[Bug 1962332] Re: xenial systemd fails to start if cgroup2 is mounted
Dimitri John Ledkov
1962332 at bugs.launchpad.net
Fri Mar 4 13:23:40 UTC 2022
hm, $ lxc launch --vm ubuntu:xenial fails for me
** Description changed:
[impact]
now that jammy has moved to using unified cgroup2, containers started on
jammy must also use unified cgroup2 (since the cgroup subsystems can
only be mounted as v1 or v2 throughout the entire system, including
inside containers).
However, the systemd in xenial does not include support for cgroup2, and
doesn't recognize its magic (added in upstream commit 099619957a0), so
it fails to start completely.
-
- [workaround]
-
- Instead of:
- $ lxc launch ubuntu:xenial
-
- use:
- $ lxc launch --vm ubuntu:xenial
-
- Until this is fixed.
[test case]
create a jammy system, that has unified cgroup2 mounted. Then:
$ lxc launch ubuntu:xenial test-x
...
$ lxc shell test-x
(inside xenial container):
$ mv /sbin/init /sbin/init.old
$ cat > /sbin/init <<EOF
#!/bin/bash
sleep 2
exec /lib/systemd/systemd --log-level=debug --log-target=console
EOF
$ chmod 755 /sbin/init
$ exit
(back in jammy host system):
$ lxc stop test-x -f
$ lxc start --console test-x
To detach from the console, press: <ctrl>+a q
Failed to mount cgroup at /sys/fs/cgroup/systemd: Operation not permitted
[!!!!!!] Failed to mount API filesystems, freezing.
Freezing execution.
[regression potential]
any regression would likely break xenial containers from starting at
all, or cause cgroup-related problems with systemd starting and/or
managing services.
[scope]
this is needed only for xenial. However, as xenial is out of standard
support, this would need to be an exception.
this is fixed upstream with commit 099619957a0 (and possibly others -
needs closer investigation and testing) which is first included in v230,
so this is fixed already in b and later.
this is not needed - by default - for trusty because upstart is used
there; however, I think it's possible to change trusty over to use
systemd instead of upstart. But since trusty is out of standard support,
and it doesn't fail by default, it doesn't seem like it should be fixed.
[other info]
An alternative appears to be to change the host system back to using the
'hybrid' cgroup, however that obviously is awful and would remove the
benefits of cgroup v2 from the host system, and force all containers on
the host system to also use the 'hybrid' cgroup.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1962332
Title:
xenial systemd fails to start if cgroup2 is mounted
Status in systemd package in Ubuntu:
Fix Released
Status in systemd source package in Xenial:
Confirmed
Bug description:
[impact]
now that jammy has moved to using unified cgroup2, containers started
on jammy must also use unified cgroup2 (since the cgroup subsystems
can only be mounted as v1 or v2 throughout the entire system,
including inside containers).
However, the systemd in xenial does not include support for cgroup2,
and doesn't recognize its magic (added in upstream commit
099619957a0), so it fails to start completely.
[test case]
create a jammy system, that has unified cgroup2 mounted. Then:
$ lxc launch ubuntu:xenial test-x
...
$ lxc shell test-x
(inside xenial container):
$ mv /sbin/init /sbin/init.old
$ cat > /sbin/init <<EOF
#!/bin/bash
sleep 2
exec /lib/systemd/systemd --log-level=debug --log-target=console
EOF
$ chmod 755 /sbin/init
$ exit
(back in jammy host system):
$ lxc stop test-x -f
$ lxc start --console test-x
To detach from the console, press: <ctrl>+a q
Failed to mount cgroup at /sys/fs/cgroup/systemd: Operation not permitted
[!!!!!!] Failed to mount API filesystems, freezing.
Freezing execution.
[regression potential]
any regression would likely break xenial containers from starting at
all, or cause cgroup-related problems with systemd starting and/or
managing services.
[scope]
this is needed only for xenial. However, as xenial is out of standard
support, this would need to be an exception.
this is fixed upstream with commit 099619957a0 (and possibly others -
needs closer investigation and testing) which is first included in
v230, so this is fixed already in b and later.
this is not needed - by default - for trusty because upstart is used
there; however, I think it's possible to change trusty over to use
systemd instead of upstart. But since trusty is out of standard
support, and it doesn't fail by default, it doesn't seem like it
should be fixed.
[other info]
An alternative appears to be to change the host system back to using
the 'hybrid' cgroup, however that obviously is awful and would remove
the benefits of cgroup v2 from the host system, and force all
containers on the host system to also use the 'hybrid' cgroup.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1962332/+subscriptions
More information about the foundations-bugs
mailing list