-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
runC depends on devices cgroup to find mountpoints #798
Comments
Kernel 2.6 is pretty old and (at least for Docker) no longer supported, so I'm not sure if runC still supports this |
@thaJeztah While technically true, this kernel appears to have user namespaces enabled. So while normal runC probably won't work on such a kernel, it should be entirely possible to run rootless containers on such a setup. I asked @davidlt to open an issue because it appears there's several bugs in runC (that would be reproducible on supported kernels) that have been excacerbated by his setup:
The key part of the check config output is this:
|
Here's some output from the system in question:
|
It looks like |
@jpetazzo I think it's intended, we shouldn't change device cgroup settings in user namespace because the kernel won't allow it, but we should still join a particular cgroup which the admin had already set the whitelist or blacklist and want the container to follow. |
I think I have a similar issue. @hqhq as per your suggestion, I am creating a new group, now can you tell if I need to add any limits to the newly created group. [ appcontainer]$ cat /proc/self/mountinfo | grep cgroup |
…rence bundle.md: specify root reference the directory
While testing rootless containers (not yet merged -- #774) on
Scientific Linux CERN SLC release 6.7 (Carbon)
(same as CentOS/RHEL) I hit an issue:Kernel:
The same setup worked out-of-the box on Fedora 24.
From @cyphar
I also did run
./contrib/check-config.sh
from Docker.The text was updated successfully, but these errors were encountered: