** No longer affects: qemu (Ubuntu Vivid)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1493049
Title:
memory corruption during live-migration in TCG mode
To manage notifications about this bug go
(if someone says they have reproduced it on 1.0+noroms-0ubuntu14.27 I'll
unmark it invalid.)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556306
Title:
vhost-user: qemu stops processing packets u
This is marked as affecting precise, but has anyone reproduced this with
qemu-kvm 1.0+noroms-0ubuntu14.27 ?
The patch is completely inapplicable to that code base, so it would need
to be rewritten from scratch if so.
** Changed in: qemu-kvm (Ubuntu Precise)
Status: New => Invalid
--
You
I'm confused- this is marked as affecting qemu-kvm in precise, but the
preceding patch (c6ac36e) which introduced the bug is not there either.
So I'm going to mark this as not affecting precise unless someone speaks
up to say that we in fact need the whole dependent series.
** Changed in: qemu-kv
** Changed in: libvirt (Ubuntu)
Importance: Medium => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1529079
Title:
Can't start virtual machines with installed systemd-container package
on
Hi,
just to be sure, if you run
kvm -vnc :1 -m 1.5G
kvm -vnc :1 -m 1.5G --no-hpet
do those also crash?
Can you please show the contents of
/var/log/libvirt/qemu/u1510-1.log
** Package changed: kvm (Ubuntu) => qemu (Ubuntu)
** Also affects: qemu
Importance: Undecided
Status: New
**
Assuming this is running upstart (as it looks like), try adding the
debug and verbose flags as shown in the upstart cookbook?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1551150
Title:
devel-propo
But unfortunately we do not know which patch fixed it, making an SRU
much more problematic. Someone who is able to reproduce the bug would
need to try to either bisect, or make educated guesses and test patch
cherrypicks.
--
You received this bug notification because you are a member of Ubuntu
B
** Changed in: qemu (Ubuntu Vivid)
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1457639
Title:
qemu-img qcow2 conversion hangs on large core systems
To mana
I'm afraid I've not yet made any headway.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1536331
Title:
Precise to Trusty live migration failing
To manage notifications about this bug go to:
https:/
*** This bug is a duplicate of bug 691590 ***
https://bugs.launchpad.net/bugs/691590
Note that doing a readonly bind mount of the directory and using that
should be a lighter-weight alternative to copying the iso.
** This bug has been marked a duplicate of bug 691590
libvirt should not tak
Could you please show what:
ps -ef | grep docker
dpkg -l | grep docker
cat /proc/filesystems
show?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560685
Title:
docker: Error response from daemon:
Correction - it is included by default; we are wondering why it was not
*used* by default in your case.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560685
Title:
docker: Error response from daem
** Also affects: qemu (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: qemu-kvm (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: qemu (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: qemu-kvm (Ubuntu Precise)
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1558897
Title:
guest vm hangs
To manage notifications about this bug go to:
Quoting Vincent JARDIN (vincent.jar...@6wind.com):
> it seems that the fix was not applied on ppc build:
>
> https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-1ubuntu3/+build/8842754
>
> https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-1ubuntu3/+build/8842753
>
> neither on arm64:
>
Could you please show the result of
sudo systemctl
sudo systemctl status lxd
sudo systemctl status lxd.socket
dpkg -l | grep lxd
** Changed in: lxc (Ubuntu)
Status: New => Incomplete
** Package changed: lxc (Ubuntu) => lxd (Ubuntu)
--
You received this bug notification because you are
Hi Thiago,
yeah we may as well keep it open for first thing in 16.10.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1558857
Title:
Upgrade to latest stable version v1.3.2
To manage notifications a
Thanks for the confirmation.
A note for anyone else who runs into this - you will unfortunately need
to actually restart lxcfs, or reboot the host, for the fix to take.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.laun
** Changed in: lxc (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560120
Title:
Unprivileged nested container will not start inside a privileged
con
** Summary changed:
- apparmor for qemu is too restrictive for USB passthrough
+ USB passthrough - virt-aa-helper must grant /run/udev/data/ r
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1515791
Ti
Christopher, thanks for reporting this. I've pushed the fix, but as
we're now in final freeze it may be delayed for approval.
