Quoting TuxRaiderPen (tuxraider...@wpascanner.com):
Playing with lxc virtualization to possibly isolate some things in their
own
little/light world(s) v. standard VM via VMWare Server or Player.
I am trying to use mount for cifs to mount to a NAS to export out some data
apparmor is
Quoting Dan Kegel (d...@kegel.com):
I'd like to strace a stray process, but in Ubuntu 12.04, to do that
you have to do
echo 0 | sudo tee /proc/sys/kernel/yama/ptrace_scope
This fails inside an LXC (ephemeral) container.
But since there's only one kernel, you can do that in the host, and
Quoting Toens Bueker (toens.bue...@lists0903.nurfuerspam.neuroserve.de):
Leon Waldman le.wald...@gmail.com wrote:
Hi all, first post on the list :)
Welcome.
Assuming a hardened Guest image (SELinux or Apparmor + The NSA
Guidelines + no shell access on the guests), A LXC Host would
Quoting 宣铭艺 (xuanmin...@gmail.com):
can we use libvirt-bin in lxc???
Yes, you can. The failures you show are due to your apparmor policy
not allowing mounting of cgroups in the containers. You can create a
new policy for your containers allowing just the permissions you need,
or (not
Quoting Florian Motlik (flomot...@gmail.com):
When setting up a current cloud image I ran into the following error:
/usr/sbin/grub-probe: error: cannot find a device for / (is /dev mounted?)
I tried it on our Development Server and my local system. Both lead to
the same error.
To
Quoting Dan Kegel (d...@kegel.com):
Hi ho.
( I see https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1049908 also
deals with lxc and upstart, but my use case is probably different.)
I'd like to run an ephemeral container in a respawning upstart job,
but I don't know how shutdown should
I just created and started 99 containers on a cloud instance. Those were
using the lxcbr0 bridge and using dnsmasq rather than statically assigned
ips. But I had no problems. So your issue isn't with the container's
veth devices themselves, though it still could be a bug in your kernel's
Hi,
Dan Kegel (cc:d) found an interesting nuisance relating to upstart
and network interfaces with lxc containers. In particular, when you
start a container, two veths are created. A uevent for their creation
is sent, and so a 'network-interface' upstart job is created for each.
One of the
Quoting Frank Scholten (fr...@frankscholten.nl):
Hi all,
I want to run non-root LXCs and I read I have to run sudo lxc-setcap
first. I am running Ubuntu 12.04 btw.
So I cloned the git repo, ran ./configure, make, make install but when
I run lxc-setcap I get:
Quoting Eric W. Biederman (ebied...@xmission.com):
Serge Hallyn serge.hal...@canonical.com writes:
Hi,
Dan Kegel (cc:d) found an interesting nuisance relating to upstart
and network interfaces with lxc containers. In particular, when you
start a container, two veths are created
Try in quantal. I think Stephane got it all fixed back up there.
Looking at the diff, pulling the lxc-start-ephemeral out of the
quantal package and using it in precise might work just fine.
Quoting Dan Kegel (d...@kegel.com):
Not sure what's up with this, but on my ubuntu 12.04.1 system,
Quoting Eric W. Biederman (ebied...@xmission.com):
Serge Hallyn serge.hal...@canonical.com writes:
Quoting Eric W. Biederman (ebied...@xmission.com):
I am not currently working on a patch for this, but I will be happy to
review one. At a quick glance it looks like this could just
Quoting Eric W. Biederman (ebied...@xmission.com):
Serge Hallyn serge.hal...@canonical.com writes:
Quoting Eric W. Biederman (ebied...@xmission.com):
Serge Hallyn serge.hal...@canonical.com writes:
Quoting Eric W. Biederman (ebied...@xmission.com):
I am not currently working
KOBJ_ADD to new netns. There will then be a
_MOVE event from the device_rename() call, but that should
be innocuous.
Signed-off-by: Serge Hallyn serge.hal...@canonical.com
Acked-by: Eric W. Biederman ebied...@xmission.com
---
net/core/dev.c |6 ++
1 file changed, 6 insertions(+)
diff --git
to
which you can setns.
I also have the setns man page. How
do I enable it? Do I have to compile a new kernel?
Cheers,
Frank
On Mon, Oct 15, 2012 at 6:25 PM, Serge Hallyn
serge.hal...@canonical.com wrote:
Quoting Frank Scholten (fr...@frankscholten.nl):
Hi all,
I am trying to run
Quoting 宣铭艺 (xuanmin...@gmail.com):
Dear all:
Can we run a kvm vm in lxc?
Yes.
Should we modify some thing to make sure the vm work?
Depends on what you're starting with. You mainly just need to make
sure the container can access /dev/kvm.
Quoting John (l...@jelmail.com):
Hello, I'm in the middle of a migration from init to systemd. I've
completed the transition of my host environment and my 6 existing
containers continue to work as expected (they all use sysvinit
internally). I've started work on a systemd container and am
Quoting Gary Ballantyne (gary.ballant...@haulashore.com):
Hi
I use lxc.aa_profile = unconfined to get the NFS client to work in a
container (precise host and container).
Is that the best approach?
If disabling apparmor works, then a custom profile should also work, and
would be your best
is something I've been trying to do and I had run into
that posters problems. You responded with this:
Subject: Re: [Lxc-users] fedora 16 under lxc
On Tue, 2012-02-14 at 09:23 -0600, Serge Hallyn wrote:
Quoting Ramez Hanna (rha...@informatiq.org):
now all my efforts have not succeedd to get
Quoting John (l...@jelmail.com):
On 19/10/12 16:51, Serge Hallyn wrote:
Add:
lxc.network.type = empty
If you don't have any lxc.network.type sections, then the container
shares network with the host, and so the container talks to the host's
systemd. (same with upstart
Quoting Michael H. Warfield (m...@wittsend.com):
On Mon, 2012-10-22 at 16:21 -0500, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
On Mon, 2012-10-22 at 15:14 -0500, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
Serge,
On Mon
Quoting Fajar A. Nugraha (l...@fajar.net):
On Thu, Oct 25, 2012 at 4:11 PM, 宣铭艺 xuanmin...@gmail.com wrote:
Dear all:
The problem is that,how can we limit the disk space in lxc.Now I use the
default config.
And the container can access all space in host.can we use lvm or other tools
to
Quoting Michael H. Warfield (m...@wittsend.com):
Sorry for taking a few days to get back on this. I was delivering a
guest lecture up at Fordham University last Tuesday so I was out of
pocket a couple of days or I would have responded sooner...
On Mon, 2012-10-22 at 16:59 -0400, Michael H.
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-10-25 at 13:23 -0400, Michael H. Warfield wrote:
Hey Serge,
On Thu, 2012-10-25 at 11:19 -0500, Serge Hallyn wrote:
...
Oh, sorry - I take back that suggestion :)
Note that we have mount hooks, so templates could
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-10-25 at 23:38 +0200, Lennart Poettering wrote:
On Thu, 25.10.12 11:59, Michael H. Warfield (m...@wittsend.com) wrote:
I've got some more problems relating to shutting down containers, some
of which may be related to mounting
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-10-25 at 20:30 -0500, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-10-25 at 23:38 +0200, Lennart Poettering wrote:
On Thu, 25.10.12 11:59, Michael H. Warfield (m...@wittsend.com) wrote
Quoting Michael H. Warfield (m...@wittsend.com):
On Sun, 2012-10-28 at 18:52 +0100, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
On Sat, 2012-10-27 at 13:51 -0400, Michael H. Warfield wrote:
On Sat, 2012-10-27 at 13:40 -0400, Michael H. Warfield wrote:
/me
Quoting Michael H. Warfield (m...@wittsend.com):
...
Yeah, I don't think I need to play a game like this anymore. I'd have
to go back through some old old E-Mails to see why I did that before. I
seem to recall we were playing with all sorts of bind mount options for
some PRIVATE thing or
Quoting Michael H. Warfield (m...@wittsend.com):
On Sun, 2012-10-28 at 23:02 +0100, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
:
I did see some errors setting up that dev...
--
[root@forest mhw]# lxc-start -n Alcove
lxc-start: No such file
Quoting Giuseppe Tofoni (gt0...@gmail.com):
2012/10/28 Serge Hallyn serge.hal...@canonical.com:
Quoting Giuseppe Tofoni (gt0...@gmail.com):
Hello,
First thanks for your great work.
