1327017795 Q * bzed Remote host closed the connection 1327017802 J * bzed ~bzed@devel.recluse.de 1327025910 M * Bertl_oO off to bed now .. have a good one everyone! 1327025915 N * Bertl_oO Bertl_zZ 1327035783 M * ccxCZ hello, I can't seem to be able to open device nodes mounted on tmpfs inside vserver 1327035848 M * ccxCZ I have MKNOD in bcapabilities and SECURE_MOUNT SECURE_REMOUNT BINARY_MOUNT in ccapabilities 1327036119 M * ccxCZ the devices themselves are created fine, I just get permission denied when trying to open them 1327036216 M * ccxCZ open("build/k8_testing_x11/dev/null", O_RDONLY) = -1 EACCES (Permission denied) 1327036266 M * ccxCZ I would like to avoid SYS_ADMIN capability for this; 3.0.4-vs2.3.1-pre10.1 btw 1327036797 J * sannes ~ace@cm-84.209.106.118.getinternet.no 1327038573 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327038575 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327038575 P * Sandra2012 1327038821 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327038823 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327038823 P * Sandra2012 1327039057 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327039059 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327039059 P * Sandra2012 1327039269 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327039271 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327039271 P * Sandra2012 1327039469 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327039471 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327039471 P * Sandra2012 1327039715 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327039715 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327039717 P * Sandra2012 1327039768 J * destructive ~Adium@ip-83-99-90-132.dyn.luxdsl.pt.lu 1327039959 J * Sandra2012 ~sandraX@pool-71-168-103-20.cncdnh.east.myfairpoint.net 1327039959 M * Sandra2012 Come chat with me guys.. http://bit.ly/wkbzel 1327039961 P * Sandra2012 1327040125 Q * destructive Quit: Leaving. 1327041115 Q * dkg Ping timeout: 480 seconds 1327041629 J * dkg ~dkg@lair.fifthhorseman.net 1327043127 J * ncopa ~ncopa@3.203.202.84.customer.cdi.no 1327043589 J * ghislain ~AQUEOS@adsl2.aqueos.com 1327044647 Q * fback Ping timeout: 480 seconds 1327044882 M * ncopa morning 1327044933 M * ncopa will flock() work accross a shared mount? 1327045171 J * fback fback@red.fback.net 1327045811 Q * DreamerC Ping timeout: 480 seconds 1327046284 N * Bertl_zZ Bertl 1327046297 M * Bertl morning folks! 1327046380 J * DreamerC ~DreamerC@122-116-181-118.HINET-IP.hinet.net 1327046429 M * Bertl ccxCZ: most likely your tmpfs is mounted with nodev (check with /proc/mounts inside the guest) 1327046492 M * Bertl ncopa: inode based operations will work across bind/shared mounts, filesystem (i.e. path) based operations won't 1327046880 M * ncopa so flock() works 1327046887 M * ncopa since it uses fd 1327046895 M * ncopa as i assumed 1327046897 M * ncopa thanks 1327046935 M * Bertl hmm, how did you arrive at that conclusion? 1327047177 Q * fback Ping timeout: 480 seconds 1327047272 J * Marbug ~Marbug@83.101.67.3 1327047287 M * Bertl sys_flock takes an fd and converts it with fget(fd) into filp which is struct file *, which in turn contains struct path ... 1327047347 M * Bertl besides that, flocks are xid tagged (so they do not interact across contexts either) 1327047351 Q * Aiken Quit: Leaving 1327047998 J * fback fback@red.fback.net 1327049491 Q * fisted_ Read error: Operation timed out 1327049596 J * fisted ~fisted@xdsl-87-78-220-86.netcologne.de 1327049779 Q * ensc|w Remote host closed the connection 1327049788 J * ensc|w ~ensc@www.sigma-chemnitz.de 1327050228 M * Bertl off now ... bbs 1327050232 N * Bertl Bertl_oO 1327051584 J * swenTjuln ~Marko@89-212-53-248.static.t-2.net 1327053928 J * ghislain1 ~AQUEOS@adsl2.aqueos.com 1327054242 Q * ghislain Ping timeout: 480 seconds 1327054276 M * ccxCZ Bertl_oO: indeed, it's mounted nodev even when I specified explicit -o dev 1327054751 J * BenG ~bengreen@cpc10-aztw24-2-0-cust114.aztw.cable.virginmedia.com 1327055063 M * ccxCZ any way to reverse that? 1327055175 M * ccxCZ actually, hm, I might not need it. I can mount --bind the vserver's /dev into chroot 1327055443 Q * BenG Quit: I Leave 1327056421 M * Bertl_oO how did you explicitely specify dev ? 