[lxc-users] Error on upgrade to lxc-3.0.0 and integration with openvswitch

Geaaru geaaru at gmail.com
Wed Apr 25 18:04:07 UTC 2018


I don't know what happens but now on init phase it's used driver
cgroupfs-ns and not cgroupfs:
I don't understand why but it seems that I passed from cgroupfs to
cgroupfs-ng. One of the thing that I do and add permission to all under
/sys/fs/cgroups but currently lxc containers are started by root so I
don't understand well what happens.Another thing that I do and use lxc-
start from master with some changes related with printf/debug stuff. I
don't know if there is some fix on master that has bootstrap correctly
unified.
I will investigate on it and I will send a feedback.
Thanks.G.
On Wed, 2018-04-25 at 17:44 +0200, Geaaru wrote:
> Hi Guido,
> you can find ebuild to my overlay: https://github.com/geaaru/geaaru_o
> verlay
> where I have already a patched sys-fs/lxcfs with my changes in pr to
> lxcfs project that fix startup of service on gentoo where is present
> .keep* file under /var/lib/lxcfs/ and add use of nonempty option for
> fuse.
> About your log I don't. I used lxc-3.0.0 tag from github with my
> overlay, do you use gentoo upstream release maybe ?
> However, currently I trying to add debug info and I confirm that on
> cgroup_init I use cgroupfs.
> Initialized cgroup driver cgroupfs
> but I see a lot of errors that I post in attached file.
> G.
> 
> On Wed, 2018-04-25 at 06:43 +0000, Jäkel, Guido wrote:
> > Dear G.,
> > 
> > may you provide you the ebuild for V3 or point me to a source? Me
> > and others are interested in, see https://bugs.gentoo.org/652582
> > 
> > 
> > Your lxc-start fail at
> > 
> >         if (!cgroup_init(handler)) {
> >                 ERROR("Failed initializing cgroup support");
> >                 goto out_delete_net;
> >         }
> > 
> > which call
> > 
> > bool cgroup_init(struct lxc_handler *handler)
> > {
> >         if (handler->cgroup_data) {
> >                 ERROR("cgroup_init called on already initialized
> > handler");
> >                 return true;
> >         }
> > 
> >         if (ops) {
> >                 INFO("cgroup driver %s initing for %s", ops-
> > >driver, handler->name);
> >                 handler->cgroup_data = ops->init(handler);
> >         }
> > 
> >         return handler->cgroup_data != NULL;
> > }
> > 
> > 
> > But I don't notice any line like
> > 
> > INFO     lxc_cgroup - cgroups/cgroup.c:cgroup_init:67 - cgroup
> > driver cgroupfs initing for $CONTAINER
> > 
> > in your log.
> > 
> > 
> > Maybe it's something related to  lxc.cgroup.use  or
> > lxc.cgroup2.use  and  https://github.com/lxc/lxc/issues/2084  is
> > helpful.
> > 
> > 
> > 
> > 
> > Guido
> > 
> > 
> > > -----Original Message-----
> > > From: lxc-users [mailto:lxc-users-bounces at lists.linuxcontainers.o
> > > rg] On Behalf Of Geaaru
> > > Sent: Wednesday, April 25, 2018 8:05 AM
> > > To: LXC User ML <lxc-users at lists.linuxcontainers.org>
> > > Subject: [lxc-users] Error on upgrade to lxc-3.0.0 and
> > > integration with openvswitch
> > > 
> > > Hi,
> > > 
> > > I just now upgrade to lxc-3.0.0 on gentoo/sabayon environment but
> > > I found probably an issue.
> > > 
> > > But before push detail about issue I have a question:
> > > 
> > > 1) is there a minimal systemd version required with lxc+cgroupv2
> > > ? (currently I use systemd-233)
> > > 
> > > Hereinafter logging of lxc-start command:
> > > 
> > > lxc-start test2 20180424231851.547 INFO     lxc_lsm -
> > > lsm/lsm.c:lsm_init:46 - LSM security driver nop
> > > lxc-start test2 20180424231851.548 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing:
> > > .reject_force_umount  #
> > > comment this to allow umount -f;  not recommended
> > > lxc-start test2 20180424231851.548 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:761 - Adding native rule for
> > > reject_force_umount  # comment this to allow umount -f;  not
> > > recommended action 0(kill)
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to
> > > reject
> > > force umounts
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > > reject_force_umount action 0(kill)
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to
> > > reject
> > > force umounts
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to
> > > reject
> > > force umounts
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing: .[all]
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing: .kexec_load errno 1
> > > lxc-start test2 20180424231851.549 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:761 - Adding native rule for kexec_load
> > > errno 1 action 327681(errno)
> > > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:765 - Adding compat rule for kexec_load
> > > action 327681(errno)
> > > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing: .open_by_handle_at
> > > errno 1
> > > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:761 - Adding native rule for
