Public bug reported: On Xenial, can not start a nested Trusty container inside a Trusty container. (All containers are privileged, tests done on two different machines, one is a fresh Xenial install)
Steps to reproduce: * Create a nested Trusty container (ie. Trusty container in a trusty container) on a Xenial machine * Observe the result: # lxc-start -d --name testt --logfile=/tmp/log lxc-start: lxc_start.c: main: 341 The container failed to start. lxc-start: lxc_start.c: main: 343 To get more details, run the container in foreground mode. lxc-start: lxc_start.c: main: 345 Additional information can be obtained by setting the --logfile and --logpriority options. # cat /tmp/log lxc-start 1464425901.410 ERROR lxc_cgfs - cgfs.c:cgfs_init:2246 - cgroupfs failed to detect cgroup metadata lxc-start 1464425901.411 ERROR lxc_start - start.c:lxc_spawn:884 - failed initializing cgroup support lxc-start 1464425901.467 ERROR lxc_start - start.c:__lxc_start:1121 - failed to spawn 'testt' lxc-start 1464425901.467 ERROR lxc_start_ui - lxc_start.c:main:341 - The container failed to start. lxc-start 1464425901.467 ERROR lxc_start_ui - lxc_start.c:main:343 - To get more details, run the container in foreground mode. lxc-start 1464425901.467 ERROR lxc_start_ui - lxc_start.c:main:345 - Additional information can be obtained by setting the --logfile and --logpriority options. Unsure if this is a Xenial or Trusty issue (tested on original 4.4.0-22-generic and 4.5.3 kernels) Works successfully (tested): * On Xenial, Xenial container inside Xenial container * On Xenial, Trusty container inside Xenial container * On Trusty, Trusty container inside Trusty container Does NOT work: * On Xenial, Trusty container inside Trusty container Setup details: * Create container: apt-get update --yes apt-get dist-upgrade --yes apt-get install lxc --yes lxc-create -n NAME -t ubuntu -- -r trusty -a amd64 --or-- lxc-create -n NAME -t ubuntu -- -r xenial -a amd64 And add in config: lxc.include = /usr/share/lxc/config/nesting.conf Also, for Xenial: lxc.aa_allow_incomplete = 1 Then start and attach to create the nested container. Additional information: * On the Trusty container on a Xenial machine: # cat /proc/cgroups #subsys_name hierarchy num_cgroups enabled cpuset 9 12 1 cpu 2 164 1 cpuacct 2 164 1 blkio 7 164 1 memory 5 702 1 devices 10 319 1 freezer 11 28 1 net_cls 8 12 1 perf_event 3 12 1 net_prio 8 12 1 hugetlb 6 12 1 pids 4 305 1 # uname -a Linux testt 4.5.3 #1 SMP Mon May 9 08:18:24 CEST 2016 x86_64 x86_64 x86_64 GNU/Linux Also tested on a regular 4.4.0-22 kernel: # uname -a Linux xavier-test 4.4.0-22-generic #40-Ubuntu SMP Thu May 12 22:03:46 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux # cat /proc/self/mountinfo 164 119 202:1 /var/lib/lxc/testt/rootfs / rw,noatime master:1 - ext4 /dev/xvda1 rw,nobarrier,errors=remount-ro,data=ordered 165 164 0:44 / /dev rw,relatime - tmpfs none rw,size=492k,mode=755 166 164 0:43 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw 167 168 0:43 /sys/net /proc/sys/net rw,nosuid,nodev,noexec,relatime - proc proc rw 168 166 0:43 /sys /proc/sys ro,nosuid,nodev,noexec,relatime - proc proc rw 169 166 0:43 /sysrq-trigger /proc/sysrq-trigger ro,nosuid,nodev,noexec,relatime - proc proc rw 170 164 0:45 / /sys rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw 171 170 0:45 / /sys rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw 172 171 0:45 / /sys/devices/virtual/net rw,relatime - sysfs sysfs rw 173 172 0:45 /devices/virtual/net /sys/devices/virtual/net rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw 174 171 0:37 / /sys/fs/fuse/connections rw,relatime master:28 - fusectl fusectl rw 175 171 0:7 / /sys/kernel/debug rw,relatime master:25 - debugfs debugfs rw 176 171 0:12 / /sys/kernel/security rw,nosuid,nodev,noexec,relatime master:8 - securityfs securityfs rw 177 171 0:23 / /sys/fs/pstore rw,nosuid,nodev,noexec,relatime master:11 - pstore pstore rw 178 165 0:42 / /dev/mqueue rw,relatime - mqueue mqueue rw 179 165 0:43 / /dev/.lxc/proc rw,relatime - proc proc rw 180 165 0:45 / /dev/.lxc/sys rw,relatime - sysfs sys rw 181 166 0:40 /proc/cpuinfo /proc/cpuinfo rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 182 166 0:40 /proc/diskstats /proc/diskstats rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 183 166 0:40 /proc/meminfo /proc/meminfo rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 184 166 0:40 /proc/stat /proc/stat rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 185 166 0:40 /proc/swaps /proc/swaps rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 186 166 0:40 /proc/uptime /proc/uptime rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 187 165 0:14 /0 /dev/lxc/console rw,nosuid,noexec,relatime master:3 - devpts devpts rw,gid=5,mode=620,ptmxmode=000 120 165 0:46 / /dev/pts rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 121 165 0:46 /0 /dev/lxc/tty1 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 122 165 0:46 /1 /dev/lxc/tty2 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 123 165 0:46 /2 /dev/lxc/tty3 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 124 165 0:46 /3 /dev/lxc/tty4 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 125 175 0:9 / /sys/kernel/debug/tracing rw,relatime - tracefs tracefs rw 126 164 0:47 / /run rw,nosuid,noexec,relatime - tmpfs none rw,size=3088236k,mode=755 127 171 0:48 / /sys/fs/cgroup rw,relatime - tmpfs none rw,size=4k,mode=755 128 126 0:49 / /run/lock rw,nosuid,nodev,noexec,relatime - tmpfs none rw,size=5120k 129 126 0:50 / /run/shm rw,nosuid,nodev,relatime - tmpfs none rw 130 126 0:51 / /run/user rw,nosuid,nodev,noexec,relatime - tmpfs none rw,size=102400k,mode=755 Possible related bugs: * bug #1543697 (which is fixed) ** Affects: lxc (Ubuntu) Importance: Undecided Status: New ** Attachment added: "strace lxc-start traces" https://bugs.launchpad.net/bugs/1586608/+attachment/4671736/+files/strace.traces -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1586608 Title: Can not start nested trusty container inside trusty container Status in lxc package in Ubuntu: New Bug description: On Xenial, can not start a nested Trusty container inside a Trusty container. (All containers are privileged, tests done on two different machines, one is a fresh Xenial install) Steps to reproduce: * Create a nested Trusty container (ie. Trusty container in a trusty container) on a Xenial machine * Observe the result: # lxc-start -d --name testt --logfile=/tmp/log lxc-start: lxc_start.c: main: 341 The container failed to start. lxc-start: lxc_start.c: main: 343 To get more details, run the container in foreground mode. lxc-start: lxc_start.c: main: 345 Additional information can be obtained by setting the --logfile and --logpriority options. # cat /tmp/log lxc-start 1464425901.410 ERROR lxc_cgfs - cgfs.c:cgfs_init:2246 - cgroupfs failed to detect cgroup metadata lxc-start 1464425901.411 ERROR lxc_start - start.c:lxc_spawn:884 - failed initializing cgroup support lxc-start 1464425901.467 ERROR lxc_start - start.c:__lxc_start:1121 - failed to spawn 'testt' lxc-start 1464425901.467 ERROR lxc_start_ui - lxc_start.c:main:341 - The container failed to start. lxc-start 1464425901.467 ERROR lxc_start_ui - lxc_start.c:main:343 - To get more details, run the container in foreground mode. lxc-start 1464425901.467 ERROR lxc_start_ui - lxc_start.c:main:345 - Additional information can be obtained by setting the --logfile and --logpriority options. Unsure if this is a Xenial or Trusty issue (tested on original 4.4.0-22-generic and 4.5.3 kernels) Works successfully (tested): * On Xenial, Xenial container inside Xenial container * On Xenial, Trusty container inside Xenial container * On Trusty, Trusty container inside Trusty container Does NOT work: * On Xenial, Trusty container inside Trusty container Setup details: * Create container: apt-get update --yes apt-get dist-upgrade --yes apt-get install lxc --yes lxc-create -n NAME -t ubuntu -- -r trusty -a