** Description changed:

  I recently upgraded during yakkety development cycle, rebooted and found
  i could not launch containers.  The failure can be seen below.
  
- The issue seemed to be that dnsmasq is installed and was binding to all port 
53 leaving lxd-bridge unable to bind.  However, the systemd service does not 
recognize it failed.  it seems an error in the '|| cleanup' in 
/usr/lib/lxd/lxd-bridge 
+ The issue seemed to be that dnsmasq is installed and was binding to all port 
53 leaving lxd-bridge unable to bind.  However, the systemd service does not 
recognize it failed.  it seems an error in the '|| cleanup' in 
/usr/lib/lxd/lxd-bridge
  I think chaning that to simply '|| exit' would correctly show failure.
  
  $ systemctl status lxd-bridge --no-pager -l
  ● lxd-bridge.service - LXD - network bridge
-    Loaded: loaded (/lib/systemd/system/lxd-bridge.service; static; vendor 
preset: enabled)
-    Active: active (exited) since Mon 2016-08-15 09:37:38 EDT; 1 day 3h ago
-      Docs: man:lxd(1)
-  Main PID: 4426 (code=exited, status=0/SUCCESS)
-     Tasks: 0 (limit: 4915)
-    Memory: 0B
-       CPU: 0
-    CGroup: /system.slice/lxd-bridge.service
+    Loaded: loaded (/lib/systemd/system/lxd-bridge.service; static; vendor 
preset: enabled)
+    Active: active (exited) since Mon 2016-08-15 09:37:38 EDT; 1 day 3h ago
+      Docs: man:lxd(1)
+  Main PID: 4426 (code=exited, status=0/SUCCESS)
+     Tasks: 0 (limit: 4915)
+    Memory: 0B
+       CPU: 0
+    CGroup: /system.slice/lxd-bridge.service
  
  Aug 15 09:37:38 milhouse systemd[1]: Starting LXD - network bridge...
  Aug 15 09:37:38 milhouse lxd-bridge.start[4426]: dnsmasq: failed to create 
listening socket for 10.8.1.1: Address already in use
  Aug 15 09:37:38 milhouse lxd-bridge.start[4426]: Failed to setup lxd-bridge.
  Aug 15 09:37:38 milhouse systemd[1]: Started LXD - network bridge.
- 
  
  ==== Failure example ===
  $ lxc launch ubuntu-daily:yakkety y1
  Creating y1
  Starting y1
  error: Error calling 'lxd forkstart y1 /var/lib/lxd/containers 
/var/log/lxd/y1/lxc.conf': err='exit status 1'
  Try `lxc info --show-log y1` for more info
  
  $ lxc info --show-log y1
  Name: y1
  Architecture: x86_64
  Created: 2016/08/15 20:00 UTC
  Status: Stopped
  Type: persistent
  Profiles: default
  
  Log:
  
-             lxc 20160815160056.225 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
-             lxc 20160815160056.225 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
-             lxc 20160815160056.228 INFO     lxc_container - 
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc 
monitor] /var/lib/lxd/containers y1
-             lxc 20160815160056.228 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
-             lxc 20160815160056.228 INFO     lxc_lsm - lsm/lsm.c:lsm_init:48 - 
LSM security driver AppArmor
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount  # comment 
this to allow umount -f;  not recommended.
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount 
action 0
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
+             lxc 20160815160056.225 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
+             lxc 20160815160056.225 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
+             lxc 20160815160056.228 INFO     lxc_container - 
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc 
monitor] /var/lib/lxd/containers y1
+             lxc 20160815160056.228 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
+             lxc 20160815160056.228 INFO     lxc_lsm - lsm/lsm.c:lsm_init:48 - 
LSM security driver AppArmor
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount  # comment 
this to allow umount -f;  not recommended.
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount 
action 0
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
  
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount 
action 0
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount 
action 0
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
  
