Hi all,

I am a little bit clueless, I have several systems running with
Debian and unprivileged LXC. But newer systems won't start new
containers.

Actually I have a Debian stretch, installed the normal way but
with lxc-2.0.9 and cgmanager-0.41 installed from sources.

I can setup cgmanager, can do a cgm movepid and it is no problem
to download a template. But starting the container does not work,
it simply hungs at:

   $ lxc-start -n lxc-test -l trace -o wheezy -F

I tried it with debian stretch first, then I tried wheezy since it
does not use systemd.

The kernel is 4.9.0-4-amd64 and kernel.unprivileged_userns_clone is
set to 1. The lxc-monitor complainy about a missing fifo, but I have
no idea, which one it should be.

I have to kill the processes with -9, all other signals are ignored.

The cgroups look good, too:

   $ cat /proc/self/cgroup 
   12:name=systemd:/lxc-test
   11:pids:/lxc-test
   10:perf_event:/lxc-test
   9:net_prio:/lxc-test
   8:net_cls:/lxc-test
   7:memory:/lxc-test
   6:freezer:/lxc-test
   5:devices:/lxc-test
   4:cpuset:/lxc-test
   3:cpuacct:/lxc-test
   2:cpu:/lxc-test
   1:blkio:/lxc-test

lxc-test is the user which tries to start the unprivileged LXC.

Has anyone an idea, what is going wrong?

Best regards

Dirk

PS: I tried lxc-2.1.1 too, but that does not work, too.

-- 
+----------------------------------------------------------------------+
| Dr. Dirk Geschke       / Plankensteinweg 61    / 85435 Erding        |
| Telefon: 08122-559448  / Mobil: 0176-96906350 / Fax: 08122-9818106   |
| d...@geschke-online.de / d...@lug-erding.de  / kont...@lug-erding.de |
+----------------------------------------------------------------------+
      lxc-start 20171205100114.683 INFO     lxc_start_ui - 
tools/lxc_start.c:main:277 - using rcfile 
/home/lxc-test/.local/share/lxc/lxc-test/config
      lxc-start 20171205100114.683 INFO     lxc_utils - utils.c:get_rundir:284 
- XDG_RUNTIME_DIR isn't set in the environment.
      lxc-start 20171205100114.683 WARN     lxc_confile - 
confile.c:set_config_pivotdir:2262 - lxc.pivotdir is ignored.  It will soon 
become an error.
      lxc-start 20171205100114.684 INFO     lxc_confile - 
confile.c:set_config_idmaps:1861 - read uid map: type u nsid 0 hostid 531072 
range 65536
      lxc-start 20171205100114.684 INFO     lxc_confile - 
confile.c:set_config_idmaps:1861 - read uid map: type g nsid 0 hostid 531072 
range 65536
      lxc-start 20171205100114.684 TRACE    lxc_commands - 
commands.c:lxc_cmd:290 - command get_init_pid tries to connect command socket
      lxc-start 20171205100114.684 TRACE    lxc_commands - 
commands.c:lxc_cmd:295 - command get_init_pid failed to connect command socket: 
Connection refused
      lxc-start 20171205100114.684 TRACE    lxc_commands - 
commands.c:lxc_cmd:290 - command get_init_pid tries to connect command socket
      lxc-start 20171205100114.684 TRACE    lxc_commands - 
commands.c:lxc_cmd:295 - command get_init_pid failed to connect command socket: 
Connection refused
      lxc-start 20171205100114.685 WARN     lxc_cgmanager - 
cgroups/cgmanager.c:cgm_get:993 - do_cgm_get exited with error
      lxc-start 20171205100114.685 TRACE    lxc_commands - 
commands.c:lxc_cmd:290 - command get_state tries to connect command socket
      lxc-start 20171205100114.685 TRACE    lxc_commands - 
commands.c:lxc_cmd:295 - command get_state failed to connect command socket: 
Connection refused
      lxc-start 20171205100114.685 TRACE    lxc_start - 
start.c:lxc_init_handler:589 - unix domain socket 4 for command server is ready
      lxc-start 20171205100114.685 TRACE    lxc_start - start.c:lxc_init:604 - 
initialized LSM
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .reject_force_umount  # comment 
this to allow umount -f;  not recommended.
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:610 - Adding native rule for reject_force_umount 
action 0(kill).
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:276 - Setting Seccomp rule to reject force 
umounts.
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:614 - Adding compat rule for reject_force_umount 
action 0(kill).
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:276 - Setting Seccomp rule to reject force 
umounts.
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:276 - Setting Seccomp rule to reject force 
umounts.
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .[all].
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .kexec_load errno 1.
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:610 - Adding native rule for kexec_load action 
327681(errno).
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:614 - Adding compat rule for kexec_load action 
327681(errno).
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .open_by_handle_at errno 1.
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:610 - Adding native rule for open_by_handle_at action 
327681(errno).
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:614 - Adding compat rule for open_by_handle_at action 
327681(errno).
      lxc-start 20171205100114.685 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .init_module errno 1.
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:610 - Adding native rule for init_module action 
327681(errno).
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:614 - Adding compat rule for init_module action 
327681(errno).
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .finit_module errno 1.
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:610 - Adding native rule for finit_module action 
327681(errno).
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:614 - Adding compat rule for finit_module action 
327681(errno).
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:435 - processing: .delete_module errno 1.
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:610 - Adding native rule for delete_module action 
327681(errno).
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:614 - Adding compat rule for delete_module action 
327681(errno).
      lxc-start 20171205100114.686 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:624 - Merging in the compat Seccomp ctx into the main 
one.
      lxc-start 20171205100114.686 TRACE    lxc_start - start.c:lxc_init:610 - 
read seccomp policy
      lxc-start 20171205100114.686 TRACE    lxc_start - 
start.c:lxc_serve_state_clients:360 - set container state to STARTING
      lxc-start 20171205100114.686 TRACE    lxc_start - 
start.c:lxc_serve_state_clients:363 - no state clients registered
      lxc-start 20171205100114.686 INFO     lxc_utils - utils.c:get_rundir:284 
- XDG_RUNTIME_DIR isn't set in the environment.
      lxc-start 20171205100114.686 WARN     lxc_monitor - 
monitor.c:lxc_monitor_fifo_send:111 - Failed to open fifo to send message: No 
such file or directory.
      lxc-start 20171205100114.686 INFO     lxc_utils - utils.c:get_rundir:284 
- XDG_RUNTIME_DIR isn't set in the environment.
      lxc-start 20171205100114.686 WARN     lxc_monitor - 
monitor.c:lxc_monitor_fifo_send:111 - Failed to open fifo to send message: No 
such file or directory.
      lxc-start 20171205100114.686 TRACE    lxc_start - start.c:lxc_init:617 - 
set container state to "STARTING"
      lxc-start 20171205100114.686 TRACE    lxc_start - start.c:lxc_init:645 - 
set environment variables
      lxc-start 20171205100114.686 TRACE    lxc_start - start.c:lxc_init:651 - 
ran pre-start hooks
      lxc-start 20171205100114.686 DEBUG    lxc_start - 
start.c:setup_signal_fd:288 - Set SIGCHLD handler with file descriptor: 5.
      lxc-start 20171205100114.686 TRACE    lxc_start - start.c:lxc_init:662 - 
set up signal fd
      lxc-start 20171205100114.686 DEBUG    console - 
console.c:lxc_console_peer_default:459 - using "/dev/tty" as peer tty device
      lxc-start 20171205100114.686 DEBUG    console - 
console.c:lxc_console_sigwinch_init:151 - process 26870 created signal fd 9 to 
handle SIGWINCH events
      lxc-start 20171205100114.686 DEBUG    console - 
console.c:lxc_console_winsz:71 - set winsz dstfd:6 cols:80 rows:24
      lxc-start 20171205100114.686 TRACE    lxc_start - start.c:lxc_init:669 - 
created console
      lxc-start 20171205100114.686 DEBUG    lxc_conf - 
conf.c:chown_mapped_root:2830 - trying to chown "/dev/pts/2" to 1002
      lxc-start 20171205100114.740 TRACE    lxc_conf - 
conf.c:lxc_ttys_shift_ids:2908 - chowned console "/dev/pts/2"
      lxc-start 20171205100114.740 TRACE    lxc_start - start.c:lxc_init:675 - 
shifted tty ids
      lxc-start 20171205100114.740 INFO     lxc_start - start.c:lxc_init:677 - 
container "lxc-test" is initialized
      lxc-start 20171205100114.741 DEBUG    lxc_start - 
start.c:__lxc_start:1501 - Not dropping CAP_SYS_BOOT or watching utmp.
      lxc-start 20171205100114.741 INFO     lxc_cgroup - 
cgroups/cgroup.c:cgroup_init:67 - cgroup driver cgmanager initing for lxc-test
      lxc-start 20171205100114.748 INFO     lxc_start - start.c:lxc_spawn:1324 
- Cloned CLONE_NEWUSER.
      lxc-start 20171205100114.748 INFO     lxc_start - start.c:lxc_spawn:1324 
- Cloned CLONE_NEWNS.
      lxc-start 20171205100114.748 INFO     lxc_start - start.c:lxc_spawn:1324 
- Cloned CLONE_NEWPID.
      lxc-start 20171205100114.748 INFO     lxc_start - start.c:lxc_spawn:1324 
- Cloned CLONE_NEWUTS.
      lxc-start 20171205100114.748 INFO     lxc_start - start.c:lxc_spawn:1324 
- Cloned CLONE_NEWIPC.
      lxc-start 20171205100114.748 DEBUG    lxc_conf - 
conf.c:idmaptool_on_path_and_privileged:2516 - The binary "/usr/bin/newuidmap" 
does have the setuid bit set.
      lxc-start 20171205100114.748 DEBUG    lxc_conf - 
conf.c:idmaptool_on_path_and_privileged:2516 - The binary "/usr/bin/newgidmap" 
does have the setuid bit set.
      lxc-start 20171205100114.748 DEBUG    lxc_conf - conf.c:lxc_map_ids:2604 
- Functional newuidmap and newgidmap binary found.
      lxc-start 20171205100114.751 TRACE    lxc_conf - conf.c:lxc_map_ids:2660 
- newuidmap wrote mapping "newuidmap 26879 0 531072 65536"
      lxc-start 20171205100114.754 TRACE    lxc_conf - conf.c:lxc_map_ids:2660 
- newgidmap wrote mapping "newgidmap 26879 0 531072 65536"
      lxc-start 20171205100114.755 INFO     lxc_start - start.c:do_start:914 - 
Unshared CLONE_NEWNET.
      lxc-start 20171205100114.758 TRACE    lxc_conf - 
conf.c:userns_exec_1:3817 - establishing uid mapping for "26884" in new user 
namespace: nsuid 0 - hostid 531072 - range 65536
      lxc-start 20171205100114.758 TRACE    lxc_conf - 
conf.c:userns_exec_1:3817 - establishing uid mapping for "26884" in new user 
namespace: nsuid 65536 - hostid 1002 - range 1
      lxc-start 20171205100114.758 TRACE    lxc_conf - 
conf.c:userns_exec_1:3817 - establishing gid mapping for "26884" in new user 
namespace: nsuid 0 - hostid 531072 - range 65536
      lxc-start 20171205100114.758 TRACE    lxc_conf - 
conf.c:userns_exec_1:3817 - establishing gid mapping for "26884" in new user 
namespace: nsuid 65536 - hostid 1002 - range 1
      lxc-start 20171205100114.758 DEBUG    lxc_conf - 
conf.c:idmaptool_on_path_and_privileged:2516 - The binary "/usr/bin/newuidmap" 
does have the setuid bit set.
      lxc-start 20171205100114.758 DEBUG    lxc_conf - 
conf.c:idmaptool_on_path_and_privileged:2516 - The binary "/usr/bin/newgidmap" 
does have the setuid bit set.
      lxc-start 20171205100114.758 DEBUG    lxc_conf - conf.c:lxc_map_ids:2604 
- Functional newuidmap and newgidmap binary found.
_______________________________________________
lxc-users mailing list
lxc-users@lists.linuxcontainers.org
http://lists.linuxcontainers.org/listinfo/lxc-users

Reply via email to