I am a happy user of LXC with Slackware 13.37 and lxc-0.7.4.2, but
with slack64 14.0 and lxc-0.8.0-rc2
Can you tell me the exact git tree and branch you are using?
The results you're getting don't make sense to me... Hoping I can find
a simple answer.
-serge
--
Everyone hates slow websites. So do we.
Make your web apps
Quoting Michael H. Warfield (m...@wittsend.com):
On Mon, 2012-10-29 at 10:18 +0100, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
...
Yeah, I don't think I need to play a game like this anymore. I'd have
to go back through some old old E-Mails to see why I did
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-11-01 at 21:20 +0100, Daniel Baumann wrote:
On 11/01/2012 09:08 PM, Michael H. Warfield wrote:
I know, I KNOW this is an 11th hour request. Can we please get Serge's
autodev stuff into this release? Please?
release early,
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-11-01 at 22:44 +0100, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
On Thu, 2012-11-01 at 21:20 +0100, Daniel Baumann wrote:
On 11/01/2012 09:08 PM, Michael H. Warfield wrote:
I know, I KNOW
Quoting Thierry (mys...@cynetek.com):
Hello,
lxc-console not functionnal after activate lxc.cgroup.devices.deny = a
Phew, so it's working correctly.
Now add
lxc.cgroup.devices.allow = c 136:* rwm
to allow access to the console devices created by lxc.
-serge
Quoting Michael H. Warfield (m...@wittsend.com):
...
This was from another threat with the systemd guys.
On Mon, 2012-10-22 at 16:11 +0200, Lennart Poettering wrote:
Note that there are reports that LXC has issues with the fact that
newer
systemd enables shared mount propagation for all
Quoting Thierry (mys...@cynetek.com):
My understanding was that you manually set lxc.cgroup.devices.deny = a
after starting up the container. Is that right, or not? If not, please
give your full config files for working and not working cases. -serge
Using only configuration file. Not
Quoting Thierry (mys...@cynetek.com):
lxc-start 1352149909.205 DEBUGlxc_conf - trying to mount
'/dev/vg1/debian-dev'-'/usr/lib/lxc/rootfs' with fstype '# /etc/filesystems'
lxc-start 1352149909.205 DEBUGlxc_conf - mount failed with error:
No such device
(And a bunch more)
Quoting Thierry (mys...@cynetek.com):
Le 05/11/2012 22:25, Serge Hallyn a écrit :
Quoting Thierry (mys...@cynetek.com):
lxc-start 1352149909.205 DEBUGlxc_conf - trying to mount
'/dev/vg1/debian-dev'-'/usr/lib/lxc/rootfs' with fstype '#
/etc/filesystems'
lxc-start
Quoting Thierry (mys...@cynetek.com):
Le 05/11/2012 23:36, Serge Hallyn a écrit :
Quoting Thierry (mys...@cynetek.com):
Le 05/11/2012 22:25, Serge Hallyn a écrit :
Quoting Thierry (mys...@cynetek.com):
lxc-start 1352149909.205 DEBUGlxc_conf - trying to mount
'/dev/vg1/debian
Quoting 宣铭艺 (xuanmin...@gmail.com):
Hi
I can't use libvirt-bin in lxc,who can tell me why and how to do it.
I have mknod some devices such as kvm hpet
this is the lxc config file
http://paste.ubuntu.com/1338853/
this is the strace message.(strace virsh start cflinux)
Quoting Thierry (mys...@cynetek.com):
Sorry, this might be debug-able hands-on, but not like this (and esp not
with non-standard reply formats). Both your supposed working and
non-working cases show /dev/console and /dev/ttyN being wrong (so
lxc-console should actually fail for both) while the
Quoting 宣铭艺 (xuanmin...@gmail.com):
2012/11/7 Serge Hallyn serge.hal...@canonical.com
Quoting 宣铭艺 (xuanmin...@gmail.com):
Hi
I can't use libvirt-bin in lxc,who can tell me why and how to do it.
I have mknod some devices such as kvm hpet
this is the lxc config file
http
Quoting Sujay M (sujay@gmail.com):
Hi all,
I am new to both lxc and Openstack swift. I want to set up cloud storage
environment with lxc for virtualization.
