=== cmagina_ is now known as cmagina === Mikee_C_afk is now known as Mikee_C [12:51] hallyn, bug 1357025, looks like we lost a patch on rebase to v3.16, i've repplied it and am dumping test kernels in the bug shortly [12:51] bug 1357025 in linux (Ubuntu) "unprivileged overlayfs mounts no longer work in utopic" [Medium,Confirmed] https://launchpad.net/bugs/1357025 [12:52] apw, which one ? [12:53] UBUNTU: SAUCE: Overlayfs: allow unprivileged mounts [12:53] rtg, ^ [12:53] hmm, that isn't in my dropped file [12:54] you probababally just said "overlayfs is dropped" as a whole ? [12:54] apw, could be [12:56] collateral dammage from that, if the test existed (which it will soon) it owuld have been cought before it left CKT PPA but ... hey [13:01] apw: cool, thanks [13:01] apw: test case has been submitted to lxc upstream, it may make it into the utopic yet [13:02] hallyn, ok there are test kernels up, if you could get them verified "soon" then we have an upload planned for today [13:02] which i would like to see it in [13:05] will do, thx [13:14] apw: fixed [13:14] hallyn, thanks for the confirmation, confidence was high === willcooke_ is now known as willcooke === hatch__ is now known as hatch === cyphermox__ is now known as cyphermox [16:14] rtg: http://paste.ubuntu.com/8054904/ [16:15] rtg: i'll update to those regex's - let me know if there's any other tests you'd like me to add [16:15] dannf, I've never used extended regex's. I may have to find a new book :) [16:17] dannf, those look like sufficient tests [16:17] ack. will send out a patch after a test build === cmagina_ is now known as cmagina === Mikee_C is now known as Mikee_C_afk === cyphermox_ is now known as cyphermox [17:51] rtg, i sometimes wonder if we should just add .0 in the middle there for this purpose [17:52] rtg, indeed i wonder what would happen if we just used like -Nr0.U and people rev'd r [17:52] something to chew on [18:18] apw, so, what would that do for us (the distro) besides making the version even _more_ complicated ? [18:43] dannf, I just accidentally moderated your emails out of existence. maybe you should just subscribe ? [18:44] rtg: i'm on ubuntu-kernel [18:44] er kernel-team [18:44] dannf, this was the private list I moderated [18:45] oh - i assumed that was an organizational list [20:13] sforshee: just to be sure, nothing you've done with fuse+userns would break if fuse mounts requred MS_DEV? [20:13] uh, MS_NODEV === chiluk` is now known as chiluk [20:15] hallyn: I'm thinking that I required MS_NODEV for fuse+userns mounts, but I'd have to go back and look [20:16] cool, long as there's nothing wher eyou'd have needed NOT specifying MS_NODEV :) (which would be ridiculous, i think) [20:16] thanks [20:16] hallyn: yeah, I didn't set FS_USERNS_DEV_MOUNT which means that any userns mounts get NODEV [20:17] not for long :) [20:17] are you referring to that cve fix? [20:19] hallyn: either way, I think letting a userns+fuse mount contain devices would be a big problem [20:21] sforshee: i'm referring to a patch by Andy L. reverting part of Eric's patch [20:22] (not sure if that's the cve fix you mean) [20:22] hallyn: yeah, I'm talking about the one from eric. Do you have a link to the revert? [20:23] sforshee: http://lkml.org/lkml/2014/8/13/746 [20:24] hallyn: that's still okay then. Instead of an implicit NODEV the mount just fails. [20:25] right [20:27] hallyn: does that impact our overlayfs support? [20:27] sforshee: hm. it might [20:28] but if it does then lxc should simply add the nodev option [20:28] the new lxc-test-unpriv extension should catch it if it does [20:28] right, something to look out for when we pick up that patch [22:45] hmm, so the latest kernel security update for the 3.13 kernel breaks LXC [22:46] (well, nested unprivileged containers specifically) [22:48] stgraber: http://lkml.org/lkml/2014/8/13/746 will be the patch to fix it [22:48] can you test-build a kernel? [22:49] apw: I assume the quickest we could get http://lkml.org/lkml/2014/8/13/746 into a build is 3 weeks? [22:51] we obviously have two talks lined up at LinuxCon/Linux Security Summit next week which both demo nested unprivileged containers on Ubuntu... so looks like we'll need custom patched kernels or tweaked LXC which means people following those talks won't be able to reproduce what we show them... [23:22] hallyn, apw: filed bug 1357588 [23:22] bug 1357588 in linux (Ubuntu) "3.13.0-24 broke nested unprivileged LXC" [Undecided,New] https://launchpad.net/bugs/1357588 [23:22] and tagged as a regression in an udpate [23:23] *update