However, there's one more detail to fix in unprivileged containers:
root@v:/# getpcaps $$
Capabilities for `608': = cap_chown,cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_linux_immutable,cap_net_bind_service,cap_net_broadcast,cap_net_admin,cap_net_raw,cap_ipc_lock,cap_ipc_owner,cap_sys_rawio,cap_sys_chroot,cap_sys_ptrace,cap_sys_pacct,cap_sys_admin,cap_sys_boot,cap_sys_nice,cap_sys_resource,cap_sys_tty_config,cap_mknod,cap_lease,cap_audit_write,cap_audit_control,cap_setfcap,cap_syslog,cap_wake_alarm,cap_block_suspend,37+ep
The cap_audit_* are a lie, the audit subsystem in current kernels isn't namespace aware and thus unprivileged containers can't have these caps. The failed systemd-journald-audit.socket unit there isn't a big deal, but this should be fixed in LXC.
Fixed upstream: cgit.freedeskto p.org/systemd/ systemd/ commit/ ?id=417a7fdc418 cgit.freedeskto p.org/systemd/ systemd/ commit/ ?id=01906c76c
http://
http://
However, there's one more detail to fix in unprivileged containers:
root@v:/# getpcaps $$ cap_dac_ override, cap_dac_ read_search, cap_fowner, cap_fsetid, cap_kill, cap_setgid, cap_setuid, cap_setpcap, cap_linux_ immutable, cap_net_ bind_service, cap_net_ broadcast, cap_net_ admin,cap_ net_raw, cap_ipc_ lock,cap_ ipc_owner, cap_sys_ rawio,cap_ sys_chroot, cap_sys_ ptrace, cap_sys_ pacct,cap_ sys_admin, cap_sys_ boot,cap_ sys_nice, cap_sys_ resource, cap_sys_ tty_config, cap_mknod, cap_lease, cap_audit_ write,cap_ audit_control, cap_setfcap, cap_syslog, cap_wake_ alarm,cap_ block_suspend, 37+ep
Capabilities for `608': = cap_chown,
The cap_audit_* are a lie, the audit subsystem in current kernels isn't namespace aware and thus unprivileged containers can't have these caps. The failed systemd- journald- audit.socket unit there isn't a big deal, but this should be fixed in LXC.