<div dir="ltr"><div><div dir="ltr"><div>Hi,</div><div><br></div><div>I'm still experiencing problems running lxc containers on my debian host.</div><div>They stop working randomly. Sometimes they will work for days and weeks and sometimes they stop working after 10 minutes.</div><div><br></div><div>In July I already send an e-mail to this list with detailed information: <a href="https://lists.linuxcontainers.org/pipermail/lxc-users/2014-July/007383.html">https://lists.linuxcontainers.org/pipermail/lxc-users/2014-July/007383.html</a></div><div><br></div><div>I further investigated the problem and it seems that the container is no longer able to spawn new processes.</div><div>I cannot login via SSH or lxc-console and also postfix stops working, but my nginx is still delivering the website.</div><div><br></div><div>I don't have set any restrictions in my cgroups.</div><div>There is enough space left on the HDDs (103GB available) and there are enough free Inodes ( > 90% available).</div><div><br></div><div>At the end of this message I attached some log information:</div><div> - available Inodes via $ df -i</div><div> - TRACE log for a container from starting it till I stop it because it stopped working</div><div> - a process tree of the hanging container, got it via $ ps -ef forest from the host system</div><div><br></div><div>Hopefully someone can help me. This is a really annoying problem.<br></div><div>If you need further information, just let me know.</div><div><br></div><div>Best regards</div><div>Lukas</div><div><br></div><div><br></div><div><br></div><div># HOST</div><div> $ uname -a</div><div> Linux <a href="http://host.example.org">host.example.org</a> 3.2.0-4-amd64 #1 SMP Debian 3.2.60-1+deb7u1 x86_64 GNU/Linux</div><div><br></div><div> $ df -i</div><div> Filesystem Inodes IUsed IFree IUse% Mounted on</div><div> rootfs 12517376 652127 11865249 6% /</div><div> udev 8258632 421 8258211 1% /dev</div><div> tmpfs 8260286 401 8259885 1% /run</div><div> /dev/disk/by-uuid/0281ee... 12517376 652127 11865249 6% /</div><div> tmpfs 8260286 18 8260268 1% /run/lock</div><div> tmpfs 8260286 2 8260284 1% /run/shm</div><div> /dev/md1 131072 453 130619 1% /boot</div><div><br></div><div><br></div><div># CONTAINER</div><div> $ df -i</div><div> Filesystem Inodes IUsed IFree IUse% Mounted on</div><div> rootfs 12517376 652399 11864977 6% /</div><div> /dev/disk/by-uuid/0281ee... 12517376 652399 11864977 6% /</div><div> tmpfs 8260286 69 8260217 1% /run</div><div> tmpfs 8260286 1 8260285 1% /run/lock</div><div> tmpfs 8260286 2 8260284 1% /run/shm</div><div><br></div><div><br></div><div># CONFIG of a container</div><div> lxc.rootfs = /var/lib/lxc/mail/rootfs</div><div> lxc.include = /usr/share/lxc/config/debian.common.conf</div><div> lxc.mount = /var/lib/lxc/mail/fstab</div><div> lxc.utsname = mail</div><div> lxc.arch = amd64</div><div> </div><div> lxc.network.type = veth</div><div> <a href="http://lxc.network.name">lxc.network.name</a> = veth12</div><div> lxc.network.flags = up</div><div> lxc.network.link = br0</div><div> lxc.network.veth.pair = veth12-sid</div><div> lxc.network.ipv4 = <a href="http://10.1.1.12/24">10.1.1.12/24</a></div><div> lxc.network.ipv4.gateway = 10.1.1.254</div><div><br></div><div><br></div><div># CONFIG of /usr/share/lxc/config/debian.common.conf</div><div> # Default pivot location</div><div> lxc.pivotdir = lxc_putold</div><div><br></div><div> # Default mount entries</div><div> lxc.mount.entry = proc proc proc nodev,noexec,nosuid 0 0</div><div> lxc.mount.entry = sysfs sys sysfs defaults 0 0</div><div> lxc.mount.entry = /sys/fs/fuse/connections sys/fs/fuse/connections none bind,optional 0 0</div><div><br></div><div> # Default console settings</div><div> lxc.tty = 4</div><div> lxc.pts = 1024</div><div><br></div><div> # Default capabilities</div><div> lxc.cap.drop = sys_module mac_admin mac_override sys_time</div><div><br></div><div> # When using LXC with apparmor, the container will be confined by default.</div><div> # If you wish for it to instead run unconfined, copy the following line</div><div> # (uncommented) to the container's configuration file.</div><div> #lxc.aa_profile = unconfined</div><div><br></div><div> # To support container nesting on an Ubuntu host while retaining most of</div><div> # apparmor's added security, use the following two lines instead.</div><div> #lxc.aa_profile = lxc-container-default-with-nesting</div><div> #lxc.hook.mount = /usr/share/lxc/hooks/mountcgroups</div><div><br></div><div> # If you wish to allow mounting block filesystems, then use the following</div><div> # line instead, and make sure to grant access to the block device and/or loop</div><div> # devices below in lxc.cgroup.devices.allow.</div><div> #lxc.aa_profile = lxc-container-default-with-mounting</div><div><br></div><div> # Default cgroup limits</div><div> lxc.cgroup.devices.deny = a</div><div> ## Allow any mknod (but not using the node)</div><div> lxc.cgroup.devices.allow = c *:* m</div><div> lxc.cgroup.devices.allow = b *:* m</div><div> ## /dev/null and zero</div><div> lxc.cgroup.devices.allow = c 1:3 rwm</div><div> lxc.cgroup.devices.allow = c 1:5 rwm</div><div> ## consoles</div><div> lxc.cgroup.devices.allow = c 5:0 rwm</div><div> lxc.cgroup.devices.allow = c 5:1 rwm</div><div> ## /dev/{,u}random</div><div> lxc.cgroup.devices.allow = c 1:8 rwm</div><div> lxc.cgroup.devices.allow = c 1:9 rwm</div><div> ## /dev/pts/*</div><div> lxc.cgroup.devices.allow = c 5:2 rwm</div><div> lxc.cgroup.devices.allow = c 136:* rwm</div><div> ## rtc</div><div> lxc.cgroup.devices.allow = c 254:0 rm</div><div> ## fuse</div><div> lxc.cgroup.devices.allow = c 10:229 rwm</div><div> ## tun</div><div> lxc.cgroup.devices.allow = c 10:200 rwm</div><div> ## full</div><div> lxc.cgroup.devices.allow = c 1:7 rwm</div><div> ## hpet</div><div> lxc.cgroup.devices.allow = c 10:228 rwm</div><div> ## kvm</div><div> lxc.cgroup.devices.allow = c 10:232 rwm</div><div> ## To use loop devices, copy the following line to the container's</div><div> ## configuration file (uncommented).</div><div> #lxc.cgroup.devices.allow = b 7:* rwm</div><div><br></div><div> # Blacklist some syscalls which are not safe in privileged</div><div> # containers</div><div> lxc.seccomp = /usr/share/lxc/config/common.seccomp</div><div><br></div><div><br></div><div># PROCESS TREE for a container</div><div> root 12895 1 0 Sep15 ? 00:00:00 lxc-start -d -n mail</div><div> root 12913 12895 0 Sep15 ? 00:00:01 \_ init [3]</div><div> root 14007 12913 0 Sep15 ? 00:00:00 \_ /usr/sbin/syslogd --no-forward</div><div> root 14114 12913 0 Sep15 ? 00:00:00 \_ /usr/sbin/cron</div><div> root 32282 14114 0 15:17 ? 00:00:00 | \_ /USR/SBIN/CRON</div><div> root 14132 12913 <span></span> 0 Sep15 ? 00:00:00 \_ /usr/sbin/sshd</div><div> root 32409 14132 0 15:17 ? 00:00:00 | \_ sshd: root [priv]</div><div> 101 32410 32409 0 15:17 ? 00:00:00 | \_ [sshd] <defunct></div><div> 110 14161 12913 0 Sep15 ? 00:00:02 \_ /usr/sbin/spamass-milter -P /var/run/spamass/spamass.pid -f -p /var/spool/postfix/spamass/spamass.sock -u spamass-milter -i 127.0.0.1 -m -r -1 -I</div><div> root 14275 12913 0 Sep15 ? 00:00:00 \_ nginx: master process /usr/sbin/nginx</div><div> www-data 14276 14275 0 Sep15 ? 00:00:02 | \_ nginx: worker process</div><div> www-data 14277 14275 0 Sep15 ? 00:00:10 | \_ nginx: worker process</div><div> www-data 14278 14275 0 Sep15 ? 00:00:10 | \_ nginx: worker process</div><div> www-data 14280 14275 0 Sep15 ? 00:00:08 | \_ nginx: worker process</div><div> root 14310 12913 0 Sep15 ? 00:00:00 \_ /bin/sh /usr/bin/mysqld_safe</div><div> sshd 14801 14310 0 Sep15 ? 00:01:57 | \_ /usr/sbin/mysqld --basedir=/usr --datadir=/var/lib/mysql --plugin-dir=/usr/lib/mysql/plugin --user=mysql --pid-file=/var/run/mysqld/mysqld.pid --socket=/var/run/mysqld/mysqld.sock --port=3306</div><div> root 14803 14310 0 Sep15 ? 00:00:00 | \_ logger -t mysqld -p daemon.error</div><div> root 14595 12913 0 Sep15 ? 00:00:05 \_ php-fpm: master process (/etc/php5/fpm/php-fpm.conf)</div><div> www-data 14599 14595 0 Sep15 ? 00:00:00 | \_ php-fpm: pool www</div><div> www-data 14600 14595 0 Sep15 ? 00:00:00 | \_ php-fpm: pool www</div><div> www-data 14604 14595 0 Sep15 ? 00:00:00 | \_ php-fpm: pool vmail</div><div> root 14890 12913 0 Sep15 ? 00:00:00 \_ /usr/sbin/dovecot -c /etc/dovecot/dovecot.conf</div><div> 105 14895 14890 0 Sep15 ? 00:00:00 | \_ dovecot/anvil</div><div> root 14896 14890 0 Sep15 ? 00:00:00 | \_ dovecot/log</div><div> 105 29395 14890 0 15:11 ? 00:00:00 | \_ dovecot/auth</div><div> munin 15012 12913 0 Sep15 ? 00:07:18 \_ /usr/sbin/clamd -c /etc/clamav/clamd.conf</div><div> munin 15276 12913 0 Sep15 ? 00:01:59 \_ /usr/bin/freshclam -d --quiet --config-file=/etc/clamav/freshclam.conf</div><div> munin 15287 12913 0 Sep15 ? 00:00:02 \_ /usr/sbin/clamav-milter --config-file=/etc/clamav/clamav-milter.conf</div><div> root 15356 12913 0 Sep15 ? 00:00:01 \_ /usr/lib/postfix/master</div><div> ntp 15370 15356 0 Sep15 ? 00:00:00 | \_ qmgr -l -t fifo -u</div><div> ntp 15485 15356 0 Sep15 ? 00:00:00 | \_ tlsmgr -l -t unix -u -c</div><div> ntp 3635 15356 0 Sep17 ? 00:00:00 | \_ anvil -l -t unix -u -c</div><div> ntp 26072 15356 0 15:05 ? 00:00:00 | \_ pickup -l -t fifo -u -c</div><div> ntp 29393 15356 0 15:11 ? 00:00:00 | \_ smtpd -n smtp -t inet -u -c -o stress= -s 2</div><div> ntp 29394 15356 0 15:11 ? 00:00:00 | \_ proxymap -t unix -u</div><div> ntp 29439 15356 0 15:12 ? 00:00:00 | \_ smtpd -n smtp -t inet -u -c -o stress= -s 2</div><div> ntp 30408 15356 0 15:15 ? 00:00:00 | \_ smtpd -n smtp -t inet -u -c -o stress= -s 2</div><div> root 15364 12913 0 Sep15 pts/19 00:00:00 \_ /sbin/getty 38400 console</div><div> root 15365 12913 0 Sep15 pts/15 00:00:00 \_ /sbin/getty 38400 tty1 linux</div><div> root 15366 12913 0 Sep15 pts/16 00:00:00 \_ /sbin/getty 38400 tty2 linux</div><div> root 15367 12913 0 Sep15 pts/17 00:00:00 \_ /sbin/getty 38400 tty3 linux</div><div> root 15368 12913 0 Sep15 pts/18 00:00:00 \_ /sbin/getty 38400 tty4 linux</div><div> root 1045 12913 0 06:44 ? 00:00:05 \_ /usr/sbin/spamd --create-prefs --max-children 5 --helper-home-dir=/var/lib/spamassassin -u debian-spamd -g debian-spamd -d --pidfile=/var/run/spamd.pid</div><div> zabbix 1046 1045 0 06:44 ? 00:00:00 \_ spamd child</div><div> zabbix 1047 1045 0 06:44 ? 00:00:00 \_ spamd child</div><div><br></div><div><br></div><div># TRACE log for a container from starting it till I stop it</div><div> lxc-start 1411109478.750 INFO lxc_start_ui - using rcfile /var/lib/lxc/mail/config</div><div> lxc-start 1411109478.753 WARN lxc_log - lxc_log_init called with log already initialized</div><div> lxc-start 1411109478.759 INFO lxc_monitor - using monitor sock name lxc/ad055575fe28ddd5//var/lib/lxc</div><div> lxc-start 1411109478.761 DEBUG lxc_conf - allocated pty '/dev/pts/15' (5/6)</div><div> lxc-start 1411109478.761 DEBUG lxc_conf - allocated pty '/dev/pts/16' (7/8)</div><div> lxc-start 1411109478.761 DEBUG lxc_conf - allocated pty '/dev/pts/17' (9/10)</div><div> lxc-start 1411109478.761 DEBUG lxc_conf - allocated pty '/dev/pts/18' (11/12)</div><div> lxc-start 1411109478.761 INFO lxc_conf - tty's configured</div><div> lxc-start 1411109478.761 DEBUG lxc_start - sigchild handler set</div><div> lxc-start 1411109478.761 DEBUG lxc_console - no console peer</div><div> lxc-start 1411109478.761 INFO lxc_start - 'mail' is initialized</div><div> lxc-start 1411109478.869 DEBUG lxc_start - Dropping cap_sys_boot</div><div> lxc-start 1411109478.879 DEBUG lxc_conf - instanciated veth 'veth12-sid/vethLDVH7K', index is '96'</div><div> lxc-start 1411109478.879 INFO lxc_cgroup - cgroup driver cgroupfs initing for mail</div><div> lxc-start 1411109478.882 DEBUG lxc_cgfs - cgroup 'devices.deny' set to 'a'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c *:* m'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'b *:* m'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:3 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:5 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 5:0 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 5:1 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:8 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:9 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 5:2 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 136:* rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 254:0 rm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:229 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:200 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:7 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:228 rwm'</div><div> lxc-start 1411109478.883 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:232 rwm'</div><div> lxc-start 1411109478.883 INFO lxc_cgfs - cgroup has been setup</div><div> lxc-start 1411109478.921 DEBUG lxc_conf - move 'veth12' to '19912'</div><div> lxc-start 1411109478.922 DEBUG lxc_start - Dropped cap_sys_boot</div><div> lxc-start 1411109478.924 DEBUG lxc_conf - mounted '/var/lib/lxc/mail/rootfs' on '/usr/lib/lxc/rootfs'</div><div> lxc-start 1411109478.924 INFO lxc_conf - 'mail' hostname has been setup</div><div> lxc-start 1411109478.950 DEBUG lxc_conf - 'veth12' has been setup</div><div> lxc-start 1411109478.950 INFO lxc_conf - network has been setup</div><div> lxc-start 1411109478.950 DEBUG lxc_conf - Set exec command to /sbin/init</div><div> lxc-start 1411109478.950 INFO lxc_conf - Autodev not required.</div><div> lxc-start 1411109478.951 INFO lxc_conf - mount points have been setup</div><div> lxc-start 1411109478.952 DEBUG lxc_conf - mounted 'proc' on '/usr/lib/lxc/rootfs/proc', type 'proc'</div><div> lxc-start 1411109478.952 DEBUG lxc_conf - mounted 'sysfs' on '/usr/lib/lxc/rootfs/sys', type 'sysfs'</div><div> lxc-start 1411109478.952 INFO lxc_conf - failed to mount '/sys/fs/fuse/connections' on '/usr/lib/lxc/rootfs/sys/fs/fuse/connections' (optional): No such file or directory</div><div> lxc-start 1411109478.952 INFO lxc_conf - mount points have been setup</div><div> lxc-start 1411109478.952 INFO lxc_conf - console has been setup</div><div> lxc-start 1411109478.953 INFO lxc_conf - 4 tty(s) has been setup</div><div> lxc-start 1411109478.953 INFO lxc_conf - I am 1, /proc/self points to '1'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - created '/usr/lib/lxc/rootfs/lxc_putold' directory</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - mountpoint for old rootfs is '/usr/lib/lxc/rootfs/lxc_putold'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - pivot_root syscall to '/usr/lib/lxc/rootfs' successful</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/dev/pts'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/run/lock'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/run/shm'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/sys/fs/cgroup'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/proc'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/boot'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/dev'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/run'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold/sys'</div><div> lxc-start 1411109478.954 DEBUG lxc_conf - umounted '/lxc_putold'</div><div> lxc-start 1411109478.955 INFO lxc_conf - created new pts instance</div><div> lxc-start 1411109478.955 INFO lxc_conf - set personality to '0x0'</div><div> lxc-start 1411109478.955 DEBUG lxc_conf - drop capability 'sys_module' (16)</div><div> lxc-start 1411109478.955 DEBUG lxc_conf - drop capability 'mac_admin' (33)</div><div> lxc-start 1411109478.955 DEBUG lxc_conf - drop capability 'mac_override' (32)</div><div> lxc-start 1411109478.955 DEBUG lxc_conf - drop capability 'sys_time' (25)</div><div> lxc-start 1411109478.955 DEBUG lxc_conf - capabilities have been setup</div><div> lxc-start 1411109478.955 NOTICE lxc_conf - 'mail' is setup.</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.deny' set to 'a'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c *:* m'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'b *:* m'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:3 rwm'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:5 rwm'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 5:0 rwm'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 5:1 rwm'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:8 rwm'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:9 rwm'</div><div> lxc-start 1411109478.955 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 5:2 rwm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 136:* rwm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 254:0 rm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:229 rwm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:200 rwm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 1:7 rwm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:228 rwm'</div><div> lxc-start 1411109478.956 DEBUG lxc_cgfs - cgroup 'devices.allow' set to 'c 10:232 rwm'</div><div> lxc-start 1411109478.956 INFO lxc_cgfs - cgroup has been setup</div><div> lxc-start 1411109478.956 NOTICE lxc_start - exec'ing '/sbin/init'</div><div> lxc-start 1411109478.958 NOTICE lxc_start - '/sbin/init' started with pid '19912'</div><div> lxc-start 1411109478.959 DEBUG lxc_utmp - Added '/proc/19912/root/run' to inotifywatch</div><div> lxc-start 1411109478.959 WARN lxc_start - invalid pid for SIGCHLD</div><div> lxc-start 1411109478.959 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109478.959 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109478.959 DEBUG lxc_commands - 'mail' is in 'RUNNING' state</div><div> lxc-start 1411109478.976 DEBUG lxc_utmp - got inotify event 2 for utmp</div><div> lxc-start 1411109478.977 DEBUG lxc_utmp - got inotify event 256 for initctl</div><div> lxc-start 1411109478.977 DEBUG lxc_utmp - got inotify event 2 for utmp</div><div> lxc-start 1411109479.023 DEBUG lxc_utmp - got inotify event 256 for .clean</div><div> lxc-start 1411109936.513 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.514 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.514 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.514 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.514 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.514 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.516 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109936.516 DEBUG lxc_commands - peer has disconnected</div><div> lxc-start 1411109996.965 DEBUG lxc_start - container init process exited</div><div> lxc-start 1411109997.025 DEBUG lxc_start - unknown exit status for init: 9</div><div> lxc-start 1411109997.025 INFO lxc_error - child <19912> ended on signal (9)</div><div> lxc-start 1411109997.025 WARN lxc_conf - failed to remove interface 'veth12'</div></div></div>
</div>