I want some help regarding how i can use lxc for virtualization in
openstack swift. Thanks in advance
Openstack uses
Quoting Ulli Horlacher (frams...@rus.uni-stuttgart.de):
On Fri 2012-11-09 (08:31), Serge Hallyn wrote:
Since you have a real bridge, it is better to keep using br0.
I have just discovered, that br0 is still available!
I was in mistake to think only lxcbr0 and virbr0 are choosable
Quoting Rintcius Blok (rintc...@gmail.com):
Hi,
Just curious.
I was running an lxc-create command for ubuntu-cloud and saw this output:
Configuring for running outside of a cloud environment
If you want to configure for a cloud evironment, please use '-- -C' to
create the container
Quoting Rintcius Blok (rintc...@gmail.com):
How can I properly run an ubuntu-cloud template on 12.10 with an
oneiric container?
I tried this command:
lxc-create -t ubuntu-cloud -n oneiric.lxc -- --auth-key
$HOME/.ssh/id_rsa.pub --userdata ~/userdata.txt.gz -r oneiric
This creates the
Quoting Rintcius Blok (rintc...@gmail.com):
Hi,
I am getting messages like this with every sudo I do in the container:
sudo: unable to resolve host test.lxc
It happens with every container I create on 12.10 (with 12.10 container).
Reproduction:
lxc-create -t ubuntu-cloud -n
Since you say that after this you cannot start any containers at all until
a host reboot, I think what you get is a known kernel netdev refcounting
bug. (Check your host syslog messages.) You might try a backported raring
kernel.
-serge
Quoting Rintcius Blok (rintc...@gmail.com):
Hi,
I get
Quoting Rintcius Blok (rintc...@gmail.com):
Hmm.. I just had the same problem again.
I thought it was this bug:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1021471
(fixed in 3.5.0-17.28)
Am I having the correct version installed? :
3.5.0-18-generic #29-Ubuntu SMP Fri Oct 19
Quoting Rintcius Blok (rintc...@gmail.com):
Yes indeed, that version of the kernel is running.
No, I'm not on a macbook air.
Hi,
sorry I've lost track - have you tried the kernel in quantal-proposed?
There was in fact another bug and I can't remember now if it came up
in this thread, or
Quoting Michael H. Warfield (m...@wittsend.com):
Serge...
You need to go in for doing psychic readings or buy lots of lottery
ticks because I think you must have been channeling me and reading my
mind. I've been close to posting on this off and on for the last couple
of days but kept going
Quoting vignesh kumar (vigneshkuma...@gmail.com):
Hi,
I am using a lxc-ubuntu container in a ubuntu 11.10 host OS. An
application running in a container requires camera access . Currently
I have a USB based webcam which mount as /dev/video0 in my host.I
tried giving access to the device
Quoting daniel marques (daniel.marq...@uniriotec.br):
Hi Folks,
Recently I've adopted LXC as a network virtualization tool, where I use the
containers to generate traffic via iperf and do my experiments. So far,
everything seems to be fine, but I am with doubts regarding the network
Quoting vignesh kumar (vigneshkuma...@gmail.com):
Hi,
I have added the line as you mentioned and restarted the container as
well. Still getting the same issue.
On Wed, Nov 28, 2012 at 8:23 PM, Serge Hallyn
serge.hal...@canonical.comwrote:
Quoting vignesh kumar (vigneshkuma
Quoting daniel marques (daniel.marq...@uniriotec.br):
Hi Serge,
Sorry for my late answer. I do use veth, but the other experiments also use
it.
Please explain exactly how the non-container network namespace test was
set up, though.
But my guess there is might be some kind of kernel
Quoting John (l...@jelmail.com):
If so, I'd be grateful for some guidance on what I need to do to to my
configuration to make it work.
Right now, you'll have to build from git.
I will go away and do a git build later today.
I presume that would be from
Quoting Michael H. Warfield (m...@wittsend.com):
You have to add an option to the config file for your systemd
containers.
lxc.autodev = 1
Phrasing it this way makes me wonder, should lxc look for
'$rootfs/dev/console' and automatically set lxc.autodev if
that is not found?
(Right now if
The short answer is, if login prompt is going to the system console then
that means /dev/console was recreated in the container as 5:1.
