Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751090AbaLOTis (ORCPT ); Mon, 15 Dec 2014 14:38:48 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:41092 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750767AbaLOTip (ORCPT ); Mon, 15 Dec 2014 14:38:45 -0500 Date: Mon, 15 Dec 2014 19:38:38 +0000 From: Serge Hallyn To: "Eric W. Biederman" Cc: =?iso-8859-1?Q?St=E9phane?= Graber , Richard Weinberger , Serge Hallyn , Andy Lutomirski , linux-man , Kees Cook , Linux API , Linux Containers , Josh Triplett , stable , "linux-kernel@vger.kernel.org" , Kenton Varda , LSM , Michael Kerrisk-manpages , Casey Schaufler , Andrew Morton Subject: Re: [CFT] Can I get some Tested-By's on this series? Message-ID: <20141215193838.GB28375@ubuntumail> References: <87ppbtn4mv.fsf@x220.int.ebiederm.org> <87a92xn2io.fsf@x220.int.ebiederm.org> <87r3w8liw4.fsf@x220.int.ebiederm.org> <87iohklfvj.fsf_-_@x220.int.ebiederm.org> <87mw6vh31e.fsf_-_@x220.int.ebiederm.org> <20141210224822.GG20012@ubuntumail> <87lhmcy2et.fsf@x220.int.ebiederm.org> <20141212220840.GF22091@castiana.ipv6.teksavvy.com> <8761dgze56.fsf@x220.int.ebiederm.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <8761dgze56.fsf@x220.int.ebiederm.org> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Eric W. Biederman (ebiederm@xmission.com): > St?phane Graber writes: > > > On Fri, Dec 12, 2014 at 03:38:18PM -0600, Eric W. Biederman wrote: > >> Serge Hallyn writes: > >> > >> > Quoting Eric W. Biederman (ebiederm@xmission.com): > >> >> > >> >> Will people please test these patches with their container project? > >> >> > >> >> These changes break container userspace (hopefully in a minimal way) if > >> >> I could have that confirmed by testing I would really appreciate it. I > >> >> really don't want to send out a bug fix that accidentally breaks > >> >> userspace again. > >> >> > >> >> The only issue sort of under discussion is if there is a better name for > >> >> /proc//setgroups, and the name of the file will not affect the > >> >> functionality of the patchset. > >> >> > >> >> With the code reviewed and written in simple obviously correct, easily > >> >> reviewable ways I am hoping/planning to send this to Linus ASAP. > >> >> > >> >> Eric > >> > > >> > Is there a git tree we can clone? > >> > >> Have either of you been able to check to see if any of my changes > >> affects lxc? > >> > >> I am trying to gauge how hard and how fast I should push to Linus. lxc > >> being the largest adopter of unprivileged user namespaces for general > >> purpose containers. > >> > >> I expect you just call newuidmap and newgidmap and don't actually care > >> about not being able to set gid_map without privilege. But I really > >> want to avoid pushing a security fix and then being surprised that > >> things like lxc break. > >> > >> Eric > > > > Hi Eric, > > > > I've unfortunately been pretty busy this week as I was (well, still am) > > travelling to South Africa for a meeting. I don't have a full kernel > > tree around here and a full git clone isn't really doable over the kind > > of Internet I've got here :) > > > > Hopefully Serge can give it a quick try, otherwise I should be able to > > do some tests on Tuesday when I'm back home. > > I thought Serge was going to but I haven't heard yet so I am prodding ;-) Ok, thanks - yes, unprivileged lxc is working fine with your kernels. Just to be sure I was testing the right thing I also tested using my unprivileged nsexec testcases, and they failed on setgroup/setgid as now expected, and succeeded there without your patches. thanks, -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/