Public bug reported:
I recently upgraded during yakkety development cycle, rebooted and found
i could not launch containers. The failure can be seen below.
I think the failure path i hit is just that dnsmasq ran after lxd bridge
was set up but before the dnsmasq on it ran, and it successfully bound
to port 53 on the lxd bridge address.
Other services that run a dnsmasq set up files like this:
$ cat /etc/dnsmasq.d/lxc
# Tell any system-wide dnsmasq instance to make sure to bind to interfaces
# instead of listening on 0.0.0.0
# WARNING: changes to this file will get lost if lxc is removed.
bind-interfaces
except-interface=lxcbr0
So it seems one at least popular solution to this is to add a 'lxd' file
in that directory and 'except-interface=lxdbr0'.
$ lxc launch ubuntu-daily:yakkety y1
Creating y1
Starting y1
error: Error calling 'lxd forkstart y1 /var/lib/lxd/containers
/var/log/lxd/y1/lxc.conf': err='exit status 1'
Try `lxc info --show-log y1` for more info
$ lxc info --show-log y1
Name: y1
Architecture: x86_64
Created: 2016/08/15 20:00 UTC
Status: Stopped
Type: persistent
Profiles: default
Log:
lxc 20160815160056.225 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 3
lxc 20160815160056.225 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
lxc 20160815160056.228 INFO lxc_container -
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc
monitor] /var/lib/lxd/containers y1
lxc 20160815160056.228 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM
security driver AppArmor
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this
to allow umount -f; not recommended.
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount
action 0
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount
action 0
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .[all].
lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action
327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action
327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action
327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action
327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action
327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action
327681
lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main
one
lxc 20160815160056.229 INFO lxc_conf - conf.c:run_script_argv:367 -
Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 start' for container
'y1', config section 'lxc'
lxc 20160815160056.229 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 3
lxc 20160815160056.229 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
lxc 20160815160056.232 INFO lxc_monitor -
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
lxc 20160815160056.315 DEBUG lxc_start -
start.c:setup_signal_fd:289 - sigchild handler set
lxc 20160815160056.316 DEBUG lxc_console -
console.c:lxc_console_peer_default:469 - no console peer
lxc 20160815160056.316 INFO lxc_start - start.c:lxc_init:488 - 'y1'
is initialized
lxc 20160815160056.317 DEBUG lxc_start - start.c:__lxc_start:1326 -
Not dropping cap_sys_boot or watching utmp
lxc 20160815160056.317 INFO lxc_start -
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
lxc 20160815160056.317 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
lxc 20160815160056.317 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
lxc 20160815160056.322 ERROR lxc_conf -
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge
'lxdbr0': Operation not permitted
lxc 20160815160056.356 ERROR lxc_conf -
conf.c:lxc_create_network:2872 - failed to create netdev
lxc 20160815160056.356 ERROR lxc_start - start.c:lxc_spawn:1080 -
failed to create the network
lxc 20160815160056.356 ERROR lxc_start - start.c:__lxc_start:1353 -
failed to spawn 'y1'
lxc 20160815160056.357 INFO lxc_conf - conf.c:run_script_argv:367 -
Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'y1', config
section 'lxc'
lxc 20160815160056.860 INFO lxc_conf - conf.c:run_script_argv:367 -
Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 stop' for container
'y1', config section 'lxc'
lxc 20160815160056.934 WARN lxc_commands -
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
lxc 20160815160056.934 WARN lxc_commands -
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
lxc 20160815160056.937 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
lxc 20160815160056.937 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
lxc 20160815160124.089 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
lxc 20160815160124.089 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
lxc 20160815160124.093 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
lxc 20160815160124.093 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: lxd 2.0.3-0ubuntu2 [modified: usr/lib/lxd/lxd-bridge]
ProcVersionSignature: Ubuntu 4.4.0-34.53-generic 4.4.15
Uname: Linux 4.4.0-34-generic x86_64
NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
ApportVersion: 2.20.3-0ubuntu7
Architecture: amd64
CurrentDesktop: Unity
Date: Tue Aug 16 13:07:37 2016
EcryptfsInUse: Yes
InstallationDate: Installed on 2015-07-23 (390 days ago)
InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20150722.1)
SourcePackage: lxd
UpgradeStatus: No upgrade log present (probably fresh install)
Related Bugs:
* bug 1613815: lxd-bridge.service exits success on failure to run dnsmasq
** Affects: lxd (Ubuntu)
Importance: Low
Status: Triaged
** Tags: amd64 apport-bug yakkety
** Description changed:
I recently upgraded during yakkety development cycle, rebooted and found
i could not launch containers. The failure can be seen below.