What you probably want to do is grab the lxc version from
git://github.com/lxc/lxc.git#staging and set lxc.autodev=1 in your
container config. Then systemd in
Quoting John (l...@jelmail.com):
On 05/12/12 21:59, Serge Hallyn wrote:
You have to specify a template, i.e. '-t debian'.
Oh. I wasn't using a template.
Up to now, I have an existing root fileyststem, say
/srv/lxc/mycontainer.x86_64 that is pointed to by my configuration
file, say
Quoting John (l...@jelmail.com):
On 06/12/12 20:06, Dan Kegel wrote:
On Thu, Dec 6, 2012 at 12:00 PM, John l...@jelmail.com wrote:
While on the subject, any reason for lxc-destroy now being destructive?
Wait, isn't that the point? It's in the name and all.
When was it ever
Quoting John (l...@jelmail.com):
On 07/12/12 00:48, Serge Hallyn wrote:
Quoting John (l...@jelmail.com):
On 06/12/12 20:06, Dan Kegel wrote:
On Thu, Dec 6, 2012 at 12:00 PM, John l...@jelmail.com wrote:
While on the subject, any reason for lxc-destroy now being destructive?
Wait, isn't
Quoting John (l...@jelmail.com):
Quoting Michael H. Warfield (m...@wittsend.com):
You have to add an option to the config file for your systemd
containers.
lxc.autodev = 1
I would like to understand a bit more about what this option does
and learn the correct way of creating devices
Quoting John (l...@jelmail.com):
On 07/12/12 13:50, Serge Hallyn wrote:
Quoting John (l...@jelmail.com):
On 07/12/12 00:48, Serge Hallyn wrote:
Quoting John (l...@jelmail.com):
On 06/12/12 20:06, Dan Kegel wrote:
On Thu, Dec 6, 2012 at 12:00 PM, John l...@jelmail.com wrote:
While
Quoting Michael H. Warfield (m...@wittsend.com):
We do have the case with the current Ubuntu stuff, though, where it will
start containers using config files that have not been run through
lxc-create. Is this something we want to support??? Is it too great a
Not really, imo. I don't see any
Quoting Michael H. Warfield (m...@wittsend.com):
On Mon, 2012-12-10 at 08:10 -0600, Serge Hallyn wrote:
Quoting Michael H. Warfield (m...@wittsend.com):
There has been very little discussion in the main project over how to
manage autobooting containers (or maybe I've missed it). Maybe
Quoting Jäkel, Guido (g.jae...@dnb.de):
Hi all,
here my 5ct on auto start and start order: Because i'm using a farm of LXC
hosts where my containers may be spread over, i also need to persist the
preferred host of a container. This is currently stored in a separate
configuration file.
Quoting Rob van der Hoeven (robvanderhoe...@ziggo.nl):
Hi,
I want to use lxc-execute to isolate programs from the users data. For
this I created the following lxc configuration file:
Name: /home/rob/lxctest/lxc02.conf
Contents:
lxc.utsname=lxc02
Quoting Rob van der Hoeven (robvanderhoe...@ziggo.nl):
I would really like an extra lxc.mount.cwd entry in the configuration
file. Maybe this entry should be mandatory if the containers filesystem
is different from the host filesystem because in this case the cwd
By container fs is different
Quoting Rob van der Hoeven (robvanderhoe...@ziggo.nl):
On Wed, 2012-12-12 at 08:52 -0600, Serge Hallyn wrote:
...
I will be very happy with a lxc.chdir option! (I like the name, its
better than lxc.mount.cwd) Will probably use it in all my lxc-execute
configurations...
I'll add it to my todo
Quoting zheng_hua...@163.com (zheng_hua...@163.com):
hi, i have two processes running in two containers, they are expected to
communicate with shared memory IPC, but it turned out to be failed. is there
any way to address this problem?
Yes, have the containers share an ipc namespace.
