This is with 4.0.4 and the bug is fixed in 4.0.6 which it seems hasn't
made it into Groovy yet (but is released). I'm not sure what Stéphane's
timeline is there.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
On Mon, Jun 07, 2021 at 05:14:50AM -, Andrea Righi wrote:
> Public bug reported:
>
> The lxc autotest is failing with the following error(s) on the latest
> kernel linux-unstable 5.13:
>
> FAIL: lxc-tests: lxc-test-apparmor (1s)
> ---
> failed - opened /sys/kernel/uevent_helper
> ---
> PASS:
I'm currently treating this as an upstream kernel regression reported
here
https://lore.kernel.org/regressions/20210607142245.eikvyeacqwwu6dn3@wittgenstein
We should wait whether a simple revert will be acceptable or whether
anything else is needed from LXC specifically.
--
You received this bu
Hm, what is the LXC version used here? Is it the one in Bionic?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776381
Title:
lxc-test-api-reboot will hang with autopkgtest
To manage notifications a
Public bug reported:
On
Linux wittgenstein 5.8.0-33-generic #36-Ubuntu SMP Wed Dec 9 09:14:40 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description:Ubuntu 20.10
Release:20.10
Codename: groovy
iwd manages to trigger the following warn:
[ 47.003606] NET:
> ip addr
1: lo: mtu 65536 qdisc noqueue state UNKNOWN group
default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2
Public bug reported:
On
Linux wittgenstein 5.8.0-33-generic #36-Ubuntu SMP Wed Dec 9 09:14:40 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description:Ubuntu 20.10
Release:20.10
Codename: groovy
iwd manages to trigger the following warn:
[ 47.003606] NET:
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779678
Title:
deadlocks in copy_net_ns
To manage notifications about this bug go
I've been running a 4.18 kernel for a long time now and I haven't been
able to reproduce the bug. Please note however, that this bug was a
race. Meaning, it is easily possible that the race has just gotten so
unlikely that it doesn't matter anymore. I doubt it however, since a)
there's a proper exp
Hey, so we're seeing an instance of this issue and the problem is that a
lock is taken on an fd instead of a path. This should be legal and we
urgently need a fix for this since this is starting to break all systemd
services running in a container that use PrivateUsers= and anything else
that hits
** Changed in: iptables (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791958
Title:
iptables-restore is missing -w option
To manage notifications about thi
Hi @kleber-souza,
The kernel fixes the issue. I changed the tag to
verification-done. Thanks!
Christian
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
It is configurable. For LXD you can do:
lxc config set limits.kernel.memlock 200
or in a lxc config file:
lxc.prlimit.memlock = 200
** Changed in: lxd (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
Public bug reported:
Hey everyone,
We recently pushed support for ambient capabilities and namespaces filesystem
capabilities
to libcap2 [1]. Together with Andrew Morgan, Serge Hallyn and I have released a
version 2.26
of libcap2. Note that libcap2 has moved to a new location [2]
The 2.26 rele
If the systemd version doesn't support hybrid cgroup layout on xenial
then fine but I thought it did. But please make sure that Xenial doesn't
have anything mounted on /sys/fs/cgroup/unified.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
** Tags removed: verification-needed-bionic verification-needed-cosmic
verification-needed-trusty verification-needed-xenial
** Tags added: verification-done-bionic verification-done-cosmic
verification-done-trusty verification-done-xenial
--
You received this bug notification because you are a
** Tags removed: verification-needed-bionic verification-needed-cosmic
** Tags added: verification-done-bionic verification-done-cosmic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801924
Title:
Thanks Joseph, the kernel resolves the issue!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789746
Title:
getxattr: always handle namespaced attributes
To manage notifications about this bug go to
ance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
** Changed in: linux (Ubuntu)
Status: New => In Progress
** Description changed:
- We currently keep a referenc
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824719
Title:
[shiftfs] Allow stacking overlayfs on top
** Summary changed:
- [shiftfs] Allow stacking overlayfs on top
+ shiftfs: Allow stacking overlayfs on top
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824719
Title:
shiftfs: Allow stacking overl
** Description changed:
SRU Justification
-
Impact: We currently keep a reference to the shiftfs mark mount's
shiftfs_super_info which was stashed in the superblock of the mark mount. The
problem is that we only take a reference to the mount of the underlay, i.e. the
filesystem that is
** Description changed:
SRU Justification
Impact: We currently keep a reference to the shiftfs mark mount's
shiftfs_super_info which was stashed in the superblock of the mark mount. The
problem is that we only take a reference to the mount of the underlay, i.e. the
filesystem that is *u
** Description changed:
SRU Justification
Impact: We currently keep a reference to the shiftfs mark mount's
shiftfs_super_info which was stashed in the superblock of the mark mount. The
problem is that we only take a reference to the mount of the underlay, i.e. the
filesystem that is *u
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824735
Title:
shiftfs: use after free when checking mount options
To manage
rn code to trap to userspace")
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
** Changed in: linux (Ubuntu)
Is this a flake or consistently reproducible?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848587
Title:
lxc 3.0.4-0ubuntu1 ADT test failure with linux 5.4.0-1.2
To manage notifications about thi
Fwiw, Seth sent the patch upstream and it's in mainline and backported already:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61129dd29f7962f278b618a2a3e8fdb986a66dc8
** Changed in: cross-toolchain-base-ports (Ubuntu)
Status: Confirmed => Fix Committed
--
Y
mp&id=2aa8d8d04ca29c3269154e1d48855e498be8882f
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (Ubuntu)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Ch
the lower dentry before
calling vfs_unlink() on it and dput() it afterwards.
