[Bug 1452601] Re: vivid container's networking.service fails on boot with signal=PIPE
Kevin Dalley
1452601 at bugs.launchpad.net
Wed Nov 4 15:37:42 UTC 2015
Thanks.
kevin at awabi:~$ sudo lxc-start -n escale_build -F -l trace -o /dev/stdout
lxc-start 1446650865.960 INFO lxc_start_ui - lxc_start.c:main:264 - using rcfile /var/lib/lxc/escale_build/config
lxc-start 1446650865.961 WARN lxc_confile - confile.c:config_pivotdir:1801 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 1446650865.961 WARN lxc_cgmanager - cgmanager.c:cgm_get:993 - do_cgm_get exited with error
lxc-start 1446650865.961 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for reject_force_umount action 0
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for reject_force_umount action 0
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .[all].
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .kexec_load errno 1.
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for kexec_load action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for kexec_load action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .open_by_handle_at errno 1.
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for open_by_handle_at action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for open_by_handle_at action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .init_module errno 1.
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for init_module action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for init_module action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .finit_module errno 1.
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for finit_module action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for finit_module action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .delete_module errno 1.
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for delete_module action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for delete_module action 327681
lxc-start 1446650865.961 INFO lxc_seccomp - seccomp.c:parse_config_v2:436 - Merging in the compat seccomp ctx into the main one
lxc-start 1446650865.962 DEBUG lxc_start - start.c:setup_signal_fd:262 - sigchild handler set
lxc-start 1446650865.962 DEBUG lxc_console - console.c:lxc_console_peer_default:500 - opening /dev/tty for console peer
lxc-start 1446650865.962 DEBUG lxc_console - console.c:lxc_console_peer_default:506 - using '/dev/tty' as console
lxc-start 1446650865.962 DEBUG lxc_console - console.c:lxc_console_sigwinch_init:179 - 12835 got SIGWINCH fd 9
lxc-start 1446650865.962 DEBUG lxc_console - console.c:lxc_console_winsz:88 - set winsz dstfd:6 cols:80 rows:24
lxc-start 1446650865.962 INFO lxc_start - start.c:lxc_init:454 - 'escale_build' is initialized
lxc-start 1446650865.963 DEBUG lxc_start - start.c:__lxc_start:1145 - Not dropping cap_sys_boot or watching utmp
lxc-start 1446650865.968 ERROR lxc_conf - conf.c:instantiate_veth:2621 - failed to attach 'vethIY9I09' to the bridge 'lxcbr0': Operation not permitted
lxc-start: conf.c: instantiate_veth: 2621 failed to attach 'vethIY9I09' to the bridge 'lxcbr0': Operation not permitted
lxc-start 1446650865.998 ERROR lxc_conf - conf.c:lxc_create_network:2904 - failed to create netdev
lxc-start: conf.c: lxc_create_network: 2904 failed to create netdev
lxc-start 1446650865.998 ERROR lxc_start - start.c:lxc_spawn:920 - failed to create the network
lxc-start: start.c: lxc_spawn: 920 failed to create the network
lxc-start 1446650865.998 ERROR lxc_start - start.c:__lxc_start:1172 - failed to spawn 'escale_build'
lxc-start: start.c: __lxc_start: 1172 failed to spawn 'escale_build'
lxc-start 1446650865.998 ERROR lxc_start_ui - lxc_start.c:main:344 - The container failed to start.
lxc-start: lxc_start.c: main: 344 The container failed to start.
lxc-start 1446650865.998 ERROR lxc_start_ui - lxc_start.c:main:348 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start: lxc_start.c: main: 348 Additional information can be obtained by setting the --logfile and --logpriority options.
kevin at awabi:~$
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1452601
Title:
vivid container's networking.service fails on boot with signal=PIPE
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1452601/+subscriptions
More information about the Ubuntu-server-bugs
mailing list