** Changed in: lxcfs (Ubuntu)
Importance: Undecided => High
** Changed in: lxcfs (Ubuntu)
Status: New => Triaged
--
You received this bug notification becaus
The proposed fix for this is https://github.com/lxc/lxcfs/pull/102
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560120
Title:
Unprivileged nested container will not start inside a privileged
con
I believe this is due to lxcfs not implementing access(2).
** Also affects: lxcfs (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560120
Title:
U
Confirmed, i can reproduce. Now why.
** Changed in: lxc (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560120
Title:
Unprivileged nested container will not s
** Changed in: lxc (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560120
Title:
Unprivileged nested container will not start inside a privileged
container
Hm,
lxc-start 20160321163436.552 ERROR lxc_utils - utils.c:mkdir_p:253 -
Permission denied - failed to create directory '/sys/fs/cgroup/blkio/lxc
/libertine-smoke-test/lxc/'
This is odd, if that was not writeable then cgfsng should not have
stored it as a writeable hierarchy.
Just to make sure,
@Nish,
is there a particular bug in the package which this fixes, or is this
purely to have a closer package to debian's in 16.04?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560148
Title:
[FFe]
Thanks, the debdiff looks fine to me. Will sponsor this when the FFE is
approved.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560148
Title:
[FFe] Please merge with openipmi 2.0.21-1 from Debian
Note this has now been merged upstream.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1552372
Title:
[FFE] support cgroup namespace unshare
To manage notifications about this bug go to:
https://bug
Thanks for reporting this bug.
Who is /mnt/test owned by? what do
ls -ld /mnt/test
ls -l /mnt/test
show? Libvirt launches qemu as the libvirt-qemu user, which is
probably not allowed to create files there. If that is the case, then
ou can either change the ownership/permissions of the shared
Quoting Thiago Martins (thiagocmarti...@gmail.com):
> I agree that it is important to be conservative, nevertheless, take a look
> here:
>
> --
> "Although libvirt 1.2.15 works with Xen, libvirt 1.3.2 or newer is
> recommended."
xenial is on 1.3.1, not 1.2.15
I'm afraid we'll need pointers to sp
Quoting Simon Déziel (1558...@bugs.launchpad.net):
> As mentioned in LP: #1553023, this new release brings ZFS support which
> would be really nice to get now that everyone wants to jump on the ZFS
> train :)
We already have zfs cherrypicked into 1.3.1 in xenial.
--
You received this bug notific
Quoting Stefan Bader (stefan.ba...@canonical.com):
> Well as it stands right now, at least the (admittedly more basic things)
> stuff I do run is working with 1.3.1. So I cannot add any exciting
> arguments. And upstream tends to always recommend "the latest stuff", so
> next week this could be 1.3
** Changed in: libvirt (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553023
Title:
[FFe] libvirt v1.3.2 -- zfs support
To manage notifications abo
It's very late in the cycle for a version update.
Assigning this to Stefan to gauge the importance of the xen
improvements.
** Changed in: libvirt (Ubuntu)
Assignee: (unassigned) => Stefan Bader (smb)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
fwiw i occasionally log into unity8 on my amd64 xenial laptop. The
terminal app starts up just fine for me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1535058
Title:
applications close instantly
*** This bug is a duplicate of bug 1556306 ***
https://bugs.launchpad.net/bugs/1556306
** This bug has been marked a duplicate of bug 1556306
vhost-user: qemu stops processing packets under high load of traffic
--
You received this bug notification because you are a member of Ubuntu
Bugs
** Also affects: qemu-kvm (Ubuntu)
Importance: Undecided
Status: New
** Changed in: qemu-kvm (Ubuntu)
Status: New => Confirmed
** Changed in: qemu-kvm (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Seems likely. Thanks.
** Changed in: lxc (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1557607
Title:
Xenial container fails to start
To manage
Hi,
so just to be clear, is there any reason for this not to be marked a
duplicate of 1556306 (and that bug marked as also affecting qemu-kvm)?
The same patch should be applied for both?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: lxc (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556447
Title:
lxc-start fails: lxc_cgfsng - cgfsng.c:all_controllers_found:430 - no
Thanks for the input. Specific reasons like that are valuable.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1558857
Title:
Upgrade to latest stable version v1.3.2
To manage notifications about th
The EBUSY errors from lxc-init mounts are ok, it's because lxc has
already mounted those (by following the automatically included
configuration files).
i'd expect eperm for the /sys/kernel/debug mount, because you're not
allowed to read under /sys/kernel/debug. But strace shows that by hand
i als
Could you please show the container configuration?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1558565
Title:
Unprivileged system LXC containers refuse to start after upgrade to
Ubuntu 16.04
To
Thanks for reporting this bug. I'll push into the xenial package today.
** Changed in: qemu (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556306
Title:
Hm, that's odd. Assuming your login uid is in fact design, you do have
write access to your systemd cgroup. Just for sanity, can you confirm
that lxc-start still fails with the same error messages?
Please do show your ppa listings, and current versions for lxc packages
dpkg -l | grep lxc
** C
@David,
please look at /etc/pam.d/common-session. Do you by chance have
libpam-cgm rather than libpam-cgfs there? libpam-cgfs does
not require cgmanager running
On the other hand if unity8 itself requires it, then that's that.
And yeah, i guess I do have cgmanager running on my laptop, so I've
Hi,
I think this is a bug which has just been fixed in pam_lxcfs. Could you
please show:
pwd=/sys/fs/cgroup/systemd/`awk -F: '/systemd/ { print $3 }' /proc/self/cgroup`
echo $pwd
ls -ld $pwd
** Changed in: lxc (Ubuntu)
Status: New => Incomplete
--
You received this bug notification bec
Marking verification-done bc the pids cgroup problem is addressed. If
you continue to have a problem with the apparmor profile, please file a
new bug.
** Tags removed: verification-failed verification-needed
** Tags added: verification-done
--
You received this bug notification because you are
** Changed in: usbredir (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556316
Title:
Sync usbredir 0.7.1-1 (main) from Debian unstable (main)
To manage n
Hi,
I looked over the debdiff. I *think* all i saw in the source was
bugfixes, except for the addition of
usbredirhost_set_buffered_output_size_cb(). I don't know whether that
constitutes 'new API', which is part of FFE.
--
You received this bug notification because you are a member of Ubuntu
Quoting Stephen Warren (swar...@wwwdotorg.org):
> Could you please expand on "Then re-chown your current systemd cgroup"?
> I'm not sure exactly how/where cgroups get mounted, so I'm not sure what
> path I should chown.
The systemd cgroupfs is mounted under /sys/fs/cgroup/systemd. Your current
lo
It should be fixed in qemu 1:2.5+dfsg-5ubuntu5
** Changed in: qemu (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533728
Title:
libvirt unable to c
Thanks, Stephen, culprit found. The systemd cgroup was yours - until
you did a sudo.
For now you can work around this by commenting out the libpam-cgfs line
from /etc/pam.d/common-session-noninteractive. Then re-chown your
current systemd cgroup to yourself or log back in.
I'm not yet sure whe
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556735
Title:
surf crashed with SIGSEGV in JSC::JSCell::getPrimitiveNumber()
To manage notification
Do you know whether you are using lightdm? Can you show your
/etc/pamd.d/common-session file?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1556447
Title:
lxc-start fails: lxc_cgfsng - cgfsng.c:all
Did you say your *host* fails shortly after starting that container? In
what way does the host fail?
Commenting out the line in 02-openvpn-auto-tun.conf avoids the problem?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
Thanks, nothing looks out of the ordinary there. Just to make sure,
does
realpath /mnt/storage/data/images/owncloud.qcow2
show something different than the original path? (I.e. could a path
element there be a symlink into one of the restricted paths?)
--
You received this bug notification be
Quoting Jignasha (jignasha.vithal...@triliodata.com):
> Do we need all deb packages to reinstall libvirt
> or just reinstalling libvirt-bin deb sufficient
you need libvirt0 as well.
But please get it from the archive, not my ppa. I'm using my ppa for other
tests now.
--
You received this bug n
This is fixed in 1.3.1-1ubuntu7
** Package changed: qemu (Ubuntu) => libvirt (Ubuntu)
** Changed in: libvirt (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
Hi,
Could someone who can reproduce this problem try adding:
/var/run/** r,
to the file /etc/apparmor.d/usr.lib.libvirt.virt-aa-helper
and see whether that solves the problem?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
** Changed in: libvirt (Ubuntu)
Status: Fix Released => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1393842
Title:
libvirt does not grant qemu-guest-agent channel perms
To manage n
Hi Stefan,
Ok so for 14.04 this should be added. But if trusty was the last release which
had
that, and kilo cloud archive for trusty has libvirt from vivid, does that mean
the
vivid xen should be included in the kilo cloud archive?
