-
Notifications
You must be signed in to change notification settings - Fork 73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Running needrestart within an lxc container that allows nesting #170
Comments
Can you please post the output of |
Sure: |
This is an issue in the external diff --git a/perl/lib/NeedRestart/Utils.pm b/perl/lib/NeedRestart/Utils.pm
index ba45ba6..29b6fe4 100644
--- a/perl/lib/NeedRestart/Utils.pm
+++ b/perl/lib/NeedRestart/Utils.pm
@@ -45,7 +45,11 @@ our @EXPORT = qw(
nr_fork_pipe2
);
-my %ptable = map {$_->pid => $_} @{ new Proc::ProcessTable(enable_ttys => 1)->table };
+my %ptable;
+{
+ local $SIG{__WARN__} = sub {};
+ %ptable = map {$_->pid => $_} @{ new Proc::ProcessTable(enable_ttys => 1)->table };
+}
sub nr_ptable() {
return \%ptable; |
Tested, it does hide the messages. |
Thanks! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
hi,
I just tried running needrestart in an lxc container with
Apparently lxc mounts proc multiple times:
to allow nesting. When running needrestart the proc in /dev/.lxc throws plenty of Can't opendir Permission denied, other than that needrestart appears to work just fine.
Is there anyway to blacklist /dev/.lxc?
The text was updated successfully, but these errors were encountered: