cockpit.service fails in LXC: Failed to set up mount namespacing #17364
-
Explain what happens
May 19 16:41:19 resume systemd[1]: Starting Cockpit Web Service Socket.
May 19 16:41:19 resume systemd[1]: Starting Cockpit Web Service Socket. Debian 10 LXC container in Proxmox running Wordpress. I replaced Webmin with Cockpit Version of Cockpit239-1~bpo10+1 Where is the problem in Cockpit?No response Server operating systemDebian Server operating system versionBuster Linux resume 5.13.19-6-pve #1 SMP PVE 5.13.19-15 (Tue, 29 Mar 2022 15:59:50 +0200) x86_64 GNU/Linux What browsers are you using?Firefox, Other System logMay 19 16:26:50 resume systemd[752]: cockpit.service: Failed to set up mount namespacing: /run/systemd/unit-root/proc: Permission denied
May 19 16:26:50 resume systemd[752]: cockpit.service: Failed at step NAMESPACE spawning /usr/lib/cockpit/cockpit-tls: Permission denied
May 19 16:26:51 resume systemd[1]: cockpit.service: Main process exited, code=exited, status=226/NAMESPACE
May 19 16:26:51 resume systemd[1]: cockpit.service: Failed with result 'exit-code'.
May 19 16:26:51 resume systemd[1]: Starting Cockpit Web Service...
May 19 16:26:51 resume systemd[1]: Started Cockpit Web Service.
May 19 16:26:51 resume systemd[756]: cockpit.service: Failed to set up mount namespacing: /run/systemd/unit-root/proc: Permission denied
May 19 16:26:51 resume systemd[756]: cockpit.service: Failed at step NAMESPACE spawning /usr/lib/cockpit/cockpit-tls: Permission denied
May 19 16:26:51 resume systemd[1]: cockpit.service: Main process exited, code=exited, status=226/NAMESPACE
May 19 16:26:51 resume systemd[1]: cockpit.service: Failed with result 'exit-code'.
May 19 16:26:51 resume systemd[1]: Starting Cockpit Web Service... |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
This smells like your LXC container does not have enough privileges to set up systemd's isolation options? cockpit.service has these:
These make cockpit.service safer (due to having much reduced capabilities) on ordinary systems, but being able to set that up requires additional privileges on the host. If you can't/don't want to grant these privileges to the LXC container, you can try and drop these options, then it should work. |
Beta Was this translation helpful? Give feedback.
-
For me it was the nesting-option in the lxc which has to be enabled. |
Beta Was this translation helpful? Give feedback.
This smells like your LXC container does not have enough privileges to set up systemd's isolation options? cockpit.service has these:
These make cockpit.service safer (due to having much reduced capabilities) on ordinary systems, but being able to set that up requires additional privileges on the host. If you can't/don't want to grant these privileges to the LXC container, you can try and dro…