[lxc-users] Error on upgrade to lxc-3.0.0 and integration with openvswitch

Geaaru geaaru at gmail.com
Wed Apr 25 15:44:17 UTC 2018


Hi Guido,
you can find ebuild to my overlay: https://github.com/geaaru/geaaru_ove
rlay
where I have already a patched sys-fs/lxcfs with my changes in pr to
lxcfs project that fix startup of service on gentoo where is present
.keep* file under /var/lib/lxcfs/ and add use of nonempty option for
fuse.
About your log I don't. I used lxc-3.0.0 tag from github with my
overlay, do you use gentoo upstream release maybe ?
However, currently I trying to add debug info and I confirm that on
cgroup_init I use cgroupfs.
Initialized cgroup driver cgroupfs
but I see a lot of errors that I post in attached file.
G.

On Wed, 2018-04-25 at 06:43 +0000, Jäkel, Guido wrote:
> Dear G.,
> 
> may you provide you the ebuild for V3 or point me to a source? Me and
> others are interested in, see https://bugs.gentoo.org/652582
> 
> 
> Your lxc-start fail at
> 
>         if (!cgroup_init(handler)) {
>                 ERROR("Failed initializing cgroup support");
>                 goto out_delete_net;
>         }
> 
> which call
> 
> bool cgroup_init(struct lxc_handler *handler)
> {
>         if (handler->cgroup_data) {
>                 ERROR("cgroup_init called on already initialized
> handler");
>                 return true;
>         }
> 
>         if (ops) {
>                 INFO("cgroup driver %s initing for %s", ops->driver,
> handler->name);
>                 handler->cgroup_data = ops->init(handler);
>         }
> 
>         return handler->cgroup_data != NULL;
> }
> 
> 
> But I don't notice any line like
> 
> INFO     lxc_cgroup - cgroups/cgroup.c:cgroup_init:67 - cgroup driver
> cgroupfs initing for $CONTAINER
> 
> in your log.
> 
> 
> Maybe it's something related to  lxc.cgroup.use  or
> lxc.cgroup2.use  and  https://github.com/lxc/lxc/issues/2084  is
> helpful.
> 
> 
> 
> 
> Guido
> 
> 
> > -----Original Message-----
> > From: lxc-users [mailto:lxc-users-bounces at lists.linuxcontainers.org
> > ] On Behalf Of Geaaru
> > Sent: Wednesday, April 25, 2018 8:05 AM
> > To: LXC User ML <lxc-users at lists.linuxcontainers.org>
> > Subject: [lxc-users] Error on upgrade to lxc-3.0.0 and integration
> > with openvswitch
> > 
> > Hi,
> > 
> > I just now upgrade to lxc-3.0.0 on gentoo/sabayon environment but I
> > found probably an issue.
> > 
> > But before push detail about issue I have a question:
> > 
> > 1) is there a minimal systemd version required with lxc+cgroupv2 ?
> > (currently I use systemd-233)
> > 
> > Hereinafter logging of lxc-start command:
> > 
> > lxc-start test2 20180424231851.547 INFO     lxc_lsm -
> > lsm/lsm.c:lsm_init:46 - LSM security driver nop
> > lxc-start test2 20180424231851.548 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .reject_force_umount  #
> > comment this to allow umount -f;  not recommended
> > lxc-start test2 20180424231851.548 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:761 - Adding native rule for
> > reject_force_umount  # comment this to allow umount -f;  not
> > recommended action 0(kill)
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject
> > force umounts
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > reject_force_umount action 0(kill)
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject
> > force umounts
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject
> > force umounts
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .[all]
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .kexec_load errno 1
> > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:761 - Adding native rule for kexec_load
> > errno 1 action 327681(errno)
> > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:765 - Adding compat rule for kexec_load
> > action 327681(errno)
> > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .open_by_handle_at
> > errno 1
> > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:761 - Adding native rule for
> > open_by_handle_at errno 1 action 327681(errno)
> > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > open_by_handle_at action 327681(errno)
> > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .init_module errno 1
> > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:761 - Adding native rule for init_module
> > errno 1 action 327681(errno)
> > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:765 - Adding compat rule for init_module
