Upgrade LXC 16.04 to 18.04 Problems CGROUP

redjohn

Well-Known Member
Apr 22, 2016
132
4
58
27
Hello,

I have problems after I upgraded my LXC Container from Ubuntu 16.04 to Ubuntu 18.04 with do-relase-upgrade:

Failed to attach 321 to compat systemd cgroup /system.slice/nginx.service: No such file or directory

Any idea what I can do now? I have the problems with some service like ssh etc.

Gruß Oliver
 
Could you post the output of:
Code:
lxc-start -nCTID -lDEBUG -o/dev/stdout

where CTID is the ID of your Container.

Also please the contents of the Container config file under /etc/pve/lxc/CTID.conf
 
Hi,

Thanks for the fast reply:

here is the output

Code:
lxc-start 301 20190130124502.257 INFO     lxccontainer - lxccontainer.c:do_lxcapi_start:984 - Set process title to [lxc monitor] /var/lib/lxc 301
lxc-start 301 20190130124502.257 INFO     lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "reject_force_umount  # comment this to allow umount -f;  not recommended"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for reject_force_umount action 0(kill)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "[all]"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "kexec_load errno 1"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for kexec_load action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "open_by_handle_at errno 1"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "init_module errno 1"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for init_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for init_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "finit_module errno 1"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for finit_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:759 - Processing "delete_module errno 1"
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for delete_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
lxc-start 301 20190130124502.257 INFO     seccomp - seccomp.c:parse_config_v2:970 - Merging compat seccomp contexts into main context
lxc-start 301 20190130124502.257 INFO     conf - conf.c:run_script_argv:356 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "301", config section "lxc"
lxc-start 301 20190130124502.638 DEBUG    terminal - terminal.c:lxc_terminal_peer_default:707 - No such device - The process does not have a controlling terminal
lxc-start 301 20190130124502.737 INFO     start - start.c:lxc_init:906 - Container "301" is initialized
lxc-start 301 20190130124502.747 INFO     conf - conf.c:run_script:495 - Executing script "/usr/share/lxc/lxcnetaddbr" for container "301", config section "net"
lxc-start 301 20190130124503.805 DEBUG    network - network.c:instantiate_veth:206 - Instantiated veth "veth301i0/veth81P9IR", index is "381"
lxc-start 301 20190130124503.808 DEBUG    cgfsng - cgroups/cgfsng.c:cg_legacy_handle_cpuset_hierarchy:619 - "cgroup.clone_children" was already set to "1"
lxc-start 301 20190130124503.809 INFO     cgfsng - cgroups/cgfsng.c:cgfsng_payload_create:1537 - The container uses "lxc/301" as cgroup
lxc-start 301 20190130124503.157 INFO     start - start.c:lxc_spawn:1707 - Cloned CLONE_NEWNS
lxc-start 301 20190130124503.157 INFO     start - start.c:lxc_spawn:1707 - Cloned CLONE_NEWPID
lxc-start 301 20190130124503.157 INFO     start - start.c:lxc_spawn:1707 - Cloned CLONE_NEWUTS
lxc-start 301 20190130124503.157 INFO     start - start.c:lxc_spawn:1707 - Cloned CLONE_NEWIPC
lxc-start 301 20190130124503.157 INFO     start - start.c:lxc_spawn:1707 - Cloned CLONE_NEWNET
lxc-start 301 20190130124503.157 DEBUG    start - start.c:lxc_try_preserve_namespaces:196 - Preserved mnt namespace via fd 15
lxc-start 301 20190130124503.157 DEBUG    start - start.c:lxc_try_preserve_namespaces:196 - Preserved pid namespace via fd 16
lxc-start 301 20190130124503.157 DEBUG    start - start.c:lxc_try_preserve_namespaces:196 - Preserved uts namespace via fd 17
lxc-start 301 20190130124503.157 DEBUG    start - start.c:lxc_try_preserve_namespaces:196 - Preserved ipc namespace via fd 18
lxc-start 301 20190130124503.157 DEBUG    start - start.c:lxc_try_preserve_namespaces:196 - Preserved net namespace via fd 19
lxc-start 301 20190130124503.157 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "memory.limit_in_bytes" set to "2147483648"
lxc-start 301 20190130124503.157 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "memory.memsw.limit_in_bytes" set to "2684354560"
lxc-start 301 20190130124503.157 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "cpu.shares" set to "1024"
lxc-start 301 20190130124503.157 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "cpuset.cpus" set to "0,3-5"
lxc-start 301 20190130124503.157 INFO     cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2481 - Limits for the legacy cgroup hierarchies have been setup
lxc-start 301 20190130124503.157 DEBUG    start - start.c:lxc_spawn:1761 - Preserved net namespace via fd 10
lxc-start 301 20190130124503.181 DEBUG    network - network.c:lxc_network_move_created_netdev_priv:2505 - Moved network device "veth81P9IR"/"eth0" to network namespace of 6680
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.deny" set to "a"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c *:* m"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "b *:* m"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 1:3 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 1:5 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 1:7 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 5:0 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 5:1 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 5:2 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 1:8 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 1:9 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 136:* rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 10:229 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 254:0 rm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 10:200 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 10:228 rwm"
lxc-start 301 20190130124503.181 DEBUG    cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2476 - Set controller "devices.allow" set to "c 10:232 rwm"
lxc-start 301 20190130124503.181 INFO     cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2481 - Limits for the legacy cgroup hierarchies have been setup
lxc-start 301 20190130124503.182 INFO     start - start.c:do_start:1258 - Unshared CLONE_NEWCGROUP
lxc-start 301 20190130124503.182 DEBUG    storage - storage/storage.c:storage_query:253 - Detected rootfs type "dir"
lxc-start 301 20190130124503.182 DEBUG    conf - conf.c:lxc_mount_rootfs:1358 - Mounted rootfs "/var/lib/lxc/301/rootfs" onto "/usr/lib/x86_64-linux-gnu/lxc/rootfs" with options "(null)"
lxc-start 301 20190130124503.182 INFO     conf - conf.c:setup_utsname:817 - Set hostname to "server01"
lxc-start 301 20190130124503.213 DEBUG    network - network.c:setup_hw_addr:2772 - Mac address "0E:0B:8C:B6:A9:6A" on "eth0" has been setup
lxc-start 301 20190130124503.213 DEBUG    network - network.c:lxc_setup_netdev_in_child_namespaces:3037 - Network device "eth0" has been setup
lxc-start 301 20190130124503.213 INFO     network - network.c:lxc_setup_network_in_child_namespaces:3058 - network has been setup
lxc-start 301 20190130124503.213 INFO     conf - conf.c:mount_autodev:1144 - Preparing "/dev"
lxc-start 301 20190130124503.213 INFO     conf - conf.c:mount_autodev:1191 - Prepared "/dev"
lxc-start 301 20190130124503.214 INFO     conf - conf.c:run_script_argv:356 - Executing script "/usr/share/lxcfs/lxc.mount.hook" for container "301", config section "lxc"
lxc-start 301 20190130124503.227 INFO     conf - conf.c:run_script_argv:356 - Executing script "/usr/share/lxc/hooks/lxc-pve-autodev-hook" for container "301", config section "lxc"
lxc-start 301 20190130124503.286 INFO     conf - conf.c:lxc_fill_autodev:1235 - Populating "/dev"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_fill_autodev:1250 - Created device node "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/full"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_fill_autodev:1250 - Created device node "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/null"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_fill_autodev:1250 - Created device node "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/random"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_fill_autodev:1250 - Created device node "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/tty"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_fill_autodev:1250 - Created device node "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/urandom"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_fill_autodev:1250 - Created device node "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/zero"
lxc-start 301 20190130124503.286 INFO     conf - conf.c:lxc_fill_autodev:1312 - Populated "/dev"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2053 - Remounting "/sys/fs/fuse/connections" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/fs/fuse/connections" to respect bind or remount options
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2074 - Flags for "/sys/fs/fuse/connections" were 4096, required extra flags are 0
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2084 - Mountflags already were 4096, skipping remount
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2128 - Mounted "/sys/fs/fuse/connections" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/fs/fuse/connections" with filesystem type "none"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2053 - Remounting "/sys/kernel/debug" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/kernel/debug" to respect bind or remount options
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2074 - Flags for "/sys/kernel/debug" were 4096, required extra flags are 0
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2084 - Mountflags already were 4096, skipping remount
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2128 - Mounted "/sys/kernel/debug" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/kernel/debug" with filesystem type "none"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2053 - Remounting "/sys/kernel/security" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/kernel/security" to respect bind or remount options
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2074 - Flags for "/sys/kernel/security" were 4110, required extra flags are 14
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2128 - Mounted "/sys/kernel/security" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/kernel/security" with filesystem type "none"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2053 - Remounting "/sys/fs/pstore" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/fs/pstore" to respect bind or remount options
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2074 - Flags for "/sys/fs/pstore" were 4111, required extra flags are 15
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2128 - Mounted "/sys/fs/pstore" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/sys/fs/pstore" with filesystem type "none"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:mount_entry:2128 - Mounted "mqueue" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/mqueue" with filesystem type "mqueue"
lxc-start 301 20190130124503.286 INFO     conf - conf.c:mount_file_entries:2359 - Finished setting up mounts
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_setup_ttydir_console:1822 - Created directory for console and tty devices at "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/lxc"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_setup_ttydir_console:1867 - Mounted "/dev/pts/1" onto "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/lxc/console"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_setup_ttydir_console:1875 - Mounted "/dev/pts/1" onto "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/lxc/console"
lxc-start 301 20190130124503.286 DEBUG    conf - conf.c:lxc_setup_ttydir_console:1877 - Console has been setup under "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/lxc/console" and mounted to "/usr/lib/x86_64-linux-gnu/lxc/rootfs/dev/console"
lxc-start 301 20190130124503.286 INFO     utils - utils.c:lxc_mount_proc_if_needed:1239 - I am 1, /proc/self points to "1"
lxc-start 301 20190130124503.305 WARN     conf - conf.c:lxc_setup_devpts:1642 - Invalid argument - Failed to unmount old devpts instance
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_setup_devpts:1679 - Mount new devpts instance with options "gid=5,newinstance,ptmxmode=0666,mode=0620,max=1024"
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_setup_devpts:1698 - Created dummy "/dev/ptmx" file as bind mount target
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_setup_devpts:1703 - Bind mounted "/dev/pts/ptmx" to "/dev/ptmx"
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_allocate_ttys:1015 - Created tty "/dev/pts/0" with master fd 11 and slave fd 14
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_allocate_ttys:1015 - Created tty "/dev/pts/1" with master fd 15 and slave fd 16
lxc-start 301 20190130124503.305 INFO     conf - conf.c:lxc_allocate_ttys:1031 - Finished creating 2 tty devices
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_setup_ttys:939 - Bind mounted "/dev/pts/0" onto "/dev/lxc/tty1"
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:lxc_setup_ttys:939 - Bind mounted "/dev/pts/1" onto "/dev/lxc/tty2"
lxc-start 301 20190130124503.305 INFO     conf - conf.c:lxc_setup_ttys:975 - Finished setting up 2 /dev/tty<N> device(s)
lxc-start 301 20190130124503.305 INFO     conf - conf.c:setup_personality:1742 - Set personality to "0x0"
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:setup_caps:2551 - Dropped mac_admin (33) capability
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:setup_caps:2551 - Dropped mac_override (32) capability
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:setup_caps:2551 - Dropped sys_time (25) capability
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:setup_caps:2551 - Dropped sys_module (16) capability
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:setup_caps:2551 - Dropped sys_rawio (17) capability
lxc-start 301 20190130124503.305 DEBUG    conf - conf.c:setup_caps:2554 - Capabilities have been setup
lxc-start 301 20190130124503.305 NOTICE   conf - conf.c:lxc_setup:3746 - The container "301" is set up
lxc-start 301 20190130124503.305 INFO     lsm - lsm/lsm.c:lsm_process_label_set_at:178 - Set AppArmor label to "lxc-301_</var/lib/lxc>//&:lxc-301_<-var-lib-lxc>:"
lxc-start 301 20190130124503.305 INFO     apparmor - lsm/apparmor.c:apparmor_process_label_set:1106 - Changed AppArmor profile to lxc-301_</var/lib/lxc>//&:lxc-301_<-var-lib-lxc>:
lxc-start 301 20190130124503.305 DEBUG    start - start.c:lxc_spawn:1853 - Preserved cgroup namespace via fd 20
lxc-start 301 20190130124503.305 NOTICE   utils - utils.c:lxc_setgroups:1408 - Dropped additional groups
lxc-start 301 20190130124503.305 NOTICE   start - start.c:start:2075 - Exec'ing "/sbin/init"
lxc-start 301 20190130124503.309 NOTICE   start - start.c:post_start:2086 - Started "/sbin/init" with pid "6680"
lxc-start 301 20190130124503.309 DEBUG    lxccontainer - lxccontainer.c:wait_on_daemonized_start:853 - First child 6564 exited
lxc-start 301 20190130124503.309 NOTICE   start - start.c:signal_handler:430 - Received 17 from pid 6580 instead of container init 6680


Also the lxc.conf file for this container:

Code:
arch: amd64
cores: 4
hostname: server01
memory: 2048
net0: name=eth0,bridge=vmbr4,gw=192.168.20.254,hwaddr=0E:0B:8C:B6:A9:6A,ip=192.168.20.101/24,type=veth
onboot: 1
ostype: ubuntu
protection: 1
rootfs: local:301/vm-301-disk-1.raw,size=10G
startup: order=1,up=20
swap: 512
 
On the server I checked the mysql service e.g. and have the following error:

/etc/init.d/mysql status:

Code:
server01 systemd[356]: Failed to attach 356 to compat systemd cgroup /system.slice/mysql.service: No such file or directory
server01 systemd[457]: Failed to attach 457 to compat systemd cgroup /system.slice/mysql.service: No such file or directory

The same with the Nginx service:

/etc/init.d/nginx status:

Code:
server01 systemd[1]: nginx.service: Failed to reset devices.list: Operation not permitted
server01 systemd[3058]: Failed to attach 3058 to compat systemd cgroup /system.slice/nginx.service: No such file or directory
 
Are these the only error messages? Is there any actual visible problem with the services?

I've tried to reproduce the issue, and I'm getting similar entries in systemctl, but my services are not affected.

Can you for example post the full output of:
Code:
systemctl nginx status

or the same from some of the "affected" services? As long as these services are running properly, I don't think you should be worrying about it.

On another note, please do not send private messages to staff members if you are looking for personal support. If you need something like that, I suggest you to buy a support subscription.

See here for purchasing:
https://shop.maurer-it.com/cart.php
 
Are these the only error messages? Is there any actual visible problem with the services?

I've tried to reproduce the issue, and I'm getting similar entries in systemctl, but my services are not affected.

Can you for example post the full output of:
Code:
systemctl nginx status

or the same from some of the "affected" services? As long as these services are running properly, I don't think you should be worrying about it.

On another note, please do not send private messages to staff members if you are looking for personal support. If you need something like that, I suggest you to buy a support subscription.

See here for purchasing:
https://shop.maurer-it.com/cart.php


Hello,

This is the output:

Code:
Failed to dump process list, ignoring: Input/output error
● nginx.service - nginx - high performance web server
   Loaded: loaded (/lib/systemd/system/nginx.service; enabled; vendor preset: enabled)
   Active: active (running) since Thu 2019-01-31 12:15:14 CET; 25min ago
     Docs: http://nginx.org/en/docs/
 Main PID: 14454 (nginx)
    Tasks: 5 (limit: 4915)
   CGroup: /system.slice/nginx.service

Jan 31 12:15:14 nora systemd[1]: Starting nginx - high performance web server...
Jan 31 12:15:14 nora systemd[14453]: Failed to attach 14453 to compat systemd cgroup /system.slice/nginx.service: No such file or directory
Jan 31 12:15:14 nora systemd[1]: Started nginx - high performance web server.
Jan 31 12:25:54 nora systemd[1]: nginx.service: Failed to reset devices.list: Operation not permitted
Jan 31 12:25:54 nora systemd[1]: nginx.service: Failed to reset devices.list: Operation not permitted
Jan 31 12:25:54 nora systemd[1]: nginx.service: Failed to reset devices.list: Operation not permitted

Is this a problem?

Regards,

Oliver
 
Hello,

Yes services are running. Is this error mesaage a problem? Or lxc Bug?
 
Is this error mesaage a problem? Or lxc Bug?

Shouldn't be a problem, and most likely not an LXC bug.

It probably has to do with systemd on Ubuntu, but I'm not sure.
 
Help for others encountering this -- have the same issue, but the services do NOT start.

Nov 21 10:07:14 enig systemd[374]: Failed to attach 374 to compat systemd cgroup /system.slice/apache2.service: No such file or directory
Nov 21 10:07:14 enig systemd[374]: apache2.service: Failed to set up mount namespacing: Permission denied
Nov 21 10:07:14 enig systemd[374]: apache2.service: Failed at step NAMESPACE spawning /usr/sbin/apachectl: Permission denied

needed to turn on nesting feature for the container under options > features.

in the /etc/pve/lxc/###.conf file it is:

features: nesting=1
 
Last edited:

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!