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .[all].
-             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action 
327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action 
327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action 
327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action 
327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action 
327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action 
327681
-             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main 
one
-             lxc 20160815160056.229 INFO     lxc_conf - 
conf.c:run_script_argv:367 - Executing script '/usr/bin/lxd callhook 
/var/lib/lxd 546 start' for container 'y1', config section 'lxc'
-             lxc 20160815160056.229 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
-             lxc 20160815160056.229 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
-             lxc 20160815160056.232 INFO     lxc_monitor - 
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name 
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
-             lxc 20160815160056.315 DEBUG    lxc_start - 
start.c:setup_signal_fd:289 - sigchild handler set
-             lxc 20160815160056.316 DEBUG    lxc_console - 
console.c:lxc_console_peer_default:469 - no console peer
-             lxc 20160815160056.316 INFO     lxc_start - start.c:lxc_init:488 
- 'y1' is initialized
-             lxc 20160815160056.317 DEBUG    lxc_start - 
start.c:__lxc_start:1326 - Not dropping cap_sys_boot or watching utmp
-             lxc 20160815160056.317 INFO     lxc_start - 
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
-             lxc 20160815160056.317 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160056.317 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
-             lxc 20160815160056.322 ERROR    lxc_conf - 
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge 
'lxdbr0': Operation not permitted
-             lxc 20160815160056.356 ERROR    lxc_conf - 
conf.c:lxc_create_network:2872 - failed to create netdev
-             lxc 20160815160056.356 ERROR    lxc_start - 
start.c:lxc_spawn:1080 - failed to create the network
-             lxc 20160815160056.356 ERROR    lxc_start - 
start.c:__lxc_start:1353 - failed to spawn 'y1'
-             lxc 20160815160056.357 INFO     lxc_conf - 
conf.c:run_script_argv:367 - Executing script 
'/usr/share/lxcfs/lxc.reboot.hook' for container 'y1', config section 'lxc'
-             lxc 20160815160056.860 INFO     lxc_conf - 
conf.c:run_script_argv:367 - Executing script '/usr/bin/lxd callhook 
/var/lib/lxd 546 stop' for container 'y1', config section 'lxc'
-             lxc 20160815160056.934 WARN     lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
-             lxc 20160815160056.934 WARN     lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
-             lxc 20160815160056.937 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160056.937 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.089 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.089 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.093 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.093 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .[all].
+             lxc 20160815160056.228 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action 
327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action 
327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action 
327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action 
327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action 
327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action 
327681
+             lxc 20160815160056.229 INFO     lxc_seccomp - 
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main 
one
+             lxc 20160815160056.229 INFO     lxc_conf - 
conf.c:run_script_argv:367 - Executing script '/usr/bin/lxd callhook 
/var/lib/lxd 546 start' for container 'y1', config section 'lxc'
+             lxc 20160815160056.229 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
+             lxc 20160815160056.229 INFO     lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
+             lxc 20160815160056.232 INFO     lxc_monitor - 
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name 
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
+             lxc 20160815160056.315 DEBUG    lxc_start - 
start.c:setup_signal_fd:289 - sigchild handler set
+             lxc 20160815160056.316 DEBUG    lxc_console - 
console.c:lxc_console_peer_default:469 - no console peer
+             lxc 20160815160056.316 INFO     lxc_start - start.c:lxc_init:488 
- 'y1' is initialized
+             lxc 20160815160056.317 DEBUG    lxc_start - 
start.c:__lxc_start:1326 - Not dropping cap_sys_boot or watching utmp
+             lxc 20160815160056.317 INFO     lxc_start - 
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
+             lxc 20160815160056.317 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.317 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.322 ERROR    lxc_conf - 
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge 
'lxdbr0': Operation not permitted
+             lxc 20160815160056.356 ERROR    lxc_conf - 
conf.c:lxc_create_network:2872 - failed to create netdev
+             lxc 20160815160056.356 ERROR    lxc_start - 
start.c:lxc_spawn:1080 - failed to create the network
+             lxc 20160815160056.356 ERROR    lxc_start - 
start.c:__lxc_start:1353 - failed to spawn 'y1'
+             lxc 20160815160056.357 INFO     lxc_conf - 
conf.c:run_script_argv:367 - Executing script 
'/usr/share/lxcfs/lxc.reboot.hook' for container 'y1', config section 'lxc'
+             lxc 20160815160056.860 INFO     lxc_conf - 
conf.c:run_script_argv:367 - Executing script '/usr/bin/lxd callhook 
/var/lib/lxd 546 stop' for container 'y1', config section 'lxc'
+             lxc 20160815160056.934 WARN     lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
+             lxc 20160815160056.934 WARN     lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
+             lxc 20160815160056.937 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.937 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.089 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.089 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.093 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.093 INFO     lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
  
  ProblemType: Bug
  DistroRelease: Ubuntu 16.10
  Package: lxd 2.0.3-0ubuntu2
  ProcVersionSignature: Ubuntu 4.4.0-34.53-generic 4.4.15
  Uname: Linux 4.4.0-34-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  ApportVersion: 2.20.3-0ubuntu7
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Tue Aug 16 12:44:17 2016
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2015-07-23 (390 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20150722.1)
  SourcePackage: lxd
  UpgradeStatus: No upgrade log present (probably fresh install)
+ 
+ Related bugs:
+  * bug 1613820:  lxd-bridge.service races against dnsmasq package's 
dnsmasq.service

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1613815

Title:
  lxd-bridge.service exits success on failure to run dnsmasq

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1613815/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to