-serge
Quoting Binknight (zheng_hua...@163.com):
hi,
i have two processes running in two containers on the same hardware node,
they are expected to communicate with shared memory IPC mechanism, but it
turned out to be failed. It seems that the shared memory created in one
container is not
Quoting Kalyana sundaram (kalyan...@gmail.com):
Could somebody let me know how to set up veth network on container using
openv-switch. I read through few links on net which asked to run a script
which has (http://people.canonical.com/~serge/user-data-lxc-ovs.sh)
To make sure this is clear,
Quoting brian mullan (bmullan.m...@gmail.com):
*Now the real problem this causes is upon shutdown or restart of my HOST
system (ubuntu 12.10) my pc gets stuck in a loop that keeps repeating:*
*[1176.213467] unregistered_netdevice: Waiting for lo to become free.
Usage Count = 2*
Any advice
Quoting LACROIX Jean Marc (jeanmarc.lacr...@free.fr):
hi,
With last commit from Daniel
commit 56655134e462ceaf86b51838e4e825c2f3964922
Author: Daniel Lezcano daniel.lezc...@free.fr
Date: Fri Dec 14 09:42:55 2012 +0100
Version 0.9.0.alpha2
I am trying to rebuild all lxc
Quoting Sanjay (genacct...@gmail.com):
Hi! I came across a patch that allows one to use unix domain socket across
network name space (from Daniel back in April 2010).
Link?
I didn't see the patch in latest Kernels. Is there a better solution ?
Thanks
Sanjay
Quoting William Tu (u9012...@gmail.com):
Hi Folks,
I'm new to the LXC and recently I'm wondering that is it possible to
pass-through an arbitrary PCI device to a container?
For example, I have an NTB (Non-transparent Bridge) device and I'd
like to pass it to a container.
Or is it
Quoting John (l...@jelmail.com):
Hi everyone,
I haven't yet tried this yet but thought I'd ask first because it
Why not? :)
seems a bit crazy, but...
Not at all.
Is it possible to configure a container so that it has a bridge in it ?
Yup. The container has a full l2 networking stack.
Quoting Shibashish (shi...@gmail.com):
I am on CentOS 6.3 and got lxc working on it. But when I run lxc-ps or
lxc-netstat, i get the following errors...
lxc-ps: no cgroup mount point found
lxc-netstat: no cgroup mount point found
Relevant lines in lxc-ps.in... (I tried bot the options)
Quoting John de la Garza (j...@jjdev.com):
I am trying to create a sshd container. Any ideas on how to fix this?
This is fixed upstream and in 13.04 (raring), but it looks like the fix
is not yet in quantal. I'll file a bug for it, thanks.
In the meantime, you can either grab raring, or build
Quoting Cristian Falcas (cristi.fal...@gmail.com):
Hello,
Does anybody have any experience with running lxc using libvrt with a
fedora host?
In the guest (fedora or ubuntu) I try to create a tun node, but I'm
getting Operation not permitted:
[root@wikitiki vpn_itne]# mkdir /dev/net
Quoting Florian Motlik (flomot...@gmail.com):
Hey guys,
just recently started getting
/usr/sbin/grub-probe: error: failed to get canonical path of
/dev/disk/by-uuid/104a8748-2978-4b87-afb7-e476aff3a957.
dpkg: error processing memtest86+ (--configure):
subprocess installed
Quoting Ciprian Dorin Craciun (ciprian.crac...@gmail.com):
On Tue, Jan 15, 2013 at 11:46 PM, pablo platt pablo.pl...@gmail.com wrote:
I want to execute user submitted code in Java, Python and other languages in
a container.
Something similar to http://ideone.com but much simpler.
The code
Quoting Benoit Lourdelet (blour...@juniper.net):
Hello,
I am running LXC 0.8.0 on Ubuntu running Kernel 3.7.1.
I have assigned physical interfaces to a container:
lxc.network.type = phys lxc.network.flags = up lxc.network.link = eth4.2000
lxc.network.name = eth2 lxc.network.hwaddr =
I'd edit your lxc-start-ephemeral script to run lxc-start with '-l info
-o /tmp/ephemeral-debug', and see if anything helpful comes up in that
file. Admittedly if the container's init is starting chances are there
will be nothing helpful in the logfiles...
