Quoting Marc Paradise (m...@opscode.com): > On Fri, Oct 25, 2013 at 10:30 AM, Serge Hallyn <serge.hal...@ubuntu.com>wrote: > > > > > > Can you please do an lxc-start with '-l info -o outfile' options and > > attach the outfile? Also show the /proc/self/mounts and > > /proc/self/mountinfo contents from both the host and the container. > > > > I've attached mountinfo and mounts from the host, but I can't reach the > guest via console or ssh to grab the same there.
You don't need to. You can ps -ef to find an /sbin/init that is not pid 1, and do /proc/$pid/mount{s,info} for that pid. The main thing I notice in your logs is that 21 15 0:16 / /sys/fs/cgroup rw,relatime - cgroup cgroup rw,hugetlb,perf_event,blkio,freezer,devices,memory,cpuacct,cpu,cpuset ... 33 21 0:26 / /sys/fs/cgroup/systemd rw,nosuid,nodev,noexec,relatime - cgroup systemd rw,name=systemd These are weird. Normally we have all cgroups mounted separately in subdirs of /sys/fs/cgroup. I.e. freezer on /sys/fs/cgroup/freezer, cpuset on /sys/fs/cgroup/cpuset, etc. You don't have cgroup-lite package installed? What is mounting /sys/fs/cgroup? Is it done by /etc/fstab? Secondly, since /sys/fs/cgroup is a cgroupfs, it is not ok to create a directory under that and mount systemd cgroup system over it. /sys/fs/cgroup/systemd, once created, represents a cgroup called systemd, which tasks can be inserted into. If you now, for instance, create a container called 'systemd' you'll be in a world of hurt. -serge ------------------------------------------------------------------------------ Android is increasing in popularity, but the open development platform that developers love is also attractive to malware creators. Download this white paper to learn more about secure code signing practices that can help keep Android apps secure. http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk _______________________________________________ Lxc-users mailing list Lxc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-users