Re: [lxc-devel] [PATCH v3 - resend] lxc-ls: check for ENOMEM and tweaking

2016-01-18 Thread Serge Hallyn
Quoting Christian Brauner (christian.brau...@mailbox.org): > - If lxc_container_new() fails we check for ENOMEM and if so goto out. If > ENOMEM is not set we will simply continue. The same goes for the call to > regcomp() but instead of checking for ENOMEM we need to check for > REG_ESPACE. >

Re: [lxc-devel] [RFC 1/2] lxc-start: added --start-frozen

2016-01-18 Thread Serge Hallyn
Quoting Wolfgang Bumiller (w.bumil...@proxmox.com): > Add the possibility to start a container in a frozen state. > > Signed-off-by: Wolfgang Bumiller > --- > doc/lxc-start.sgml.in | 12 > src/lxc/arguments.h| 3 +++ > src/lxc/conf.h | 1 + >

Re: [lxc-devel] [RFC 2/2] cleanup: lxc_container::want_* comment descriptions

2016-01-18 Thread Serge Hallyn
Quoting Wolfgang Bumiller (w.bumil...@proxmox.com): > They change a value and return true on success rather than > fetching the value as the comments previously suggested. > > Signed-off-by: Wolfgang Bumiller Yikes, yes the return value description is entirely wrong.

[lxc-devel] [PATCH] Adapt manpage for lxc-ls to new C implementation

2016-01-18 Thread Christian Brauner
- explain new -r,--regex flag - explain new numeric argument to --nesting - include common options as lxc-ls now uses the standard lxc parser - add history section and update authors Signed-off-by: Christian Brauner --- doc/lxc-ls.sgml.in | 65

Re: [lxc-devel] Swap Accounting :Query

2016-01-18 Thread Serge Hallyn
Quoting Nehal J Wani (nehaljw.k...@gmail.com): > I am using the most recent version of lxcfs, commit: > 17f9a5a9d647467e3858fa751e40cc7c022dd475 > > When I spawn a container with the settings... > > lxc.cgroup.memory.limit_in_bytes = 256M > lxc.cgroup.memory.memsw.limit_in_bytes = 512M > > ...

Re: [lxc-devel] [PATCH RFC] Introduce new security.nscapability xattr

2016-01-18 Thread Serge E. Hallyn
On Fri, Dec 04, 2015 at 02:21:16PM -0600, Serge E. Hallyn wrote: > Quoting Eric W. Biederman (ebied...@xmission.com): > > "Serge E. Hallyn" writes: > > > > > A common way for daemons to run with minimal privilege is to start as > > > root, > > > perhaps setuid-root,