I think the failure path i hit is just that dnsmasq ran after lxd bridge
was set up but before the dnsmasq on it ran, and it successfully bound
to port 53 on the lxd bridge address.
Other services that run a dnsmasq set up files like this:
- $ cat /etc/dnsmasq.d/lxc
+ $ cat /etc/dnsmasq.d/lxc
# Tell any system-wide dnsmasq instance to make sure to bind to interfaces
# instead of listening on 0.0.0.0
# WARNING: changes to this file will get lost if lxc is removed.
bind-interfaces
except-interface=lxcbr0
So it seems one at least popular solution to this is to add a 'lxd' file
in that directory and 'except-interface=lxdbr0'.
-
$ lxc launch ubuntu-daily:yakkety y1
Creating y1
Starting y1
error: Error calling 'lxd forkstart y1 /var/lib/lxd/containers
/var/log/lxd/y1/lxc.conf': err='exit status 1'
Try `lxc info --show-log y1` for more info
$ lxc info --show-log y1
Name: y1
Architecture: x86_64
Created: 2016/08/15 20:00 UTC
Status: Stopped
Type: persistent
Profiles: default
Log:
- lxc 20160815160056.225 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 3
- lxc 20160815160056.225 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
- lxc 20160815160056.228 INFO lxc_container -
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc
monitor] /var/lib/lxd/containers y1
- lxc 20160815160056.228 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
- lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM
security driver AppArmor
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this
to allow umount -f; not recommended.
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount
action 0
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
+ lxc 20160815160056.225 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 3
+ lxc 20160815160056.225 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
+ lxc 20160815160056.228 INFO lxc_container -
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc
monitor] /var/lib/lxd/containers y1
+ lxc 20160815160056.228 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
+ lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM
security driver AppArmor
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this
to allow umount -f; not recommended.
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount
action 0
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount
action 0
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount
action 0
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .[all].
- lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action
327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action
327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action
327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action
327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action
327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action
327681
- lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main
one
- lxc 20160815160056.229 INFO lxc_conf - conf.c:run_script_argv:367
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 start' for container
'y1', config section 'lxc'
- lxc 20160815160056.229 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 3
- lxc 20160815160056.229 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
- lxc 20160815160056.232 INFO lxc_monitor -
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
- lxc 20160815160056.315 DEBUG lxc_start -
start.c:setup_signal_fd:289 - sigchild handler set
- lxc 20160815160056.316 DEBUG lxc_console -
console.c:lxc_console_peer_default:469 - no console peer
- lxc 20160815160056.316 INFO lxc_start - start.c:lxc_init:488 -
'y1' is initialized
- lxc 20160815160056.317 DEBUG lxc_start - start.c:__lxc_start:1326
- Not dropping cap_sys_boot or watching utmp
- lxc 20160815160056.317 INFO lxc_start -
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
- lxc 20160815160056.317 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
- lxc 20160815160056.317 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
- lxc 20160815160056.322 ERROR lxc_conf -
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge
'lxdbr0': Operation not permitted
- lxc 20160815160056.356 ERROR lxc_conf -
conf.c:lxc_create_network:2872 - failed to create netdev
- lxc 20160815160056.356 ERROR lxc_start - start.c:lxc_spawn:1080 -
failed to create the network
- lxc 20160815160056.356 ERROR lxc_start - start.c:__lxc_start:1353
- failed to spawn 'y1'
- lxc 20160815160056.357 INFO lxc_conf - conf.c:run_script_argv:367
- Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'y1',
config section 'lxc'
- lxc 20160815160056.860 INFO lxc_conf - conf.c:run_script_argv:367
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 stop' for container
'y1', config section 'lxc'
- lxc 20160815160056.934 WARN lxc_commands -
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
- lxc 20160815160056.934 WARN lxc_commands -
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
- lxc 20160815160056.937 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
- lxc 20160815160056.937 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
- lxc 20160815160124.089 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
- lxc 20160815160124.089 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
- lxc 20160815160124.093 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
- lxc 20160815160124.093 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .[all].