1327066696 Q * jeroen___ Quit: Ex-Chat 1327066814 J * jeroen__ ~jeroen@095-097-051-172.static.chello.nl 1327069956 Q * hparker Remote host closed the connection 1327072614 M * ccxCZ Bertl_oO: mount -t tmpfs -o size=8G,dev,suid tmpfs build 1327072849 J * hparker ~hparker@2001:470:1f0f:32c:beae:c5ff:fe01:b647 1327072892 N * ensc Guest24615 1327072902 J * ensc ~irc-ensc@p54ADE7CF.dip.t-dialin.net 1327073313 Q * Guest24615 Ping timeout: 480 seconds 1327073803 M * Bertl_oO on the host? inside the guest? 1327074577 J * dowdle ~dowdle@scott.coe.montana.edu 1327075520 Q * ncopa Quit: Leaving 1327077244 M * ccxCZ Bertl_oO: inside the guest 1327077269 M * ccxCZ but I guess bit different aproach is desirable here 1327077306 M * ccxCZ I guess I'll make minimalist /dev that will be mounted read-only for use in the build chroot 1327077398 Q * nox Quit: if you break it you own both parts 1327077411 M * ccxCZ Bertl_oO: is there way to drop the caps for certain processes? so I can run unprivileged chroot inside that vserver 1327077416 J * nox ~bnc@2a01:4f8:140:40a2:6667::952 1327081001 M * Bertl_oO inside the guest, the nodev is forced for security reasons 1327081030 M * Bertl_oO the question is, what do you actually want to accomplish? 1327083793 Q * ghislain1 Quit: Leaving. 1327088230 Q * sannes Remote host closed the connection 1327088307 J * sannes ~ace@cm-84.209.106.118.getinternet.no 1327088626 Q * sannes Remote host closed the connection 1327088907 J * sannes ~ace@cm-84.209.106.118.getinternet.no 1327091222 J * FireEgl ~FireEgl@173-16-9-169.client.mchsi.com 1327091437 J * bonbons ~bonbons@2001:960:7ab:0:64da:c049:2efd:be0e 1327092801 Q * FloodServ Service unloaded 1327092860 J * FloodServ services@services.oftc.net 1327092968 Q * Rockj Killed (NickServ (Too many failed password attempts.)) 1327092999 J * Rockj rockj@rockj.net 1327093752 Q * Rockj Quit: WeeChat 0.3.6 1327093767 J * Rockj rockj@rockj.net 1327094136 J * petzsch ~markus@p57B65846.dip.t-dialin.net 1327094731 J * fisted_ ~fisted@xdsl-87-78-210-2.netcologne.de 1327094906 Q * fisted Ping timeout: 480 seconds 1327094993 Q * dowdle 1327095147 J * cuba33ci_ ~cuba33ci@114-36-233-132.dynamic.hinet.net 1327095498 Q * cuba33ci Ping timeout: 480 seconds 1327095498 N * cuba33ci_ cuba33ci 1327100066 Q * sannes Remote host closed the connection 1327100664 Q * bonbons Quit: Leaving 1327101324 M * m_ueberall I now got the kernel-vserver-3.2.1 rpm on Mageia1 running on a i586-Thinkpad X60T (which wouldn't boot the 3.0.8 kernel). Sad fact: with the x86_64 desktop, it's the other way round--I'm currently stuck with 3.0.8. Maybe I should wait for 3.2.2/3.3.0? :p 1327102023 M * Bertl_oO what's the problem? 1327102038 M * Bertl_oO I have 3.2.1 running on x86_64 quite fine 1327102096 M * m_ueberall Some kernel panic happened. However, I'm not sure whether it's a problem with the controller, so I will retry 2-3 times and get at least a snapshot of the error message. 1327102121 M * m_ueberall (and yes, booting the x86_64 is a bit non-deterministic.) 1327102125 Q * petzsch Read error: Connection reset by peer 1327102184 M * Bertl_oO lsi2sas? 1327102219 M * m_ueberall If I don't know what this is, I probably don't use it, right? ;) 1327102246 M * m_ueberall No, no MegaRAID involved. 1327102247 M * Bertl_oO it's an scsi controller type which doesn't work on 3.2.x 1327102258 M * Bertl_oO but worked fine on 3.1.x 1327102324 M * m_ueberall What's the fastest way to identify it on the command line? 1327102371 M * Bertl_oO lspci probably 1327102385 M * Bertl_oO lspci -v lists module suggestions as well 1327102445 M * m_ueberall No "lsi", "sas". (it's an old ASUS Commando) 1327102614 M * Bertl_oO ah, and the controller is not supported? if so that would be a regression you probably should report upstream 1327102766 M * m_ueberall I kind of doubt that the controller isn't supported (it's an ICH8/R, and the disks are connected via a DC-7210 RAID hardware controller which should be 'invisible'). 1327102878 M * m_ueberall But since the machine operates flawlessly once it's up and I use it on a daily basis, I'll first have to make a complete backup before I retry. 1327103583 Q * Marbug Ping timeout: 480 seconds