> > action 327681(errno)
> > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .finit_module errno 1
> > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:761 - Adding native rule for finit_module
> > errno 1 action 327681(errno)
> > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:765 - Adding compat rule for finit_module
> > action 327681(errno)
> > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:585 - processing: .delete_module errno 1
> > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:761 - Adding native rule for
> > delete_module
> > errno 1 action 327681(errno)
> > lxc-start test2 20180424231851.552 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > delete_module
> > action 327681(errno)
> > lxc-start test2 20180424231851.552 INFO     lxc_seccomp -
> > seccomp.c:parse_config_v2:775 - Merging in the compat Seccomp ctx
> > into
> > the main one
> > lxc-start test2 20180424231851.557 DEBUG    terminal -
> > terminal.c:lxc_terminal_peer_default:701 - Using terminal
> > "/dev/tty" as
> > proxy
> > lxc-start test2 20180424231851.557 DEBUG    terminal -
> > terminal.c:lxc_terminal_signal_init:188 - Created signal fd 9
> > lxc-start test2 20180424231851.557 DEBUG    terminal -
> > terminal.c:lxc_terminal_winsz:85 - Set window size to 180 columns
> > and 58
> > rows
> > lxc-start test2 20180424231851.557 INFO     lxc_start -
> > start.c:lxc_init:846 - Container "test2" is initialized
> > lxc-start test2 20180424231851.568 INFO     lxc_network -
> > network.c:instantiate_veth:171 - Retrieved mtu 1500 from lxdbr0
> > lxc-start test2 20180424231851.996 INFO     lxc_network -
> > network.c:instantiate_veth:197 - Attached "vethKA1HTT" to bridge
> > "lxdbr0"
> > lxc-start test2 20180424231851.998 DEBUG    lxc_network -
> > network.c:instantiate_veth:222 - Instantiated veth
> > "vethKA1HTT/vethYPDFUX", index is "24"
> > lxc-start test2 20180424231851.999 ERROR    lxc_start -
> > start.c:lxc_spawn:1553 - Failed initializing cgroup support
> > lxc-start test2 20180424231851.109 INFO     lxc_network -
> > network.c:lxc_delete_network_priv:2573 - Removed interface "(null)"
> > with index 24
> > lxc-start test2 20180424231851.113 WARN     lxc_network -
> > network.c:lxc_delete_network_priv:2591 - Failed to remove interface
> > "vethKA1HTT" from "lxdbr0": Invalid argument
> > lxc-start test2 20180424231851.113 DEBUG    lxc_network -
> > network.c:lxc_delete_network:3151 - Deleted network devices
> > lxc-start test2 20180424231851.113 ERROR    lxc_start -
> > start.c:__lxc_start:1866 - Failed to spawn container "test2"
> > lxc-start test2 20180424231851.113 INFO     lxc_conf -
> > conf.c:run_script_argv:368 - Executing script
> > "/usr/share/lxcfs/lxc.reboot.hook" for container "test2", config
> > section "lxc"
> > 
> > From log you can see that interface attached and configured on
> > openvswitch fail remove after that an error is received.
> > 
> > I open an issue about this or it's an already know issue ?
> > 
> > What means "ERROR    lxc_start - start.c:lxc_spawn:1553 - Failed
> > initializing cgroup support" ? Can anyone direct me about where
> > is problem on bootstrap LXC container after upgrade to LXC-3.0.0 ?
> > 
> > 
> > Some debug informations:
> > 
> > # cat /proc/self/cgroup
> > 12:debug:/
> > 11:cpuset:/
> > 10:net_cls,net_prio:/
> > 9:perf_event:/
> > 8:blkio:/
> > 7:pids:/user.slice/user-1000.slice/session-1.scope
> > 6:cpu,cpuacct:/
> > 5:devices:/user.slice
> > 4:rdma:/
> > 3:memory:/
> > 2:freezer:/
> > 1:name=systemd:/user.slice/user-1000.slice/session-1.scope
> > 
> > # ls /sys/fs/cgroup/
> > blkio  cpu  cpuacct  cpu,cpuacct  cpuset  debug  devices  freezer  
> > memory  net_cls  net_cls,net_prio  net_prio  perf_event  pids
> > rdma  systemd  unified
> > 
> > 
> > Thanks in advance
> > 
> > G.
> 
> _______________________________________________
> lxc-users mailing list
> lxc-users at lists.linuxcontainers.org
> http://lists.linuxcontainers.org/listinfo/lxc-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxcontainers.org/pipermail/lxc-users/attachments/20180425/00373215/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: test2.log.gz
Type: application/gzip
Size: 2110 bytes
Desc: not available
URL: <http://lists.linuxcontainers.org/pipermail/lxc-users/attachments/20180425/00373215/attachment.gz>


More information about the lxc-users mailing list