+ lxc 20160815160056.228 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action
327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action
327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action
327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action
327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action
327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action
327681
+ lxc 20160815160056.229 INFO lxc_seccomp -
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main
one
+ lxc 20160815160056.229 INFO lxc_conf - conf.c:run_script_argv:367
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 start' for container
'y1', config section 'lxc'
+ lxc 20160815160056.229 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 3
+ lxc 20160815160056.229 INFO lxc_start -
start.c:lxc_check_inherited:251 - closed inherited fd 10
+ lxc 20160815160056.232 INFO lxc_monitor -
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
+ lxc 20160815160056.315 DEBUG lxc_start -
start.c:setup_signal_fd:289 - sigchild handler set
+ lxc 20160815160056.316 DEBUG lxc_console -
console.c:lxc_console_peer_default:469 - no console peer
+ lxc 20160815160056.316 INFO lxc_start - start.c:lxc_init:488 -
'y1' is initialized
+ lxc 20160815160056.317 DEBUG lxc_start - start.c:__lxc_start:1326
- Not dropping cap_sys_boot or watching utmp
+ lxc 20160815160056.317 INFO lxc_start -
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
+ lxc 20160815160056.317 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
+ lxc 20160815160056.317 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
+ lxc 20160815160056.322 ERROR lxc_conf -
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge
'lxdbr0': Operation not permitted
+ lxc 20160815160056.356 ERROR lxc_conf -
conf.c:lxc_create_network:2872 - failed to create netdev
+ lxc 20160815160056.356 ERROR lxc_start - start.c:lxc_spawn:1080 -
failed to create the network
+ lxc 20160815160056.356 ERROR lxc_start - start.c:__lxc_start:1353
- failed to spawn 'y1'
+ lxc 20160815160056.357 INFO lxc_conf - conf.c:run_script_argv:367
- Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'y1',
config section 'lxc'
+ lxc 20160815160056.860 INFO lxc_conf - conf.c:run_script_argv:367
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 stop' for container
'y1', config section 'lxc'
+ lxc 20160815160056.934 WARN lxc_commands -
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
+ lxc 20160815160056.934 WARN lxc_commands -
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
+ lxc 20160815160056.937 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
+ lxc 20160815160056.937 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
+ lxc 20160815160124.089 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
+ lxc 20160815160124.089 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
+ lxc 20160815160124.093 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range
65536
+ lxc 20160815160124.093 INFO lxc_confile -
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range
65536
ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: lxd 2.0.3-0ubuntu2 [modified: usr/lib/lxd/lxd-bridge]
ProcVersionSignature: Ubuntu 4.4.0-34.53-generic 4.4.15
Uname: Linux 4.4.0-34-generic x86_64
NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
ApportVersion: 2.20.3-0ubuntu7
Architecture: amd64
CurrentDesktop: Unity
Date: Tue Aug 16 13:07:37 2016
EcryptfsInUse: Yes
InstallationDate: Installed on 2015-07-23 (390 days ago)
InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20150722.1)
SourcePackage: lxd
UpgradeStatus: No upgrade log present (probably fresh install)
+
+ Related Bugs:
+ * bug 1613815: lxd-bridge.service exits success on failure to run dnsmasq
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1613820
Title:
lxd-bridge.service races against dnsmasq package's dnsmasq.service
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1613820/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs