[lxc-users] LXD lxc start
Tycho Andersen
tycho.andersen at canonical.com
Mon Aug 1 18:39:21 UTC 2016
On Sat, Jul 30, 2016 at 05:12:46PM +0200, Goran Brkuljan wrote:
> Hi,
>
> I am suddenly missing lxdbr0, and I am getting errror while starting lxc
> container.
What's the output of `journalctl -u lxd-bridge`?
Tycho
> lxc start app01
> error: Error calling 'lxd forkstart app01 /var/lib/lxd/containers
> /var/log/lxd/app01/lxc.conf': err='exit status 1'
> Try `lxc info --show-log app01` for more info
>
> Also when I try '*sudo dpkg-reconfigure -p medium lxd*' lxd bridge is not
> created.
>
> Lxd log in attachment.
>
> Regards,
>
> Goran
> lxc info --show-log app01,
>
> Name: app01
> Architecture: x86_64
> Created: 2016/07/10 14:13 UTC
> Status: Stopped
> Type: persistent
> Profiles: default
>
> Log:
>
> lxc 20160730170007.032 INFO lxc_start - start.c:lxc_check_inherited:251 - closed inherited fd 3
> lxc 20160730170007.032 INFO lxc_start - start.c:lxc_check_inherited:251 - closed inherited fd 7
> lxc 20160730170007.034 INFO lxc_container - lxccontainer.c:do_lxcapi_start:797 - Attempting to set proc title to [lxc monitor] /var/lib/lxd/containers app01
> lxc 20160730170007.034 INFO lxc_start - start.c:lxc_check_inherited:251 - closed inherited fd 7
> lxc 20160730170007.034 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:446 - Adding native rule for reject_force_umount action 0
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
>
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:449 - Adding compat rule for reject_force_umount action 0
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
>
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .[all].
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .kexec_load errno 1.
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:446 - Adding native rule for kexec_load action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:449 - Adding compat rule for kexec_load action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .open_by_handle_at errno 1.
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:446 - Adding native rule for open_by_handle_at action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:449 - Adding compat rule for open_by_handle_at action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .init_module errno 1.
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:446 - Adding native rule for init_module action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:449 - Adding compat rule for init_module action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .finit_module errno 1.
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:446 - Adding native rule for finit_module action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:449 - Adding compat rule for finit_module action 327681
> lxc 20160730170007.034 INFO lxc_seccomp - seccomp.c:parse_config_v2:342 - processing: .delete_module errno 1.
> lxc 20160730170007.035 INFO lxc_seccomp - seccomp.c:parse_config_v2:446 - Adding native rule for delete_module action 327681
> lxc 20160730170007.035 INFO lxc_seccomp - seccomp.c:parse_config_v2:449 - Adding compat rule for delete_module action 327681
> lxc 20160730170007.035 INFO lxc_seccomp - seccomp.c:parse_config_v2:456 - Merging in the compat seccomp ctx into the main one
> lxc 20160730170007.035 INFO lxc_conf - conf.c:run_script_argv:367 - Executing script '/usr/bin/lxd callhook /var/lib/lxd 165 start' for container 'app01', config section 'lxc'
> lxc 20160730170007.035 INFO lxc_start - start.c:lxc_check_inherited:251 - closed inherited fd 3
> lxc 20160730170007.035 INFO lxc_start - start.c:lxc_check_inherited:251 - closed inherited fd 7
> lxc 20160730170007.037 INFO lxc_monitor - monitor.c:lxc_monitor_sock_name:178 - using monitor sock name lxc/d78a9d7e97b4b375//var/lib/lxd/containers
> lxc 20160730170012.495 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170012.495 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170017.369 DEBUG lxc_start - start.c:setup_signal_fd:289 - sigchild handler set
> lxc 20160730170017.371 DEBUG lxc_console - console.c:lxc_console_peer_default:469 - no console peer
> lxc 20160730170017.371 INFO lxc_start - start.c:lxc_init:488 - 'app01' is initialized
> lxc 20160730170017.372 DEBUG lxc_start - start.c:__lxc_start:1326 - Not dropping cap_sys_boot or watching utmp
> lxc 20160730170017.372 INFO lxc_start - start.c:resolve_clone_flags:1013 - Cloning a new user namespace
> lxc 20160730170017.381 ERROR lxc_conf - conf.c:instantiate_veth:2595 - failed to attach 'vethCEML2O' to the bridge 'lxdbr0': Operation not permitted
> lxc 20160730170017.410 ERROR lxc_conf - conf.c:lxc_create_network:2872 - failed to create netdev
> lxc 20160730170017.410 ERROR lxc_start - start.c:lxc_spawn:1080 - failed to create the network
> lxc 20160730170017.410 ERROR lxc_start - start.c:__lxc_start:1353 - failed to spawn 'app01'
> lxc 20160730170017.411 INFO lxc_conf - conf.c:run_script_argv:367 - Executing script '/usr/share/lxcfs/lxc.reboot.hook' for container 'app01', config section 'lxc'
> lxc 20160730170017.921 INFO lxc_conf - conf.c:run_script_argv:367 - Executing script '/usr/bin/lxd callhook /var/lib/lxd 165 stop' for container 'app01', config section 'lxc'
> lxc 20160730170018.025 WARN lxc_commands - commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
> lxc 20160730170018.025 WARN lxc_commands - commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
> lxc 20160730170018.025 WARN lxc_commands - commands.c:lxc_cmd_rsp_recv:172 - command get_cgroup failed to receive response
> lxc 20160730170018.031 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170018.031 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170018.044 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170018.044 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170028.810 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170028.810 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170029.520 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170029.520 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170053.663 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170053.663 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170053.672 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170053.672 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170102.523 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170102.523 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170102.535 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170102.535 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170144.095 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170144.095 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170144.104 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170144.104 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170250.107 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170250.107 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> lxc 20160730170250.116 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type u nsid 0 hostid 165536 range 65536
> lxc 20160730170250.116 INFO lxc_confile - confile.c:config_idmap:1500 - read uid map: type g nsid 0 hostid 165536 range 65536
> _______________________________________________
> lxc-users mailing list
> lxc-users at lists.linuxcontainers.org
> http://lists.linuxcontainers.org/listinfo/lxc-users
More information about the lxc-users
mailing list