<div dir="ltr"><div><span name="Piotr Isajew" class="">Hi, Piotr<br></span><br><span id="result_box" class="" lang="en"><span class="">One possible solution</span> <span class="">is to not</span> <span class="">mount /</span><span class="">cgroup</span> <span class="">in</span> <span class="">fstab</span> <span class="">on the host.<br>
<br></span></span></div><div><span id="result_box" class="" lang="en"><span class="">My configuration:<br></span></span></div><div><span id="result_box" class="" lang="en"><span class="">Slackware 14.1<br></span></span></div>
<div><span id="result_box" class="" lang="en"><span class="">lxc version 0.9.0<br></span></span></div><div><span id="result_box" class="" lang="en"><span class="">kernel 3.12.5<br><br></span></span></div><div><span id="result_box" class="" lang="en"><span class="">try it and good luck<br>
<br></span></span></div><div><span id="result_box" class="" lang="en"><span class="">Giuseppe<br></span></span></div><span id="result_box" class="" lang="en"><span class=""><br></span></span></div><div class="gmail_extra">
<br><br><div class="gmail_quote">2014/1/3 Piotr Isajew <span dir="ltr"><<a href="mailto:pki@ex.com.pl" target="_blank">pki@ex.com.pl</a>></span><br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi,<br>
<br>
I wanted do try out lxc on Slackware 14.1 64-bit. lxc-create<br>
works without problems. I'm however unable to start a container.<br>
<br>
After I do i.e.:<br>
<br>
lxc-start -n vs0<br>
<br>
the command just hangs with no output, consuming all the CPU<br>
resources and eventually eating up all the memory.<br>
<br>
I've spent last three days trying to get it work but I think I've<br>
ran out of ideas.<br>
<br>
<br>
log file contains:<br>
<br>
lxc-start 1388667324.768 INFO lxc_start_ui - using rcfile /var/lib/lxc/vs0/config<br>
lxc-start 1388667324.769 INFO lxc_apparmor - apparmor_load - apparmor is disabled<br>
lxc-start 1388667324.770 DEBUG lxc_conf - allocated pty '/dev/pts/2' (5/6)<br>
lxc-start 1388667324.771 DEBUG lxc_conf - allocated pty '/dev/pts/3' (7/8)<br>
lxc-start 1388667324.771 DEBUG lxc_conf - allocated pty '/dev/pts/4' (9/10)<br>
lxc-start 1388667324.771 DEBUG lxc_conf - allocated pty '/dev/pts/5' (11/12)<br>
lxc-start 1388667324.771 INFO lxc_conf - tty's configured<br>
lxc-start 1388667324.771 DEBUG lxc_console - using '/tmp/console.log' as console log<br>
lxc-start 1388667324.771 DEBUG lxc_console - using '/dev/tty' as console<br>
lxc-start 1388667324.771 DEBUG lxc_start - sigchild handler set<br>
lxc-start 1388667324.771 INFO lxc_start - 'vs0' is initialized<br>
lxc-start 1388667324.777 DEBUG lxc_start - Not dropping cap_sys_boot or watching utmp<br>
<br>
lxc-start 1388667324.777 INFO lxc_conf - opened /var/lib/lxc/vs0/rootfs.hold as fd 20<br>
<br>
After I kill the lxc-start process there are many entries like<br>
vs0-1234 in /cgroup/lxc<br>
<br>
My configuration is as follows:<br>
<br>
Linux kontrabanda 3.10.17 #4 SMP Thu Jan 2 19:49:59 CET 2014 x86_64 Intel(R) Atom(TM) CPU D425 @ 1.80GHz GenuineIntel GNU/Linux<br>
<br>
<br>
# lxc-checkconfig<br>
--- Namespaces ---<br>
Namespaces: enabled<br>
Utsname namespace: enabled<br>
Ipc namespace: enabled<br>
Pid namespace: enabled<br>
User namespace: enabled<br>
Network namespace: enabled<br>
Multiple /dev/pts instances: enabled<br>
<br>
--- Control groups ---<br>
Cgroup: enabled<br>
Cgroup clone_children flag: enabled<br>
Cgroup device: enabled<br>
Cgroup sched: enabled<br>
Cgroup cpu account: enabled<br>
Cgroup memory controller: enabled<br>
Cgroup cpuset: enabled<br>
<br>
--- Misc ---<br>
Veth pair device: enabled<br>
Macvlan: enabled<br>
Vlan: enabled<br>
File capabilities: enabled<br>
<br>
<br>
# cat /var/lib/lxc/vs0/config<br>
# Template used to create this container: slackware<br>
# Template script checksum (SHA-1): 54f35064852a068c7ed1d0ae5e4b3ac8200ac790<br>
<br>
lxc.network.type = empty<br>
<br>
<br>
lxc.utsname = vs0<br>
<br>
lxc.mount = /var/lib/lxc/vs0/rootfs/etc/fstab<br>
<br>
lxc.tty = 4<br>
lxc.pts = 1024<br>
lxc.rootfs = /var/lib/lxc/vs0/rootfs<br>
<br>
lxc.cgroup.devices.deny = a<br>
# /dev/null and zero<br>
lxc.cgroup.devices.allow = c 1:3 rwm<br>
lxc.cgroup.devices.allow = c 1:5 rwm<br>
# consoles<br>
lxc.cgroup.devices.allow = c 5:1 rwm<br>
lxc.cgroup.devices.allow = c 5:0 rwm<br>
lxc.cgroup.devices.allow = c 4:0 rwm<br>
lxc.cgroup.devices.allow = c 4:1 rwm<br>
# /dev/{,u}random<br>
lxc.cgroup.devices.allow = c 1:9 rwm<br>
lxc.cgroup.devices.allow = c 1:8 rwm<br>
lxc.cgroup.devices.allow = c 136:* rwm<br>
lxc.cgroup.devices.allow = c 5:2 rwm<br>
# rtc<br>
lxc.cgroup.devices.allow = c 254:0 rwm<br>
<br>
# we don't trust root user in the container, better safe than sorry.<br>
# comment out only if you know what you're doing.<br>
lxc.cap.drop = sys_module mknod<br>
lxc.cap.drop = mac_override kill sys_time<br>
lxc.cap.drop = setfcap setpcap sys_boot<br>
<br>
# if you want to be even more restrictive with your container's root<br>
# user comment the three lines above and uncomment the following one<br>
# lxc.cap.drop=sys_admin<br>
<br>
<br>
# cat /var/lib/lxc/vs0/rootfs/etc/fstab<br>
lxcpts /var/lib/lxc/vs0/rootfs/dev/pts devpts defaults,newinstance 0 0<br>
none /var/lib/lxc/vs0/rootfs/proc proc defaults 0 0<br>
none /var/lib/lxc/vs0/rootfs/sys sysfs defaults 0 0<br>
none /dev/shm tmpfs defaults 0 0<br>
<br>
<br>
# mount | grep cgroup<br>
cgroup on /cgroup type cgroup (rw)<br>
_______________________________________________<br>
lxc-users mailing list<br>
<a href="mailto:lxc-users@lists.linuxcontainers.org">lxc-users@lists.linuxcontainers.org</a><br>
<a href="http://lists.linuxcontainers.org/listinfo/lxc-users" target="_blank">http://lists.linuxcontainers.org/listinfo/lxc-users</a><br>
</blockquote></div><br></div>