New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cgroups mounts detection is not working inside LXC on CentOS 7 host #2066
Comments
Yeah this looks like fun. It's strange we haven't seen this before -- given that Docker-in-LXC has been known to work for a long time. I'll Cc @brauner for his opinion on this one. The main issue I see with just adding an other special-case for |
I've seen only a single mention of this specific case online. And the user decided just to switch the host OS from CentOS 7 to Ubuntu. |
Similarly,
According to runc/libcontainer/cgroups/utils.go Line 88 in 3e425f8
Not many would face the same issue, but |
The same issue
Docker is working . cgroup remount in differenet options/path cgroupfs-mount after cgroupfs-mount But ,after reboot all groups remount in old way and docker doesn't start again |
@brauner Is lxcfs used to fake cgroupfs with certain kernels / distributions? We can treat |
A long long time ago on a kernel version far far away, LXCFS implemented userspace cgroup namespaces. So on kernels without cgroup namespaces LXCFS can be used to emulate them but nowadays that's rarely used since such kernels should be super old. |
The list of relevant errors from dockerd:
As you can see, the file system in this case is
fuse.lxcfs
whereas at https://github.com/opencontainers/runc/blob/master/libcontainer/cgroups/utils.go#L156 it's expected to find eithercgroup2
orcgroup
.It's completely outside of my expertise but as far as I can tell, LXCFS is used in this case to provide "a container aware cgroupfs tree" because kernels < 4.6 do not have cgroup namespaces support.
The text was updated successfully, but these errors were encountered: