Public bug reported:

I recently upgraded during yakkety development cycle, rebooted and found
i could not launch containers. The failure can be seen below.

I think the failure path i hit is just that dnsmasq ran after lxd bridge
was set up but before the dnsmasq on it ran, and it successfully bound
to port 53 on the lxd bridge address.

Other services that run a dnsmasq set up files like this:
$ cat /etc/dnsmasq.d/lxc
# Tell any system-wide dnsmasq instance to make sure to bind to interfaces
# instead of listening on 0.0.0.0
# WARNING: changes to this file will get lost if lxc is removed.
bind-interfaces
except-interface=lxcbr0

So it seems one at least popular solution to this is to add a 'lxd' file
in that directory and 'except-interface=lxdbr0'.

$ lxc launch ubuntu-daily:yakkety y1
Creating y1
Starting y1
error: Error calling 'lxd forkstart y1 /var/lib/lxd/containers 
/var/log/lxd/y1/lxc.conf': err='exit status 1'
Try `lxc info --show-log y1` for more info

$ lxc info --show-log y1
Name: y1
Architecture: x86_64
Created: 2016/08/15 20:00 UTC
Status: Stopped
Type: persistent
Profiles: default

Log:

            lxc 20160815160056.225 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
            lxc 20160815160056.225 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
            lxc 20160815160056.228 INFO lxc_container - 
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc 
monitor] /var/lib/lxd/containers y1
            lxc 20160815160056.228 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
            lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM 
security driver AppArmor
            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this 
to allow umount -f; not recommended.
            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount 
action 0
            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts

            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount 
action 0
            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts

            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .[all].
            lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action 
327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action 
327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action 
327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action 
327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action 
327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action 
327681
            lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main 
one
            lxc 20160815160056.229 INFO lxc_conf - conf.c:run_script_argv:367 - 
Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 start' for container 
'y1', config section 'lxc'
            lxc 20160815160056.229 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
            lxc 20160815160056.229 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
            lxc 20160815160056.232 INFO lxc_monitor - 
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name 
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
            lxc 20160815160056.315 DEBUG lxc_start - 
start.c:setup_signal_fd:289 - sigchild handler set
            lxc 20160815160056.316 DEBUG lxc_console - 
console.c:lxc_console_peer_default:469 - no console peer
            lxc 20160815160056.316 INFO lxc_start - start.c:lxc_init:488 - 'y1' 
is initialized
            lxc 20160815160056.317 DEBUG lxc_start - start.c:__lxc_start:1326 - 
Not dropping cap_sys_boot or watching utmp
            lxc 20160815160056.317 INFO lxc_start - 
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
            lxc 20160815160056.317 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
            lxc 20160815160056.317 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
            lxc 20160815160056.322 ERROR lxc_conf - 
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge 
'lxdbr0': Operation not permitted
            lxc 20160815160056.356 ERROR lxc_conf - 
conf.c:lxc_create_network:2872 - failed to create netdev
            lxc 20160815160056.356 ERROR lxc_start - start.c:lxc_spawn:1080 - 
failed to create the network
            lxc 20160815160056.356 ERROR lxc_start - start.c:__lxc_start:1353 - 
failed to spawn 'y1'
            lxc 20160815160056.357 INFO lxc_conf - conf.c:run_script_argv:367 - 
Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'y1', config 
section 'lxc'
            lxc 20160815160056.860 INFO lxc_conf - conf.c:run_script_argv:367 - 
Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 stop' for container 
'y1', config section 'lxc'
            lxc 20160815160056.934 WARN lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
            lxc 20160815160056.934 WARN lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
            lxc 20160815160056.937 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
            lxc 20160815160056.937 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
            lxc 20160815160124.089 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
            lxc 20160815160124.089 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
            lxc 20160815160124.093 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
            lxc 20160815160124.093 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536

ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: lxd 2.0.3-0ubuntu2 [modified: usr/lib/lxd/lxd-bridge]
ProcVersionSignature: Ubuntu 4.4.0-34.53-generic 4.4.15
Uname: Linux 4.4.0-34-generic x86_64
NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
ApportVersion: 2.20.3-0ubuntu7
Architecture: amd64
CurrentDesktop: Unity
Date: Tue Aug 16 13:07:37 2016
EcryptfsInUse: Yes
InstallationDate: Installed on 2015-07-23 (390 days ago)
InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20150722.1)
SourcePackage: lxd
UpgradeStatus: No upgrade log present (probably fresh install)

Related Bugs:
 * bug 1613815: lxd-bridge.service exits success on failure to run dnsmasq

** Affects: lxd (Ubuntu)
     Importance: Low
         Status: Triaged


** Tags: amd64 apport-bug yakkety

** Description changed:

  I recently upgraded during yakkety development cycle, rebooted and found
  i could not launch containers. The failure can be seen below.
  
  I think the failure path i hit is just that dnsmasq ran after lxd bridge
  was set up but before the dnsmasq on it ran, and it successfully bound
  to port 53 on the lxd bridge address.
  
  Other services that run a dnsmasq set up files like this:
- $ cat /etc/dnsmasq.d/lxc 
+ $ cat /etc/dnsmasq.d/lxc
  # Tell any system-wide dnsmasq instance to make sure to bind to interfaces
  # instead of listening on 0.0.0.0
  # WARNING: changes to this file will get lost if lxc is removed.
  bind-interfaces
  except-interface=lxcbr0
  
  So it seems one at least popular solution to this is to add a 'lxd' file
  in that directory and 'except-interface=lxdbr0'.
- 
  
  $ lxc launch ubuntu-daily:yakkety y1
  Creating y1
  Starting y1
  error: Error calling 'lxd forkstart y1 /var/lib/lxd/containers 
/var/log/lxd/y1/lxc.conf': err='exit status 1'
  Try `lxc info --show-log y1` for more info
  
  $ lxc info --show-log y1
  Name: y1
  Architecture: x86_64
  Created: 2016/08/15 20:00 UTC
  Status: Stopped
  Type: persistent
  Profiles: default
  
  Log:
  
-             lxc 20160815160056.225 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
-             lxc 20160815160056.225 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
-             lxc 20160815160056.228 INFO lxc_container - 
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc 
monitor] /var/lib/lxd/containers y1
-             lxc 20160815160056.228 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
-             lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM 
security driver AppArmor
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this 
to allow umount -f; not recommended.
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount 
action 0
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
+             lxc 20160815160056.225 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
+             lxc 20160815160056.225 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
+             lxc 20160815160056.228 INFO lxc_container - 
lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc 
monitor] /var/lib/lxd/containers y1
+             lxc 20160815160056.228 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
+             lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM 
security driver AppArmor
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this 
to allow umount -f; not recommended.
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount 
action 0
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
  
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount 
action 0
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount 
action 0
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
  
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .[all].
-             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action 
327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action 
327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action 
327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action 
327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action 
327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action 
327681
-             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main 
one
-             lxc 20160815160056.229 INFO lxc_conf - conf.c:run_script_argv:367 
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 start' for container 
'y1', config section 'lxc'
-             lxc 20160815160056.229 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
-             lxc 20160815160056.229 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
-             lxc 20160815160056.232 INFO lxc_monitor - 
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name 
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
-             lxc 20160815160056.315 DEBUG lxc_start - 
start.c:setup_signal_fd:289 - sigchild handler set
-             lxc 20160815160056.316 DEBUG lxc_console - 
console.c:lxc_console_peer_default:469 - no console peer
-             lxc 20160815160056.316 INFO lxc_start - start.c:lxc_init:488 - 
'y1' is initialized
-             lxc 20160815160056.317 DEBUG lxc_start - start.c:__lxc_start:1326 
- Not dropping cap_sys_boot or watching utmp
-             lxc 20160815160056.317 INFO lxc_start - 
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
-             lxc 20160815160056.317 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160056.317 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
-             lxc 20160815160056.322 ERROR lxc_conf - 
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge 
'lxdbr0': Operation not permitted
-             lxc 20160815160056.356 ERROR lxc_conf - 
conf.c:lxc_create_network:2872 - failed to create netdev
-             lxc 20160815160056.356 ERROR lxc_start - start.c:lxc_spawn:1080 - 
failed to create the network
-             lxc 20160815160056.356 ERROR lxc_start - start.c:__lxc_start:1353 
- failed to spawn 'y1'
-             lxc 20160815160056.357 INFO lxc_conf - conf.c:run_script_argv:367 
- Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'y1', 
config section 'lxc'
-             lxc 20160815160056.860 INFO lxc_conf - conf.c:run_script_argv:367 
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 stop' for container 
'y1', config section 'lxc'
-             lxc 20160815160056.934 WARN lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
-             lxc 20160815160056.934 WARN lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
-             lxc 20160815160056.937 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160056.937 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.089 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.089 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.093 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
-             lxc 20160815160124.093 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .[all].
+             lxc 20160815160056.228 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action 
327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action 
327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action 
327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action 
327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action 
327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action 
327681
+             lxc 20160815160056.229 INFO lxc_seccomp - 
seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main 
one
+             lxc 20160815160056.229 INFO lxc_conf - conf.c:run_script_argv:367 
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 start' for container 
'y1', config section 'lxc'
+             lxc 20160815160056.229 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 3
+             lxc 20160815160056.229 INFO lxc_start - 
start.c:lxc_check_inherited:251 - closed inherited fd 10
+             lxc 20160815160056.232 INFO lxc_monitor - 
monitor.c:lxc_monitor_sock_name:178 - using monitor sock name 
lxc/d78a9d7e97b4b375//var/lib/lxd/containers
+             lxc 20160815160056.315 DEBUG lxc_start - 
start.c:setup_signal_fd:289 - sigchild handler set
+             lxc 20160815160056.316 DEBUG lxc_console - 
console.c:lxc_console_peer_default:469 - no console peer
+             lxc 20160815160056.316 INFO lxc_start - start.c:lxc_init:488 - 
'y1' is initialized
+             lxc 20160815160056.317 DEBUG lxc_start - start.c:__lxc_start:1326 
- Not dropping cap_sys_boot or watching utmp
+             lxc 20160815160056.317 INFO lxc_start - 
start.c:resolve_clone_flags:1013 - Cloning a new user namespace
+             lxc 20160815160056.317 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.317 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.322 ERROR lxc_conf - 
conf.c:instantiate_veth:2595 - failed to attach 'vethB0Y46P' to the bridge 
'lxdbr0': Operation not permitted
+             lxc 20160815160056.356 ERROR lxc_conf - 
conf.c:lxc_create_network:2872 - failed to create netdev
+             lxc 20160815160056.356 ERROR lxc_start - start.c:lxc_spawn:1080 - 
failed to create the network
+             lxc 20160815160056.356 ERROR lxc_start - start.c:__lxc_start:1353 
- failed to spawn 'y1'
+             lxc 20160815160056.357 INFO lxc_conf - conf.c:run_script_argv:367 
- Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'y1', 
config section 'lxc'
+             lxc 20160815160056.860 INFO lxc_conf - conf.c:run_script_argv:367 
- Executing script '/usr/bin/lxd callhook /var/lib/lxd 546 stop' for container 
'y1', config section 'lxc'
+             lxc 20160815160056.934 WARN lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
+             lxc 20160815160056.934 WARN lxc_commands - 
commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
+             lxc 20160815160056.937 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160056.937 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.089 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.089 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.093 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 
65536
+             lxc 20160815160124.093 INFO lxc_confile - 
confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 
65536
  
  ProblemType: Bug
  DistroRelease: Ubuntu 16.10
  Package: lxd 2.0.3-0ubuntu2 [modified: usr/lib/lxd/lxd-bridge]
  ProcVersionSignature: Ubuntu 4.4.0-34.53-generic 4.4.15
  Uname: Linux 4.4.0-34-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  ApportVersion: 2.20.3-0ubuntu7
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Tue Aug 16 13:07:37 2016
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2015-07-23 (390 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20150722.1)
  SourcePackage: lxd
  UpgradeStatus: No upgrade log present (probably fresh install)
+ 
+ Related Bugs:
+  * bug 1613815: lxd-bridge.service exits success on failure to run dnsmasq

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1613820

Title:
  lxd-bridge.service races against dnsmasq package's dnsmasq.service

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1613820/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to