--
You received this bug notification because you are a memb
Hi James,
the kilo libvirt package (which I assume this is?) does indeed not have
a rule for qemu-dm, which does exist in xen-utils-4.4 in trusty (and
there is no xen-utils in kilo archive).
Note this bug is not valid against the xenial libvirt package, as there
is no qemu-dm binary in xen-utils-
** Changed in: libvirt (Ubuntu)
Assignee: (unassigned) => James Page (james-page)
** Changed in: libvirt (Ubuntu)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
Since this was installed as 14.04, and libvirt-bin is not installed
masked by default, I'll assume this was a remnant of a previous install?
This shouldn't prevent the package install from succeeding though.
Indeed if I mask libvirt-bin and then do a apt-get install --reinstall
libvirt-bin, the ins
Thanks for reporting this bug. I can't reproduce it here:
0 ✓ serge@sl ~ $ virsh start docker
Domain docker started
0 ✓ serge@sl ~ $ virsh save docker /mnt/docker.dmp
Domain docker saved to /mnt/docker.dmp
Same happened on a 15.10 host.
Can you append your full xml?
Normally the apparmor prof
I have a test package building in ppa:serge-hallyn/virt.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1554031
Title:
error: internal error: unable to execute QEMU command ‘block-commit’:
Could no
ok, actually I think this is simply an error in virt-aa-helper.
apparmor's load_profile() should be being called before the blockcommit
begins, to add rw access to the base image. Which is why the rw rule is
there. But the 'deny' rule is for some reason still there.
--
You received this bug not
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1521931
Title:
apparmor-profile-load returns 1 if apparmor not installed
To manag
Hi Brendan,
thanks for submitting this bug. Can you still reproduce this with 15.10
or 16.04? If so, can you give us a URL for the iso for semplice 7?
Do other guests also do this?
I assume you are running xrandr in the guest, not the host?
--
You received this bug notification because you a
Quoting Jamie Strandboge (ja...@ubuntu.com):
> I understand why you are doing this, but this means that a malicious
> guest is now able to create, for example, a block device with only DAC
> protecting the host. Since qemu on Ubuntu runs as non-root, this isn't
> completely horrible, but since appa
lse
> WITH_ZFS = --without-storage-zfs
> endif
Indeed, my i386 build without that failed :)
https://launchpad.net/~serge-hallyn/+archive/ubuntu/virt/+build/9327168
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
strace shows:
5082
open("/var/lib/uvtool/libvirt/images/x-uvt-b64-Y29tLnVidW50dS5jbG91ZDpzZXJ2ZXI6MTYuMDQ6YW1kNjQgMjAxNjAxMjU=",
O_RDWR|O_CLOEXEC) = -1 EACCES (Permission denied)
The apparmor profile (libvirt-uuid.files) includes:
"/var/lib/uvtool/libvirt/images/x-uvt-b64-Y29tLnVidW50dS5jbG91
So the error message itself comes from qemu, in block/raw-posix.c:
error_setg_errno(errp, errno, "Could not reopen file")
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1554031
Title:
error: interna
I'm trying:
Index: libvirt/src/security/virt-aa-helper.c
===
--- libvirt.orig/src/security/virt-aa-helper.c
+++ libvirt/src/security/virt-aa-helper.c
@@ -939,6 +939,14 @@ add_file_path(virDomainDiskDefPtr disk,
}
static int
+is_qe
** Changed in: qemu (Ubuntu)
Importance: Undecided => High
** Changed in: qemu (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1554031
Title:
error: internal
Thanks for the suggestion - am rolling this into the next version.
