-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
runC depends on devices cgroup to find mountpoints #798
Comments
Kernel 2.6 is pretty old and (at least for Docker) no longer supported, so I'm not sure if runC still supports this |
@thaJeztah While technically true, this kernel appears to have user namespaces enabled. So while normal runC probably won't work on such a kernel, it should be entirely possible to run rootless containers on such a setup. I asked @davidlt to open an issue because it appears there's several bugs in runC (that would be reproducible on supported kernels) that have been excacerbated by his setup:
The key part of the check config output is this:
|
Here's some output from the system in question:
|
It looks like |
@jpetazzo I think it's intended, we shouldn't change device cgroup settings in user namespace because the kernel won't allow it, but we should still join a particular cgroup which the admin had already set the whitelist or blacklist and want the container to follow. |
I think I have a similar issue. @hqhq as per your suggestion, I am creating a new group, now can you tell if I need to add any limits to the newly created group. [ appcontainer]$ cat /proc/self/mountinfo | grep cgroup |
…rence bundle.md: specify root reference the directory
While testing rootless containers (not yet merged -- #774) on
Scientific Linux CERN SLC release 6.7 (Carbon)
(same as CentOS/RHEL) I hit an issue:Kernel:
The same setup worked out-of-the box on Fedora 24.
From @cyphar
I also did run
./contrib/check-config.sh
from Docker.The text was updated successfully, but these errors were encountered: