On Tue, May 31, 2011 at 2:07 PM, Daniel Lezcano <span dir="ltr"><<a href="mailto:daniel.lezcano@free.fr">daniel.lezcano@free.fr</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class="im">On 05/31/2011 12:33 PM, Ramez Hanna wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
it seems that lxc cannot handle cgroups when capabilities are not all in the<br>
same mount<br>
it fails now because it cannot write the devices.deny in the cgroup<br>
if i comment out all the lxc.cgroup.devices lines in the config of the<br>
container then i can actually start it<br>
<br>
I would think that the way lxc identifies the cgroup mount might be the part<br>
that needs patching<br>
</blockquote>
<br></div>
Thanks for investigating.<br>
<br>
The main problem is lxc is cgroup agnostic, so we should find a solution where we don't break that.<br>
<br>
Maybe one solution would be to collect all the mount points found for the cgroup and try to find the right path when writing or reading from one cgroup file.<br></blockquote><div>that is what i had in mind, tried looking into the code but my C skills are next to zero </div>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<br>
Does systemd run lxc within a cgroup which is not the root cgroup ?<br>
<br>
</blockquote><div>the lxc-start command would run under $user/master/ (/sys/fs/cgroup/systemd/$user/$master)<br></div><div>and the container itself would run under $container_name (/sys/fs/cgroup/systemd/$container_name)</div>
<div>so it would run the container in the root cgroup</div>