Regression Potential: Limited to shiftfs.
Test Case: Compiled a kernel with the fix and used the reproducer above
to verify that the kernel cannot be crashed anymore.
** Affects: linux (Ubuntu)
Importance: Undecide
On Mon, Dec 09, 2019 at 08:41:18PM -, Ryutaroh Matsumoto wrote:
> https://github.com/lxc/lxc/issues/3221 Another LXC-container-doesn't
> -start-at-all type issue also observed on Ubuntu Eoan with
> systemd.unified_cgroup_hierarchy as well as Fedora 31.
That seems specific to LXC stable-3.0 wh
No, but might have been an allocation error which we fixed in the meantime. The
error can only come from:
ENOMEM The kernel could not allocate a free page to copy filenames or data into.
That's the only reason mount() can fail with ENOMEM from just glancing at the
manpage. I'll take another close
On March 27, 2020 10:57:17 PM GMT+01:00, Seth Forshee
wrote:
>Applied the patches from linux-next, plus one additional fix I saw,
>"sysfs: fix static inline declaration of sysfs_groups_change_owner()".
>@Christian, please let me know if there are any other fixes we need to
>grab.
>
>** Changed in
I think that's already fixed in the edge snap but we haven't yet rolled
that out to stable. Can you test with edge?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869661
Title:
lxc 3.23 (?) breaks n
The patch series has been acked upstream and is sitting in Dave Miller's
tree. We should backport it to 5.4!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865359
Title:
sysfs: incorrect network dev
Public bug reported:
SRU Justification
Impact:
patchsets.)
We have been struggling with a bug surrounding the ownership of network
device sysfs files when moving network devices between network
namespaces owned by different user namespaces reported by multiple
users.
Currently, when moving netw
That's an old version, sorry. It's already in Dave's tree. The merge commit is
here:
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=ebb4a4bf76f164457184a3f43ebc1552416bc823
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is sub
/*
* Device creation by udev is asynchronous and waiting may be
* required. Busy wait for 10ms and then fall back to polling every
* 10ms for the allowed timeout (default 10s, max 10m). This is
* done to optimize for the common case where the device is
* immediately available and to avoid pena
If you're running zfs tools in a container setting the timeout to 0 will
likely be helpful. The device node will never appear in the containers /dev
since a) it's a tmpfs and b) even if it were a devtmpfs it wouldn't help
since devtmpfs isn't namespaced. (In fact udevd will even ignore any device
e
On Mon, Apr 30, 2018, 12:41 Ryan Harper <1760...@bugs.launchpad.net>
wrote:
> On Mon, Apr 30, 2018 at 12:14 PM, Colin Ian King
> <1760...@bugs.launchpad.net> wrote:
> > The code actually polls /dev/zfs until it appears. The issue here is
> > that it does not appear after 10 seconds, and then it gi
I tested on 4.14 (Ubuntu) and 4.15 (Mainline) tcp_keepalive_time appears
on both in new user namespaces.
** Tags added: kernel-fixed-upstream
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1736804
Tit
The relevant commit that namespaces this file is:
commit 13b287e8d1cad951634389f85b8c9b816bd3bb1e
Author: Nikolay Borisov
Date: Thu Jan 7 16:38:43 2016 +0200
ipv4: Namespaceify tcp_keepalive_time sysctl knob
Different net namespaces might have different requirements as to
the keep
The first thing we need to see is why this is blocking. Do you have any
additional logs?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1762680
Title:
upgrades fail to complete
To manage notificatio
I'm not super familiar with this but that sounds reasonable to me. The
unit shouldn't be re-triggered.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1762680
Title:
upgrades fail to complete
To mana
On Tue, Feb 20, 2018 at 08:43:41PM -, Martin Pitt wrote:
> Public bug reported:
>
> As per documentation, the `-B best` option should automatically select
> the best backingstore, falling back all the way to dir.
