Until we bump the SONAME to liblxc2, only symbol additions and struct
member additions are allowed.
Adding struct members in the middle of the struct breaks backward
compatibility.
This commit makes it clear when struct members were added and moves a
few members that were added in the middle of t
Hi,
Thanks for reporting this.
It was clearly not intentional, LXC's policy with regard to liblxc is
that we will add new symbols and append struct members but we will not
modify or remove symbols nor add stuff in the middle of existing
structs.
Clearly we failed with regard to the lxc_container
Hi,
We're using LXC in some of our projects and we've found that ABI gets
broken without soname changes. And I don't mean extended (where
versioning would be enough), I mean broken.
Eg. this commit:
18aa217bb187b551206fe66075229ba382a1dbe4
It adds destroy_with_snapshots() function pointer insid
Hi.If I have configured a container with certain X amount of memory and if the
host/non-containerized process are under pressure, then they can steal the
containers memory. I wanted to understand if this is any different when it
comes to KVM. Does host in a VM environment steal guest pages in ca
Hello,
since systemd 219 was released and included in Archlinux unprivileged Archlinux
containers work out of the box. Simply bootstrapping a barebone rootfs via
pacstrap and uidmapshifting it will suffice. However, it would be convenient to
be able to download unprivileged Archlinux containers vi