It seems unlikely that incomplete
Quoting Lars Kellogg-Stedman (l...@oddbit.com):
Perhaps because eth0 exists before systemd and udev start?
doing udevadm trigger --action=add would cause the uevent to be
resent
I thought of that, but running udevadm trigger ... does not appear to
make systemd happy. Units that
Quoting Lars Kellogg-Stedman (l...@oddbit.com):
I'm runing LXC 0.7.5 under Fedora 17 (3.7.3-101.fc17.x86_64). I've been
banging my head against LXC for a bit today. My latest problem is that
if a container fails to start, I run into this situation:
# lxc-start -n node0
lxc-start:
Quoting pablo platt (pablo.pl...@gmail.com):
Hi,
Is there an example for a config file needed to create a sandbox?
I'm using ubuntu 12.04 (can use any other version if required).
I need to execute untrusted code inside a sandbox with lxc-execute.
libvirt-sandbox seems to be what I need
Quoting Lars Kellogg-Stedman (l...@oddbit.com):
No idea about the systemd aspects, but the best way to get those cgroups
to be autoremoved is using a release_agent. See
Documentation/cgroups/cgroups.txt in the kernel source.
Serge,
Thanks for the pointer. That does seem like the
Quoting Gary Ballantyne (gary.ballant...@haulashore.com):
On Fri, 1 Feb 2013 10:24:13 -0600
Serge Hallyn serge.hal...@canonical.com wrote:
Did you actually test with a memory hog program? I just noticed there
appears to be a bug in that if I
d=/sys/fs/cgroup/memory
Quoting Ivan Vilata i Balaguer (i...@selidor.net):
Hi everyone,
I'm using lxc 0.9.0 alpha 2 on a 3.7 kernel under Debian (experimental
kernel), and I've noticed that some files and directories under
`/proc/sys/net` simply don't appear in my container. Particularly
`/proc/sys/net/bridge`
Quoting Timofey.Kirillov (distorh...@gmail.com):
Hi,
I have a question about using unnamed pipes with procfs.
Suppose a chrooted environment with proc mounted as procfs. I am
trying to use bash process substitution feature and get this:
$ cat (echo hello)
cat: /dev/fd/63: No such file
Quoting Kim C. Callis (kim.cal...@gmail.com):
Ok, I am good and lost... I thought it would be as simple as adding your
script to /usr/share/lxc/templates and then doing:
*$ sudo lxc-create -n centosbox -t centos -- - user*
*
*
No config file specified, using the default config
Quoting John (l...@jelmail.com):
I raised this issue back on 6th/7th December. It was a side-issue in
a discussion entitled unable to run systemd in an LXC container. I
have always performed a destroy/create cycle to apply changes
written to /etc/lxc/mycontainer.conf. I was asked why I didn't
12:41 AM, Serge Hallyn wrote: Or just suggest a way
to modify containers
configuration.
Sorry, can you elaborate? You can modify configuration using the
API (in C, python, or, iiuc, lua). You can edit the configuration
file by hand... If there is more you'd
I don't see any reason why you shouldn't pretty easily be able to
implement it. Look at the other templates to see how they do it.
Quoting Kim C. Callis (kim.cal...@gmail.com):
The problem seems to be in the template for the centos. As it stands it
doesn't allow for me to change the build
Quoting Randy Wilson (randyedwil...@gmail.com):
Hi,
Here's a brief summary of the issue, as this is quite a lengthy post:
* Ubuntu 12.04 host with eth0 bridged with br0 and lxcbr0 not used
* Ubuntu 12.04 container configured with macvlan,
lxc-container-with-nesting AppArmor profile
Quoting sanjay (genacct...@gmail.com):
Closing thread: Alternate patch from
http://lists.linux-foundation.org/pipermail/containers/2010-June/024725.html
is
already upstreamed to make UDS work across namespaces.
Thanks,
To be clear, only sharing of file backed unix domain sockets is allowed
Quoting Papp Tamas (tom...@martos.bme.hu):
On 02/11/2013 04:11 AM, Serge Hallyn wrote:
Agreed, please do get us precise reproduction steps so we can look into
it and fix it.
I'm sorry about the delay.
I tested is again and I'm quite surprised, that you're right. If it's
No. However, you should be able to hack it up pretty easily in
userspace by comparing /proc/$$/ns/pid. It requires privilege,
but a very simple, easy-to-verify helper which simply takes one
argument and returns 0 if /proc/$1/ns/pid is the same as
/proc/self/ns/pid should be trustable with
201 - 300 of 482 matches
Mail list logo