>
> But apparently it doesn't, at least not in artful's 2.1.0-0ubuntu1:
Hm, is
** Changed in: lxc (Ubuntu)
Status: New => Won't Fix
** Changed in: lxc (Ubuntu)
Status: Won't Fix => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1751780
Title:
lxc-snapsh
** Changed in: lxc (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1751780
Title:
lxc-snapshot crashes when removing non-existing snapshot
To manage
Public bug reported:
Hey,
Currently any service that has PrivateDevices=true set will fail to
start in unprivileged containers since mknod is not possible and in
privileged containers that drop CAP_MKNOD. I pushed a patch to systemd
upstream that solves this problem and makes PrivateDevices useab
We just had a short discussion on systemd and for systemd 229 on 16.04
we also need:
9e5f825280192be429cc79153235d12778427fae :
https://github.com/systemd/systemd/commit/9e5f825280192be429cc79153235d12778427fae
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Public bug reported:
Hey everyone,
I sent a few patches to fix a regression caused by wrong behavior in the
devpts filesystem when used with the TIOCGPTPEER ioctl() we implemented
a while back. The context and reproducer can be taken from my following
commit message. The required patches are in G
Oh sorry, it would be great if we could cherry-pick these as this
currently breaks users. Sorry for all the pre-release extra work this
causes. :)
Christian
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1755857
Title:
devpts: handle bind-mounts
To manage notifications about this bug g
Thanks!
Christian
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748232
Title:
rtnetlink: enable namespace identifying properties in rtnetlink
requests
To manage notifications about this bug go
TIOCGPTPEER was introduced in 4.13 so if we could backport it to the kernels we
still support that would be great.
The patches will likely also be included in upstream stable updates.
Thanks!
Christian
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
** Tags removed: verification-needed verification-needed-artful
** Tags added: verification-done-artful
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1734410
Title:
systemd: handle undelegated cgrou
Sorry for the brevity before. I tested this with systemd 23{5,6}
inside xenial and artful containers which is really the only case
where it matters.
A systemd with my patch applied would happily:
1. skip over undelegated /sys/fs/cgroup/unified mountpoints
(e07aefbd675b651f8d45b5fb458f2747b04d6e
Can we get some logs for the LXC containers that created and fail?
Otherwise this is very much a black box.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1757470
Title:
apport autopkgtests broken (v
** Changed in: lxc (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1758380
Title:
unpriveleged containers no longer could start due to start.c:
lxc_spawn
What? That's totally possible. Simply try unshare -n inside an
unprivileged container as root.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1635382
Title:
PrivateNetwork=yes (hostnamed, localed) do
See
https://lists.ubuntu.com/archives/kernel-team/2019-September/103670.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836912
Title:
ipv4: enable route flushing in network namespaces
To manage
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837231
Title:
UBUNTU: SAUCE: shiftfs: pass correct point down
To man
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837223
Title:
shiftfs: add O_DIRECT support
To manage notifications
https://lists.ubuntu.com/archives/kernel-team/2019-September/103672.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836912
Title:
ipv4: enable route flushing in network namespaces
To manage not
** Tags removed: verification-needed-bionic verification-needed-disco
** Tags added: verification-done-bionic verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836910
Title:
br_
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838677
Title:
shiftfs: allow overlayfs
To manage notifications abo
+1GB
sudo lxc exec b1 -- rm dummy.file
sudo zfs list default/containers/b1 # will show +1GB on a non-fixed kernel and
-1GB on a fixed kernel
Target Kernels: All LTS kernels with shiftfs support.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbr
cts: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (Ubuntu)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
--
You r
Public bug reported:
SRU Justification
Impact: Currently, shiftfs maintains a kmem cache for struct
shiftfs_file_info which stashes away a struct path and the struct file
for the underlay. The path however is never used anywhere so the struct
shiftfs_file_info and therefore the whole kmem cache c
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
uced with the new patch.
Target kernels: All LTS kernels that do support shiftfs, if possible.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => C
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
** Changed in: linux (Ubuntu Disco)
Assignee: (unassigned) => Christian Brauner (cbrauner)
--
You received th
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
** Changed in: linux (Ubuntu Disco)
Assignee: (unassigned) => Christian Brauner (cbrauner)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
** Changed in: linux (Ubuntu Disco)
Assignee: (unassigned) => Christian Brauner (cbrauner)
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
Public bug reported:
Unprivileged users can already toggle whether a subvolume will be ro or
rw. Not having this working with shiftfs regresses various use-cases.
Issues have already been seen by Stéphane Graber (Cced here).
To enable this with shiftfs we need to whitelist BTRFS_IOC_FS_INFO,
BTRFS
** Description changed:
SRU Justification
Impact: Currently, the /proc/sys/net/bridge folder is only created in
the initial network namespace. This blocks use-cases where users would
like to e.g. not do bridge filtering for bridges in a specific network
namespace while doing so for br
ce-cli containerd.io
sudo systemctl stop docker
cat < Christian Brauner (cbrauner)
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
SRU request here:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1838677
Patchset here:
https://github.com/brauner/ubuntu-disco/tree/overlayfs_on_shiftfs
Mailing list patchset posting here:
https://lists.ubuntu.com/archives/kernel-team/2019-August/102741.html
** Changed in: linux (Ubuntu)
SRU request here:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1838677
Patchset here:
https://github.com/brauner/ubuntu-disco/tree/overlayfs_on_shiftfs
Mailing list patchset posting here:
https://lists.ubuntu.com/archives/kernel-team/2019-August/102741.html
** Tags added: shiftfs
--
Yo
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838677
Title:
shiftfs: allow overlayfs
To manage notifications about
Several people tried to namespace this but this is really tied to a
physical machine so it's kinda tricky to fake.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1831258
Title:
journalctl --list-boot
Sorry, mail got lost. Here's a fix:
https://github.com/lxc/lxc/pull/3187
** Changed in: lxc (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848587
Titl
** Changed in: lxc (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848587
Title:
lxc 3.0.4-0ubuntu1 ADT test failure with linux 5.4.0-1.2
To mana
** Tags removed: verification-needed-disco verification-needed-eoan
** Tags added: verification-done-disco verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849483
Title:
shiftfs
** Tags removed: verification-needed-disco verification-needed-eoan
** Tags added: verification-done-disco verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849281
Title:
seccomp
** Tags removed: verification-needed-disco verification-needed-eoan
** Tags added: verification-done-disco verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849482
Title:
shiftfs
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846272
Title:
overlayfs: allow with shiftfs as underlay
To manage no
t
on a fixed kernel and see that the call succeeds and the file is of the
expected size.
Target Kernels:
All LTS kernels with shiftfs support.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (U
pport.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner (cbrauner)
Status: In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Christian Brauner (cbrauner)
** Changed in: linux (Ubuntu)
Status: New => In Progress
--
Y
** Tags removed: verification-needed-disco verification-needed-eoan
** Tags added: verification-done-disco verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1847744
Title:
seccomp
** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846265
Title:
shiftfs: rework how shiftfs opens files
To manage notifi
** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1846272
Title:
overlayfs: allow with shiftfs as underlay
To manage noti
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836910
Title:
br_netfilter: namespace sysctl operations
To manage
This has been fixed a long while ago:
commit 920cbb00268ce50d1306daebb74871f66583a46c
Author: Christian Brauner
Date: Mon Nov 18 15:08:22 2019 +0100
tests: use /dev/loop-control instead of /dev/network_latency
BugLink: https://bugs.launchpad.net/bugs/1848587
The latter device
https://github.com/lxc/lxc/pull/3498
** Changed in: lxc (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1888705
Title:
lxc ftbfs against libselinux 3.1
To
See
https://github.com/brauner/ubuntu-unstable/commits/2020-04-10/shiftfs_nesting
for fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872094
Title:
shiftfs: broken shiftfs nesting
To manage not
This should preferably be backported to all LTS kernels that support
shiftfs.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872094
Title:
shiftfs: broken shiftfs nesting
To manage notifications ab
to the lowers mount to get around vfs layering restrictions.
Regression Potential: Limited to shiftfs.
Test Case: Built a kernel with the mentioned fix and ran the reproducer.
The issue was not reproducible.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Christian Brauner
** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1884767
Title:
shiftfs: fix btrfs regression
To manage notifications ab
Public bug reported:
We're currently planning to be more proactive in deprecating the
uselib() syscall similar to how we deprecated the sysctl() syscall. This
will be a long process of course but the starting point is to set
CONFIG_USELIB=n in all new Ubuntu versions. I spoke to Eric and
apparentl
So I've gone through codesearch on Debian and there are no users apart
from a bunch of defines for __NR_uselib when it isn't defined.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1879454
Title:
Set
1 - 100 of 346 matches
Mail list logo