** Changed in: libvirt (Ubuntu)
Status: New => In Progress
** Changed in: libvirt (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
Hi Seth,
Debian actually doesn't yet have v1.3.2. I wonder whether we can just
cherrypick the changes to src/storage/storage_backend_zfs.c
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553023
Title
** Changed in: qemu (Ubuntu)
Status: Invalid => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1554031
Title:
error: internal error: unable to execute QEMU command ‘block-commit’:
Could
Upstream will merge once cgroup namespaces clear linux-next.
https://github.com/karelzak/util-linux/pull/295#issuecomment-193741900
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1552372
Title:
[FFE
Thanks for the update. Marked the bug "invalid" meaning "we have lost
the machine which could reproduce"
** Changed in: qemu (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
** Changed in: libvirt (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1541810
Title:
libvirt-bin.service does not read /etc/default/libvirt-bin
To m
Hi,
could you please show the contents of
/etc/apparmor.d/libvirt/libvirt-99917005-9251-4ea3-9e72-946b42061df1 ?
virt-aa-helper *is* supposed to be adding an rw entry for each usb file
for hostdevs being added (through file_iterate_hostdev_cb()), so I'm
wondering which file isn't being handled an
The default security driver in Ubuntu is apparmor.
Could you please show the output of
cat /etc/*-release
ls -l /etc/apt/sources.list.d
cat /etc/apt/sources.list.d/*
dpkg -l | egrep -e '(libvirt|qemu)'
and show any relevant DENIED messages in syslog (grep DENIED
/var/log/syslog)
Your libvirt ve
Because this bug report has quite a bit of information and history has
taught me that not keeping information from different reporters separate
can greatly complicate matters.
Since I'm asking for apport-uploaded information, it would be best that
it not be mixed with information from another syst
Also note that there are already several different directions into which
this bug has been taken. A crucial question is whether step 3 in
@mahmoh's recipe is really needed:
3) /etc/default/libvirt-bin: ' libvirtd_opts="-d -l" '
If not then there are different bugs at work.
--
You received th
Fix for that one is building in xenial-proposed as well.
** Changed in: libvirt (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532460
Title:
Pleas
Thanks, @Dadio, I'll cherrypick the patch unless #qemu points to
objections.
** Package changed: libvirt (Ubuntu) => qemu (Ubuntu)
** Changed in: qemu (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
this should be fixed by the fix to bug 1554269.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1543697
Title:
Unprivileged nested Xenial container will not start inside a
privileged Xenial containe
** Changed in: lxcfs (Ubuntu)
Importance: Undecided => Medium
** Changed in: lxcfs (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1554269
Title:
add lib
Public bug reported:
As noted in bug 1543697 , in order for 'lxc-attach -n container -- sudo
... lxc-start' to work, libpam-cgfs needs to be run at common-session-
noninteractive.
** Affects: lxcfs (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification be
Hi - there should be a way, we just need to get sudo running the pam
module.
Perhaps libpam-cgfs should be added to /etc/pam.d/common-session-
noninteractive.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
Quoting Christopher Townsend (christopher.towns...@canonical.com):
> I tried adding "lxc.include = /usr/share/lxc/config/nesting.conf" as I
> didn't know this existed. However, it didn't help.
>
> As you say, I can create unprivileged containers as user ubuntu, I just
> can't start them. Are you
I'm running 4.4.0-10-generic #25-Ubuntu with lxc version
2.0.0~rc5-0ubuntu1 , and the privileged container has:
lxc.include = /usr/share/lxc/config/nesting.conf
in the configuration file. This is a clean VM with no ppas installed.
Inside the privileged container (also xenial with no ppas), I can
Sorry, I had forgotten my own workaround for this.
** Changed in: linux (Ubuntu)
Status: Confirmed => Won't Fix
** Changed in: lxc (Ubuntu)
Status: Triaged => Fix Released
** Changed in: linux (Ubuntu)
Status: Won't Fix => Invalid
--
You received this bug notification beca
> The patches were just sent upstream.
>
> http://lists.nongnu.org/archive/html/qemu-devel/2016-03/msg00057.html
Thanks. The feedback also seems generally good, so I'm comfortable
with this. The main problem now is timing, since we are well past
feature freeze for 16.04. So if we want this in
Ok, this is happening because lxc, for privileged containers, bind-
mounts /proc/sys and /proc/sys/net onto themselves. This prevents later
unprivileged mounting of /proc.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
Sorry, testcase in #8 is invalid, bc lxc-usernsexec doesn't create a new
pid namespace, so mount is denied because we do not own our
pidns->userns.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/154336
401 - 500 of 9529 matches
Mail list logo