Quoting Joseph Salisbury (joseph.salisb...@canonical.com): > One additional question, do you happen to know if this is a regression? > Did this not happen with previous releases/kernels?
This is not a regression, it has never worked right. We believe the problem is that if a task is !dumpable, then the kernel marks some of its /proc/pid files as owned by the global host root, which is not mapped into a user namespace. If that is the case, then the question is whether it is safe to mark them owned by the container root; or whether we can distinguish between tasks which became dumpable before switching namespaces; or whether there is something else we can do. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1263738 Title: login console 0 in user namespace container is not configured right To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1263738/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs