Fixed upstream:
  http://cgit.freedesktop.org/systemd/systemd/commit/?id=417a7fdc418
  http://cgit.freedesktop.org/systemd/systemd/commit/?id=01906c76c

However, there's one more detail to fix in unprivileged containers:

root@v:/# getpcaps  $$
Capabilities for `608': = 
cap_chown,cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_linux_immutable,cap_net_bind_service,cap_net_broadcast,cap_net_admin,cap_net_raw,cap_ipc_lock,cap_ipc_owner,cap_sys_rawio,cap_sys_chroot,cap_sys_ptrace,cap_sys_pacct,cap_sys_admin,cap_sys_boot,cap_sys_nice,cap_sys_resource,cap_sys_tty_config,cap_mknod,cap_lease,cap_audit_write,cap_audit_control,cap_setfcap,cap_syslog,cap_wake_alarm,cap_block_suspend,37+ep

The cap_audit_* are a lie, the audit subsystem in current kernels isn't
namespace aware and thus unprivileged containers can't have these caps.
The failed systemd-journald-audit.socket unit there isn't a big deal,
but this should be fixed in LXC.

** Also affects: lxc (Ubuntu)
   Importance: Undecided
       Status: New

** Description changed:

  Test case
  -------------
  - Under Ubuntu 15.04 (or 15.10), set up an unprivileged container as in 
https://www.stgraber.org/2014/01/17/lxc-1-0-unprivileged-containers/
  - Boot it. You'll get a lot of errors like
  
-   [FAILED] Failed to start Journal Service.
-   systemd-journald-audit.socket failed to listen on sockets: Operation not 
permitted
-   [FAILED] Failed to listen on Journal Audit Socket.
+   [FAILED] Failed to start Journal Service.
+   systemd-journald-audit.socket failed to listen on sockets: Operation not 
permitted
+   [FAILED] Failed to listen on Journal Audit Socket.
  
  - The same happens with systemd-nspawn -b.
  
- As a result, the journal isn't working at all.
+ As a result, the journal isn't working at all, and you have a bunch of
+ failed journal related units.
  
  With a fixed systemd package, systemd in the container should realize
  that it cannot listen to the audit socket (as the kernel doesn't allow
  that -- the audit subsystem isn't fit for namespaces right now), and
  "sudo journalctl" should show the journal and systemd-journald.service
- should be running.
+ should be running. These systemd fixes are sufficient for nspawn, but
+ not completely for unprivileged LXC containers -- there the journal will
+ start working, but systemd-journald-audit.socket will still keep failing
+ (this is less important)

** Changed in: lxc (Ubuntu Wily)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1457054

Title:
  journal is broken in unprivileged LXC and nspawn containers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1457054/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to