amd64 --or-- lxc-create -n NAME -t ubuntu -- -r xenial -a amd64 And add in config: lxc.include = /usr/share/lxc/config/nesting.conf Also, for Xenial: lxc.aa_allow_incomplete = 1 Then start and attach to create the nested container. Additional information: * On the Trusty container on a Xenial machine: # cat /proc/cgroups #subsys_name hierarchy num_cgroups enabled cpuset 9 12 1 cpu 2 164 1 cpuacct 2 164 1 blkio 7 164 1 memory 5 702 1 devices 10 319 1 freezer 11 28 1 net_cls 8 12 1 perf_event 3 12 1 net_prio 8 12 1 hugetlb 6 12 1 pids 4 305 1 # uname -a Linux testt 4.5.3 #1 SMP Mon May 9 08:18:24 CEST 2016 x86_64 x86_64 x86_64 GNU/Linux Also tested on a regular 4.4.0-22 kernel: # uname -a Linux xavier-test 4.4.0-22-generic #40-Ubuntu SMP Thu May 12 22:03:46 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux # cat /proc/self/mountinfo 164 119 202:1 /var/lib/lxc/testt/rootfs / rw,noatime master:1 - ext4 /dev/xvda1 rw,nobarrier,errors=remount-ro,data=ordered 165 164 0:44 / /dev rw,relatime - tmpfs none rw,size=492k,mode=755 166 164 0:43 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw 167 168 0:43 /sys/net /proc/sys/net rw,nosuid,nodev,noexec,relatime - proc proc rw 168 166 0:43 /sys /proc/sys ro,nosuid,nodev,noexec,relatime - proc proc rw 169 166 0:43 /sysrq-trigger /proc/sysrq-trigger ro,nosuid,nodev,noexec,relatime - proc proc rw 170 164 0:45 / /sys rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw 171 170 0:45 / /sys rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw 172 171 0:45 / /sys/devices/virtual/net rw,relatime - sysfs sysfs rw 173 172 0:45 /devices/virtual/net /sys/devices/virtual/net rw,nosuid,nodev,noexec,relatime - sysfs sysfs rw 174 171 0:37 / /sys/fs/fuse/connections rw,relatime master:28 - fusectl fusectl rw 175 171 0:7 / /sys/kernel/debug rw,relatime master:25 - debugfs debugfs rw 176 171 0:12 / /sys/kernel/security rw,nosuid,nodev,noexec,relatime master:8 - securityfs securityfs rw 177 171 0:23 / /sys/fs/pstore rw,nosuid,nodev,noexec,relatime master:11 - pstore pstore rw 178 165 0:42 / /dev/mqueue rw,relatime - mqueue mqueue rw 179 165 0:43 / /dev/.lxc/proc rw,relatime - proc proc rw 180 165 0:45 / /dev/.lxc/sys rw,relatime - sysfs sys rw 181 166 0:40 /proc/cpuinfo /proc/cpuinfo rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 182 166 0:40 /proc/diskstats /proc/diskstats rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 183 166 0:40 /proc/meminfo /proc/meminfo rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 184 166 0:40 /proc/stat /proc/stat rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 185 166 0:40 /proc/swaps /proc/swaps rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 186 166 0:40 /proc/uptime /proc/uptime rw,nosuid,nodev,relatime master:98 - fuse.lxcfs lxcfs rw,user_id=0,group_id=0,allow_other 187 165 0:14 /0 /dev/lxc/console rw,nosuid,noexec,relatime master:3 - devpts devpts rw,gid=5,mode=620,ptmxmode=000 120 165 0:46 / /dev/pts rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 121 165 0:46 /0 /dev/lxc/tty1 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 122 165 0:46 /1 /dev/lxc/tty2 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 123 165 0:46 /2 /dev/lxc/tty3 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 124 165 0:46 /3 /dev/lxc/tty4 rw,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 125 175 0:9 / /sys/kernel/debug/tracing rw,relatime - tracefs tracefs rw 126 164 0:47 / /run rw,nosuid,noexec,relatime - tmpfs none rw,size=3088236k,mode=755 127 171 0:48 / /sys/fs/cgroup rw,relatime - tmpfs none rw,size=4k,mode=755 128 126 0:49 / /run/lock rw,nosuid,nodev,noexec,relatime - tmpfs none rw,size=5120k 129 126 0:50 / /run/shm rw,nosuid,nodev,relatime - tmpfs none rw 130 126 0:51 / /run/user rw,nosuid,nodev,noexec,relatime - tmpfs none rw,size=102400k,mode=755 Possible related bugs: * bug #1543697 (which is fixed) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1586608/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp