lxcfs 2.0.4-0ubuntu1~ubuntu16.04.1 source package in Ubuntu

Changelog

lxcfs (2.0.4-0ubuntu1~ubuntu16.04.1) xenial; urgency=medium

  * New upstream bugfix release (2.0.4) (LP: #1632140):
    - Fix test_reload for lxcfs chroot
    - Virtualize more of the meminfo fields
    - pam: fix race in cgroup creation
    - meminfo: don't show negative swapfree
    - bindings: improve debugging
    - bindings: use openat fd for fstatat(), unlinkat()
    - bindings: close open fds on error
    - bindings: grant access to /var/lib/lxcfs
    - bindings: enable access to /var/lib/lxcfs/cgroup
    - bindings: allow access to /var/lib/lxcfs/proc
    - lxcfs, bindings: show "." and ".." dir entries
    - lxcfs: better fs behavior on /var/lib/lxcfs
    - bindings: non functional changes
    - bindings: set errno in pick_controller_from_path()
    - bindings: more consistent fs behavior
    - add pld linux support
    - don't use argv[0] in usage output
    - bindings: revert cgroup check
    - bindings: improve returned errnos
    - bindings: make rmdir behave more consistently
    - libtool: do not link lxcfs against liblxcfs
    - bindings, lxcfs: improve debugging
    - bindings: fix debug macro
    - autotools: add -avoid-version
    - bindings: restore original working directory
    - bindings: add function to check fs type
    - bindings: agnostic naming
    - bindings: use chroot() on ramfs
    - bindings: fix type weirdness with statfs f_type
    - bindings: make pivot_enter() contain all its code
  * Drop all patches, now upstream
  * Cherry-pick from upstream:
    - 0001-Add-Documentation-key-to-systemd-unit.patch
  * Update linitan overrides

 -- Stéphane Graber <email address hidden>  Wed, 05 Oct 2016 14:25:51 +0200

Upload details

Uploaded by:
Stéphane Graber
Uploaded to:
Xenial
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
lxcfs_2.0.4.orig.tar.gz 393.7 KiB fec832aae67783449798ebc8ed5f625eacad806e6876f2b86597310c8fd5d95d
lxcfs_2.0.4-0ubuntu1~ubuntu16.04.1.debian.tar.xz 62.0 KiB 45fd1bf68e92eaee07f9d93354b8292b71f2e951132c1f4f6682c5e346c5c7f2
lxcfs_2.0.4-0ubuntu1~ubuntu16.04.1.dsc 2.2 KiB 6bddf162805f6356be1f64600630884fb562820008e5721f9d4aee8ad8a20faf

View changes file

Binary packages built by this source

libpam-cgfs: PAM module for managing cgroups for LXC

 Containers are insulated areas inside a system, which have their own namespace
 for filesystem, network, PID, IPC, CPU and memory allocation and which can be
 created using the Control Group and Namespace features included in the Linux
 kernel.
 .
 This provides a Pluggable Authentication Module (PAM) to provide
 logged-in users with a set of cgroups which they can administer.
 This allows for instance unprivileged containers, and session
 management using cgroup process tracking.

libpam-cgfs-dbgsym: debug symbols for package libpam-cgfs

 Containers are insulated areas inside a system, which have their own namespace
 for filesystem, network, PID, IPC, CPU and memory allocation and which can be
 created using the Control Group and Namespace features included in the Linux
 kernel.
 .
 This provides a Pluggable Authentication Module (PAM) to provide
 logged-in users with a set of cgroups which they can administer.
 This allows for instance unprivileged containers, and session
 management using cgroup process tracking.

lxcfs: FUSE based filesystem for LXC

 LXCFS provides a FUSE based filesystem to improve the LXC experience
 within the containers.
 .
 This filesystem offers both a cgroupfs-like view for use by
 unprivileged containers which wouldn't otherwise be allowed to mount
 cgroupfs. And a set of files that are meant to be bind-mounted over
 their /proc equivalent to make them cgroup-aware.

lxcfs-dbgsym: debug symbols for package lxcfs

 LXCFS provides a FUSE based filesystem to improve the LXC experience
 within the containers.
 .
 This filesystem offers both a cgroupfs-like view for use by
 unprivileged containers which wouldn't otherwise be allowed to mount
 cgroupfs. And a set of files that are meant to be bind-mounted over
 their /proc equivalent to make them cgroup-aware.