← Back to team overview

touch-packages team mailing list archive

[Bug 1452601] Re: vivid container's networking.service fails on boot with signal=PIPE

 

Thanks.

kevin@awabi:~$ sudo lxc-start -n escale_build -F -l trace -o /dev/stdout
      lxc-start 1446650865.960 INFO     lxc_start_ui - lxc_start.c:main:264 - using rcfile /var/lib/lxc/escale_build/config
      lxc-start 1446650865.961 WARN     lxc_confile - confile.c:config_pivotdir:1801 - lxc.pivotdir is ignored.  It will soon become an error.
      lxc-start 1446650865.961 WARN     lxc_cgmanager - cgmanager.c:cgm_get:993 - do_cgm_get exited with error
      lxc-start 1446650865.961 INFO     lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .reject_force_umount  # comment this to allow umount -f;  not recommended.
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for reject_force_umount action 0
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts

      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for reject_force_umount action 0
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts

      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .[all].
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .kexec_load errno 1.
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for kexec_load action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for kexec_load action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .open_by_handle_at errno 1.
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for open_by_handle_at action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for open_by_handle_at action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .init_module errno 1.
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for init_module action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for init_module action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .finit_module errno 1.
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for finit_module action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for finit_module action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .delete_module errno 1.
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for delete_module action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for delete_module action 327681
      lxc-start 1446650865.961 INFO     lxc_seccomp - seccomp.c:parse_config_v2:436 - Merging in the compat seccomp ctx into the main one
      lxc-start 1446650865.962 DEBUG    lxc_start - start.c:setup_signal_fd:262 - sigchild handler set
      lxc-start 1446650865.962 DEBUG    lxc_console - console.c:lxc_console_peer_default:500 - opening /dev/tty for console peer
      lxc-start 1446650865.962 DEBUG    lxc_console - console.c:lxc_console_peer_default:506 - using '/dev/tty' as console
      lxc-start 1446650865.962 DEBUG    lxc_console - console.c:lxc_console_sigwinch_init:179 - 12835 got SIGWINCH fd 9
      lxc-start 1446650865.962 DEBUG    lxc_console - console.c:lxc_console_winsz:88 - set winsz dstfd:6 cols:80 rows:24
      lxc-start 1446650865.962 INFO     lxc_start - start.c:lxc_init:454 - 'escale_build' is initialized
      lxc-start 1446650865.963 DEBUG    lxc_start - start.c:__lxc_start:1145 - Not dropping cap_sys_boot or watching utmp
      lxc-start 1446650865.968 ERROR    lxc_conf - conf.c:instantiate_veth:2621 - failed to attach 'vethIY9I09' to the bridge 'lxcbr0': Operation not permitted
lxc-start: conf.c: instantiate_veth: 2621 failed to attach 'vethIY9I09' to the bridge 'lxcbr0': Operation not permitted
      lxc-start 1446650865.998 ERROR    lxc_conf - conf.c:lxc_create_network:2904 - failed to create netdev
lxc-start: conf.c: lxc_create_network: 2904 failed to create netdev
      lxc-start 1446650865.998 ERROR    lxc_start - start.c:lxc_spawn:920 - failed to create the network
lxc-start: start.c: lxc_spawn: 920 failed to create the network
      lxc-start 1446650865.998 ERROR    lxc_start - start.c:__lxc_start:1172 - failed to spawn 'escale_build'
lxc-start: start.c: __lxc_start: 1172 failed to spawn 'escale_build'
      lxc-start 1446650865.998 ERROR    lxc_start_ui - lxc_start.c:main:344 - The container failed to start.
lxc-start: lxc_start.c: main: 344 The container failed to start.
      lxc-start 1446650865.998 ERROR    lxc_start_ui - lxc_start.c:main:348 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start: lxc_start.c: main: 348 Additional information can be obtained by setting the --logfile and --logpriority options.
kevin@awabi:~$

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1452601

Title:
  vivid container's networking.service fails on boot with signal=PIPE

Status in lxc package in Ubuntu:
  Confirmed

Bug description:
  When starting a Vivid container, it fails to get an IP address.  It
  believes networking.service was successful, but actually it dies with
  SIGPIPE.  Restarting networking.service gets an IP, as expected.

  Starting networking used to work with pre-vivid containers.  I'm
  reasonably sure this fails 100% of the time.  Limited user container,
  very standard setup (no unnecessary config; cgmanager and lxcfs
  installed), btrfs filesystem but not btrfs-backed (as it's limited
  user), ...

  root@vivid:/# systemctl status networking.service
  ● networking.service - LSB: Raise network interfaces.
     Loaded: loaded (/etc/init.d/networking)
    Drop-In: /run/systemd/generator/networking.service.d
             └─50-insserv.conf-$network.conf
          /lib/systemd/system/networking.service.d
             └─systemd.conf
     Active: active (exited) since Thu 2015-05-07 07:54:48 UTC; 9s ago
       Docs: man:systemd-sysv-generator(8)
    Process: 459 ExecStart=/etc/init.d/networking start (code=killed, signal=PIPE)

  
  root@vivid:/# systemctl restart networking.service
  root@vivid:/# systemctl status networking.service
  ● networking.service - LSB: Raise network interfaces.
     Loaded: loaded (/etc/init.d/networking)
    Drop-In: /run/systemd/generator/networking.service.d
             └─50-insserv.conf-$network.conf
          /lib/systemd/system/networking.service.d
             └─systemd.conf
     Active: active (running) since Thu 2015-05-07 07:56:38 UTC; 2s ago
       Docs: man:systemd-sysv-generator(8)
    Process: 992 ExecStop=/etc/init.d/networking stop (code=exited, status=0/SUCCESS)
    Process: 1033 ExecStart=/etc/init.d/networking start (code=exited, status=0/SUCCESS)
     CGroup: /user.slice/user-1000.slice/session-c2.scope/lxc/vivid/system.slice/networking.service
             ├─1096 dhclient -1 -v -pf /run/dhclient.eth0.pid -lf /var/lib/dhcp/dhclient.eth0.leases eth0
             ├─1106 /bin/sh /etc/network/if-up.d/ntpdate
             ├─1109 lockfile-touch /var/lock/ntpdate-ifup
             ├─1125 /bin/sh /etc/network/if-up.d/ntpdate
             ├─1128 lockfile-create /var/lock/ntpdate-ifup
             └─1146 /usr/sbin/ntpdate -s ntp.ubuntu.com

  root@vivid:/# ip a
  ...
  22: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
  ...
      inet 10.0.3.102/24 brd 10.0.3.255 scope global eth0

  ProblemType: Bug
  DistroRelease: Ubuntu 15.04
  Package: lxc 1.1.2-0ubuntu3
  ProcVersionSignature: Ubuntu 3.19.0-16.16-generic 3.19.3
  Uname: Linux 3.19.0-16-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 2.17.2-0ubuntu1
  Architecture: amd64
  Date: Thu May  7 08:53:02 2015
  SourcePackage: lxc
  UpgradeStatus: No upgrade log present (probably fresh install)
  defaults.conf:
   lxc.network.type = veth
   lxc.network.link = lxcbr0
   lxc.network.flags = up
   lxc.network.hwaddr = 00:16:3e:xx:xx:xx

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1452601/+subscriptions


References