1. 12 7月, 2013 1 次提交
  2. 16 4月, 2013 1 次提交
  3. 09 4月, 2013 3 次提交
    • D
      Unmount existing filesystems under user specified mounts in LXC · 1bd955ed
      Daniel P. Berrange 提交于
      If the user requests a mount for /run, this may hide any existing
      mounts that are lower down in /run. The result is that the
      container still sees the mounts in /proc/mounts, but cannot
      access them
      
      sh-4.2# df
      df: '/run/user/501/gvfs': No such file or directory
      df: '/run/media/berrange/LIVE': No such file or directory
      df: '/run/media/berrange/SecureDiskA1': No such file or directory
      df: '/run/libvirt/lxc/sandbox': No such file or directory
      Filesystem                      1K-blocks      Used Available Use% Mounted on
      /dev/mapper/vg_t500wlan-lv_root 151476396 135390200   8384900  95% /
      tmpfs                             1970888      3204   1967684   1% /run
      /dev/sda1                          194241    155940     28061  85% /boot
      devfs                                  64         0        64   0% /dev
      tmpfs                                  64         0        64   0% /sys/fs/cgroup
      tmpfs                             1970888      1200   1969688   1% /etc/libvirt-sandbox/scratch
      
      Before mounting any filesystem at a particular location, we
      must recursively unmount anything at or below the target mount
      point
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      1bd955ed
    • D
      Move lxcContainerUnmountSubtree further up in file · 2863ca22
      Daniel P. Berrange 提交于
      Ensure lxcContainerUnmountSubtree is at the top of the
      lxc_container.c file so it is easily referenced from
      any other method. No functional change
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      2863ca22
    • B
      Implement support for <hostdev caps=net> · 442d6a05
      Bogdan Purcareata 提交于
      This allows a container-type domain to have exclusive access to one of
      the host's NICs.
      
      Wire <hostdev caps=net> with the lxc_controller - when moving the newly
      created veth devices into a new namespace, also look for any hostdev
      devices that should be moved. Note: once the container domain has been
      destroyed, there is no code that moves the interfaces back to the
      original namespace. This does happen, though, probably due to default
      cleanup on namespace destruction.
      Signed-off-by: NBogdan Purcareata <bogdan.purcareata@freescale.com>
      442d6a05
  4. 04 4月, 2013 1 次提交
  5. 23 3月, 2013 3 次提交
  6. 11 3月, 2013 1 次提交
  7. 08 3月, 2013 1 次提交
  8. 16 1月, 2013 1 次提交
    • G
      libvirt: lxc: don't mkdir when selinux is disabled · 8d63af22
      Gao feng 提交于
      libvirt lxc will fail to start when selinux is disabled.
      error: Failed to start domain noroot
      error: internal error guest failed to start: PATH=/bin:/sbin TERM=linux container=lxc-libvirt container_uuid=b9873916-3516-c199-8112-1592ff694a9e LIBVIRT_LXC_UUID=b9873916-3516-c199-8112-1592ff694a9e LIBVIRT_LXC_NAME=noroot /bin/sh
      2013-01-09 11:04:05.384+0000: 1: info : libvirt version: 1.0.1
      2013-01-09 11:04:05.384+0000: 1: error : lxcContainerMountBasicFS:546 : Failed to mkdir /sys/fs/selinux: No such file or directory
      2013-01-09 11:04:05.384+0000: 7536: info : libvirt version: 1.0.1
      2013-01-09 11:04:05.384+0000: 7536: error : virLXCControllerRun:1466 : error receiving signal from container: Input/output error
      2013-01-09 11:04:05.404+0000: 7536: error : virCommandWait:2287 : internal error Child process (ip link del veth1) unexpected exit status 1: Cannot find device "veth1"
      
      fix this problem by checking if selinuxfs is mounted
      in host before we try to create dir /sys/fs/selinux.
      Signed-off-by: NGao feng <gaofeng@cn.fujitsu.com>
      8d63af22
  9. 14 1月, 2013 4 次提交
  10. 09 1月, 2013 1 次提交
  11. 08 1月, 2013 1 次提交
  12. 21 12月, 2012 7 次提交
  13. 19 12月, 2012 1 次提交
  14. 18 12月, 2012 4 次提交
  15. 28 11月, 2012 3 次提交
  16. 02 11月, 2012 2 次提交
  17. 26 9月, 2012 3 次提交
  18. 21 9月, 2012 2 次提交