013 1 次提交
  3. 08 3月, 2013 1 次提交
  4. 16 1月, 2013 1 次提交
    • G
      libvirt: lxc: don't mkdir when selinux is disabled · 8d63af22
      Gao feng 提交于
      libvirt lxc will fail to start when selinux is disabled.
      error: Failed to start domain noroot
      error: internal error guest failed to start: PATH=/bin:/sbin TERM=linux container=lxc-libvirt container_uuid=b9873916-3516-c199-8112-1592ff694a9e LIBVIRT_LXC_UUID=b9873916-3516-c199-8112-1592ff694a9e LIBVIRT_LXC_NAME=noroot /bin/sh
      2013-01-09 11:04:05.384+0000: 1: info : libvirt version: 1.0.1
      2013-01-09 11:04:05.384+0000: 1: error : lxcContainerMountBasicFS:546 : Failed to mkdir /sys/fs/selinux: No such file or directory
      2013-01-09 11:04:05.384+0000: 7536: info : libvirt version: 1.0.1
      2013-01-09 11:04:05.384+0000: 7536: error : virLXCControllerRun:1466 : error receiving signal from container: Input/output error
      2013-01-09 11:04:05.404+0000: 7536: error : virCommandWait:2287 : internal error Child process (ip link del veth1) unexpected exit status 1: Cannot find device "veth1"
      
      fix this problem by checking if selinuxfs is mounted
      in host before we try to create dir /sys/fs/selinux.
      Signed-off-by: NGao feng <gaofeng@cn.fujitsu.com>
      8d63af22
  5. 14 1月, 2013 4 次提交
  6. 09 1月, 2013 1 次提交
  7. 08 1月, 2013 1 次提交
  8. 21 12月, 2012 7 次提交
  9. 19 12月, 2012 1 次提交
  10. 18 12月, 2012 4 次提交
  11. 28 11月, 2012 3 次提交
  12. 02 11月, 2012 2 次提交
  13. 26 9月, 2012 3 次提交
  14. 21 9月, 2012 3 次提交
  15. 07 9月, 2012 1 次提交
  16. 31 7月, 2012 1 次提交
    • E
      build: fix build without HAVE_CAPNG · 6f926c5e
      Eric Blake 提交于
      Otherwise, a build may fail with:
      
      lxc/lxc_conatiner.c: In function 'lxcContainerDropCapabilities':
      lxc/lxc_container.c:1662:46: error: unused parameter 'keepReboot' [-Werror=unused-parameter]
      
      * src/lxc/lxc_container.c (lxcContainerDropCapabilities): Mark
      parameter unused.
      6f926c5e
  17. 30 7月, 2012 2 次提交
  18. 23 7月, 2012 1 次提交
    • O
      Desert the FSF address in copyright · f9ce7dad
      Osier Yang 提交于
      Per the FSF address could be changed from time to time, and GNU
      recommends the following now: (http://www.gnu.org/licenses/gpl-howto.html)
      
        You should have received a copy of the GNU General Public License
        along with Foobar.  If not, see <http://www.gnu.org/licenses/>.
      
      This patch removes the explicit FSF address, and uses above instead
      (of course, with inserting 'Lesser' before 'General').
      
      Except a bunch of files for security driver, all others are changed
      automatically, the copyright for securify files are not complete,
      that's why to do it manually:
      
        src/security/security_selinux.h
        src/security/security_driver.h
        src/security/security_selinux.c
        src/security/security_apparmor.h
        src/security/security_apparmor.c
        src/security/security_driver.c
      f9ce7dad
  19. 19 7月, 2012 2 次提交
    • D
      lxcContainerMountCGroups also mounts a tmpfs that needs to be labeled. · 9f5ef4d9
      Dan Walsh 提交于
      This patch passes down the sec_mount_options to the
      lxcContainerMountCGroups function and then mounts the tmpfs with
      the correct label.
      9f5ef4d9
    • D
      Mount all tmpfs filesystems with correct SELinux label · e0018429
      Daniel J Walsh 提交于
      Basically within a Secure Linux Container (virt-sandbox) we want all content
      that the process within the container can write to be labeled the same.  We
      are labeling the physical disk correctly but when we create "RAM" based file
      systems
      libvirt is not labeling them, and they are defaulting to tmpfs_t, which will
      will not allow the processes to write.  This patch labels the RAM based file
      systems correctly.
      e0018429