Hi, Piotr One possible solution is to not mount /cgroup in fstab on the host.
My configuration: Slackware 14.1 lxc version 0.9.0 kernel 3.12.5 try it and good luck Giuseppe 2014/1/3 Piotr Isajew <[email protected]> > Hi, > > I wanted do try out lxc on Slackware 14.1 64-bit. lxc-create > works without problems. I'm however unable to start a container. > > After I do i.e.: > > lxc-start -n vs0 > > the command just hangs with no output, consuming all the CPU > resources and eventually eating up all the memory. > > I've spent last three days trying to get it work but I think I've > ran out of ideas. > > > log file contains: > > lxc-start 1388667324.768 INFO lxc_start_ui - using rcfile > /var/lib/lxc/vs0/config > lxc-start 1388667324.769 INFO lxc_apparmor - apparmor_load - > apparmor is disabled > lxc-start 1388667324.770 DEBUG lxc_conf - allocated pty > '/dev/pts/2' (5/6) > lxc-start 1388667324.771 DEBUG lxc_conf - allocated pty > '/dev/pts/3' (7/8) > lxc-start 1388667324.771 DEBUG lxc_conf - allocated pty > '/dev/pts/4' (9/10) > lxc-start 1388667324.771 DEBUG lxc_conf - allocated pty > '/dev/pts/5' (11/12) > lxc-start 1388667324.771 INFO lxc_conf - tty's configured > lxc-start 1388667324.771 DEBUG lxc_console - using > '/tmp/console.log' as console log > lxc-start 1388667324.771 DEBUG lxc_console - using '/dev/tty' as > console > lxc-start 1388667324.771 DEBUG lxc_start - sigchild handler set > lxc-start 1388667324.771 INFO lxc_start - 'vs0' is initialized > lxc-start 1388667324.777 DEBUG lxc_start - Not dropping > cap_sys_boot or watching utmp > > lxc-start 1388667324.777 INFO lxc_conf - opened > /var/lib/lxc/vs0/rootfs.hold as fd 20 > > After I kill the lxc-start process there are many entries like > vs0-1234 in /cgroup/lxc > > My configuration is as follows: > > Linux kontrabanda 3.10.17 #4 SMP Thu Jan 2 19:49:59 CET 2014 x86_64 > Intel(R) Atom(TM) CPU D425 @ 1.80GHz GenuineIntel GNU/Linux > > > # lxc-checkconfig > --- Namespaces --- > Namespaces: enabled > Utsname namespace: enabled > Ipc namespace: enabled > Pid namespace: enabled > User namespace: enabled > Network namespace: enabled > Multiple /dev/pts instances: enabled > > --- Control groups --- > Cgroup: enabled > Cgroup clone_children flag: enabled > Cgroup device: enabled > Cgroup sched: enabled > Cgroup cpu account: enabled > Cgroup memory controller: enabled > Cgroup cpuset: enabled > > --- Misc --- > Veth pair device: enabled > Macvlan: enabled > Vlan: enabled > File capabilities: enabled > > > # cat /var/lib/lxc/vs0/config > # Template used to create this container: slackware > # Template script checksum (SHA-1): > 54f35064852a068c7ed1d0ae5e4b3ac8200ac790 > > lxc.network.type = empty > > > lxc.utsname = vs0 > > lxc.mount = /var/lib/lxc/vs0/rootfs/etc/fstab > > lxc.tty = 4 > lxc.pts = 1024 > lxc.rootfs = /var/lib/lxc/vs0/rootfs > > lxc.cgroup.devices.deny = a > # /dev/null and zero > lxc.cgroup.devices.allow = c 1:3 rwm > lxc.cgroup.devices.allow = c 1:5 rwm > # consoles > lxc.cgroup.devices.allow = c 5:1 rwm > lxc.cgroup.devices.allow = c 5:0 rwm > lxc.cgroup.devices.allow = c 4:0 rwm > lxc.cgroup.devices.allow = c 4:1 rwm > # /dev/{,u}random > lxc.cgroup.devices.allow = c 1:9 rwm > lxc.cgroup.devices.allow = c 1:8 rwm > lxc.cgroup.devices.allow = c 136:* rwm > lxc.cgroup.devices.allow = c 5:2 rwm > # rtc > lxc.cgroup.devices.allow = c 254:0 rwm > > # we don't trust root user in the container, better safe than sorry. > # comment out only if you know what you're doing. > lxc.cap.drop = sys_module mknod > lxc.cap.drop = mac_override kill sys_time > lxc.cap.drop = setfcap setpcap sys_boot > > # if you want to be even more restrictive with your container's root > # user comment the three lines above and uncomment the following one > # lxc.cap.drop=sys_admin > > > # cat /var/lib/lxc/vs0/rootfs/etc/fstab > lxcpts /var/lib/lxc/vs0/rootfs/dev/pts devpts defaults,newinstance 0 0 > none /var/lib/lxc/vs0/rootfs/proc proc defaults 0 0 > none /var/lib/lxc/vs0/rootfs/sys sysfs defaults 0 0 > none /dev/shm tmpfs defaults 0 0 > > > # mount | grep cgroup > cgroup on /cgroup type cgroup (rw) > _______________________________________________ > lxc-users mailing list > [email protected] > http://lists.linuxcontainers.org/listinfo/lxc-users >
_______________________________________________ lxc-users mailing list [email protected] http://lists.linuxcontainers.org/listinfo/lxc-users
