On 05/14/2013 07:02 AM, Kir Kolyshkin wrote:
Oh my, four cases of whitespace-at-eol which I had to fixed manually.
Sorry about that. I think I got to used to checkpatch and the such that
I forget to verify all of those manually.
Wanted to apply it nevertheless and fix some things myself, but
On 05/11/2013 04:14 AM, Igor M Podlesny wrote:
On 30 April 2013 13:16, Glauber Costa glom...@openvz.org wrote:
@@ -576,7 +765,9 @@ int ct_do_open(vps_handler *h, vps_param *param)
{
int ret;
char path[STR_SIZE];
+ char upath[STR_SIZE];
struct stat st;
+
Oh my, four cases of whitespace-at-eol which I had to fixed manually.
Wanted to apply it nevertheless and fix some things myself, but then the
list grew out too big.
Plus please see inline.
On 04/29/2013 10:16 PM, Glauber Costa wrote:
From: Glauber Costa glom...@parallels.com
This patch
From: Glauber Costa glom...@parallels.com
This patch allows the execution of unprivileged containers running ontop
of an upstream Linux Kernel. We will run at whatever UID is found in the
configuration file (so far empty, thus disabled).
Signed-off-by: Glauber Costa glom...@parallels.com
---
On 30 April 2013 13:16, Glauber Costa glom...@openvz.org wrote:
@@ -576,7 +765,9 @@ int ct_do_open(vps_handler *h, vps_param *param)
{
int ret;
char path[STR_SIZE];
+ char upath[STR_SIZE];
struct stat st;
+ unsigned long *local_uid =