Hi,
I have not yet managed to create an unprivileged container within a
container (privileged or unprivileged).
The only nesting I've been able to do, is to create an privileged
container within an privileged container.
I've tried this with ubuntu trusty and vivid. Are there some issues or
On 04/01/2015 12:54 PM, Michael H. Warfield wrote:
Doing a read-only bind mount is marginal at best. We've had issues with
remounts in containers propagating out (that I think/hope are finally
fixed) and some containers need mount privs in order to mount images or
do nfs/afs/cifs mounts, so proh
I've been running containers in production where pretty much everything
is bind-mounted from the host, including /lib and /usr, with no problems
at all.
Cheers,
Andre
On 04/01/2015 01:07 PM, Chris Burroughs wrote:
> Userland tools can be confused if the running kernel does not match
> anything in
On Wed, 2015-04-01 at 12:07 -0400, Chris Burroughs wrote:
> Userland tools can be confused if the running kernel does not match
> anything in /lib/modules, and 'per-container' modules are nonsensical
> notion anyway. Is there any reason not to ready only bind-mount
> /lib/modules & /usr/src/ker
Userland tools can be confused if the running kernel does not match
anything in /lib/modules, and 'per-container' modules are nonsensical
notion anyway. Is there any reason not to ready only bind-mount
/lib/modules & /usr/src/kernels from the host into the container? I've
seen a few reference
Dear,
I have a lxc container named ginkgo1, which runs on an physic arm64 host
machine. When i using "lxc-console -n ginkgo1 -t 3" to login the lxc container
with the right name and Password, the "Login incorrect" was displayed.
Here is the full section from the /var/lib/lxc/ginkgo
On Mit, 2015-04-01 at 00:16 +, Serge Hallyn wrote:
> Quoting Georg Schönberger (gschoenber...@thomas-krenn.com):
> > Hi LXC team,
> >
> > somehow my cgm setup stopped working today!
> >
> > I cannot make a request from the host anymore:
> > # lxc-cgroup -n ubuntu1 memory.usage_in_bytes
> > 32