> > > open_by_handle_at errno 1 action 327681(errno)
> > > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > > open_by_handle_at action 327681(errno)
> > > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing: .init_module errno 1
> > > lxc-start test2 20180424231851.550 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:761 - Adding native rule for
> > > init_module
> > > errno 1 action 327681(errno)
> > > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > > init_module
> > > action 327681(errno)
> > > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing: .finit_module errno 1
> > > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:761 - Adding native rule for
> > > finit_module
> > > errno 1 action 327681(errno)
> > > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > > finit_module
> > > action 327681(errno)
> > > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:585 - processing: .delete_module errno
> > > 1
> > > lxc-start test2 20180424231851.551 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:761 - Adding native rule for
> > > delete_module
> > > errno 1 action 327681(errno)
> > > lxc-start test2 20180424231851.552 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:765 - Adding compat rule for
> > > delete_module
> > > action 327681(errno)
> > > lxc-start test2 20180424231851.552 INFO     lxc_seccomp -
> > > seccomp.c:parse_config_v2:775 - Merging in the compat Seccomp ctx
> > > into
> > > the main one
> > > lxc-start test2 20180424231851.557 DEBUG    terminal -
> > > terminal.c:lxc_terminal_peer_default:701 - Using terminal
> > > "/dev/tty" as
> > > proxy
> > > lxc-start test2 20180424231851.557 DEBUG    terminal -
> > > terminal.c:lxc_terminal_signal_init:188 - Created signal fd 9
> > > lxc-start test2 20180424231851.557 DEBUG    terminal -
> > > terminal.c:lxc_terminal_winsz:85 - Set window size to 180 columns
> > > and 58
> > > rows
> > > lxc-start test2 20180424231851.557 INFO     lxc_start -
> > > start.c:lxc_init:846 - Container "test2" is initialized
> > > lxc-start test2 20180424231851.568 INFO     lxc_network -
> > > network.c:instantiate_veth:171 - Retrieved mtu 1500 from lxdbr0
> > > lxc-start test2 20180424231851.996 INFO     lxc_network -
> > > network.c:instantiate_veth:197 - Attached "vethKA1HTT" to bridge
> > > "lxdbr0"
> > > lxc-start test2 20180424231851.998 DEBUG    lxc_network -
> > > network.c:instantiate_veth:222 - Instantiated veth
> > > "vethKA1HTT/vethYPDFUX", index is "24"
> > > lxc-start test2 20180424231851.999 ERROR    lxc_start -
> > > start.c:lxc_spawn:1553 - Failed initializing cgroup support
> > > lxc-start test2 20180424231851.109 INFO     lxc_network -
> > > network.c:lxc_delete_network_priv:2573 - Removed interface
> > > "(null)"
> > > with index 24
> > > lxc-start test2 20180424231851.113 WARN     lxc_network -
> > > network.c:lxc_delete_network_priv:2591 - Failed to remove
> > > interface
> > > "vethKA1HTT" from "lxdbr0": Invalid argument
> > > lxc-start test2 20180424231851.113 DEBUG    lxc_network -
> > > network.c:lxc_delete_network:3151 - Deleted network devices
> > > lxc-start test2 20180424231851.113 ERROR    lxc_start -
> > > start.c:__lxc_start:1866 - Failed to spawn container "test2"
> > > lxc-start test2 20180424231851.113 INFO     lxc_conf -
> > > conf.c:run_script_argv:368 - Executing script
> > > "/usr/share/lxcfs/lxc.reboot.hook" for container "test2", config
> > > section "lxc"
> > > 
> > > From log you can see that interface attached and configured on
> > > openvswitch fail remove after that an error is received.
> > > 
> > > I open an issue about this or it's an already know issue ?
> > > 
> > > What means "ERROR    lxc_start - start.c:lxc_spawn:1553 - Failed
> > > initializing cgroup support" ? Can anyone direct me about where
> > > is problem on bootstrap LXC container after upgrade to LXC-3.0.0
> > > ?
> > > 
> > > 
> > > Some debug informations:
> > > 
> > > # cat /proc/self/cgroup
> > > 12:debug:/
> > > 11:cpuset:/
> > > 10:net_cls,net_prio:/
> > > 9:perf_event:/
> > > 8:blkio:/
> > > 7:pids:/user.slice/user-1000.slice/session-1.scope
> > > 6:cpu,cpuacct:/
> > > 5:devices:/user.slice
> > > 4:rdma:/
> > > 3:memory:/
> > > 2:freezer:/
> > > 1:name=systemd:/user.slice/user-1000.slice/session-1.scope
> > > 
> > > # ls /sys/fs/cgroup/
> > > blkio  cpu  cpuacct  cpu,cpuacct  cpuset  debug  devices  freezer
> > >   memory  net_cls  net_cls,net_prio  net_prio  perf_event  pids
> > > rdma  systemd  unified
> > > 
> > > 
> > > Thanks in advance
> > > 
> > > G.
> > 
> > _______________________________________________
> > lxc-users mailing list
> > lxc-users at lists.linuxcontainers.org
> > http://lists.linuxcontainers.org/listinfo/lxc-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxcontainers.org/pipermail/lxc-users/attachments/20180425/72f3bde2/attachment-0001.html>


More information about the lxc-users mailing list