You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The template below is mostly useful for bug reports and support questions.
Feel free to remove anything which doesn't apply to you and add more information where it makes sense.
Required information
Distribution: Devuan
Distribution version: ceres
The output of
lxc-start --version: 5.0.3
lxc-checkconfig
LXC version 5.0.3
Kernel configuration not found at /proc/config.gz; searching...
Kernel configuration found at /boot/config-6.4.0-2-amd64
--- Namespaces ---
Namespaces: enabled
Utsname namespace: enabled
Ipc namespace: enabled
Pid namespace: enabled
User namespace: enabled
newuidmap is not installed
newgidmap is not installed
Network namespace: enabled
--- Control groups ---
Cgroups: enabled
Cgroup namespace: enabled
Cgroup v1 mount points:
Cgroup v2 mount points:
- /sys/fs/cgroup
Cgroup device: enabled
Cgroup sched: enabled
Cgroup cpu account: enabled
Cgroup memory controller: enabled
Cgroup cpuset: enabled
--- Misc ---
Veth pair device: enabled, loaded
Macvlan: enabled, not loaded
Vlan: enabled, not loaded
Bridges: enabled, loaded
Advanced netfilter: enabled, loaded
CONFIG_IP_NF_TARGET_MASQUERADE: enabled, not loaded
CONFIG_IP6_NF_TARGET_MASQUERADE: enabled, not loaded
CONFIG_NETFILTER_XT_TARGET_CHECKSUM: enabled, not loaded
CONFIG_NETFILTER_XT_MATCH_COMMENT: enabled, loaded
FUSE (for use with lxcfs): enabled, loaded
--- Checkpoint/Restore ---
checkpoint restore: enabled
CONFIG_FHANDLE: enabled
CONFIG_EVENTFD: enabled
CONFIG_EPOLL: enabled
CONFIG_UNIX_DIAG: enabled
CONFIG_INET_DIAG: enabled
CONFIG_PACKET_DIAG: enabled
CONFIG_NETLINK_DIAG: enabled
File capabilities: enabled
Note : Before booting a new kernel, you can check its configuration
usage : CONFIG=/path/to/config /bin/lxc-checkconfig
I created a guest with an ipvlan network interface.
It can be started exactly once; subsequent startup attempts fail with:
lxc-start training 20231109080334.643 ERROR network - ../src/lxc/network.c:lxc_setup_l2proxy:3289 - File exists - Failed to add ipv4 dest "192.168.0.1" for network device "lo"
This is caused by the following routing entry being left intact on guest stop:
192.168.0.1 dev lo scope link
If I remove the route manually before the 2nd startup attempt, the guest starts correctly again.
(Incidentally, this route is wrong for my use-case because I want the guest and the host to be able to communicate with each other, so I have an ipvlan subinterface in the host namespace that's in the same subnet as the guest interface, and the route is supposed to point out through that. I guess I'll have to supply my own .script.{up,down} and lose l2proxy, but it would be better if this were configurable. I also think failing to add a route that already exists shouldn't be considered a fatal error.)
Steps to reproduce
start a guest with something like this in its config:
container log (The file from running lxc-start -n <c> -l TRACE -o <logfile> )
lxc-start training 20231109080647.499 TRACE commands - ../src/lxc/commands.c:lxc_cmd:514 - Connection refused - Command "get_init_pid" failed to connect command socket
lxc-start training 20231109080647.500 TRACE commands - ../src/lxc/commands.c:lxc_cmd:514 - Connection refused - Command "get_state" failed to connect command socket
lxc-start training 20231109080647.500 TRACE start - ../src/lxc/start.c:lxc_init_handler:738 - Created anonymous pair {4,5} of unix sockets
lxc-start training 20231109080647.500 TRACE commands - ../src/lxc/commands.c:lxc_server_init:2121 - Created abstract unix socket "/var/lib/lxc/training/command"
lxc-start training 20231109080647.500 TRACE start - ../src/lxc/start.c:lxc_init_handler:754 - Unix domain socket 6 for command server is ready
lxc-start training 20231109080647.500 INFO lxccontainer - ../src/lxc/lxccontainer.c:do_lxcapi_start:998 - Set process title to [lxc monitor] /var/lib/lxc training
lxc-start training 20231109080647.501 DEBUG lxccontainer - ../src/lxc/lxccontainer.c:wait_on_daemonized_start:859 - First child 9537 exited
lxc-start training 20231109080647.501 TRACE start - ../src/lxc/start.c:lxc_start:2221 - Doing lxc_start
lxc-start training 20231109080647.501 INFO lsm - ../src/lxc/lsm/lsm.c:lsm_init_static:38 - Initialized LSM security driver AppArmor
lxc-start training 20231109080647.501 TRACE start - ../src/lxc/start.c:lxc_init:778 - Initialized LSM
lxc-start training 20231109080647.501 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:483 - Set container state to STARTING
lxc-start training 20231109080647.501 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:486 - No state clients registered
lxc-start training 20231109080647.501 TRACE start - ../src/lxc/start.c:lxc_init:784 - Set container state to "STARTING"
lxc-start training 20231109080647.502 TRACE start - ../src/lxc/start.c:lxc_init:840 - Set environment variables
lxc-start training 20231109080647.502 TRACE start - ../src/lxc/start.c:lxc_init:845 - Ran pre-start hooks
lxc-start training 20231109080647.502 TRACE start - ../src/lxc/start.c:setup_signal_fd:370 - Created signal file descriptor 8
lxc-start training 20231109080647.502 TRACE start - ../src/lxc/start.c:lxc_init:858 - Set up signal fd
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:unpriv_systemd_create_scope:1292 - unpriv_systemd_create_scope: no systemd support
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:463 - Adding cgroup hierarchy mounted at and base cgroup (null)
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the cpuset controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the cpu controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the io controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the memory controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the hugetlb controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the pids controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the rdma controller
lxc-start training 20231109080647.502 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_hierarchy_add:466 - The hierarchy contains the misc controller
lxc-start training 20231109080647.502 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_program_load_kernel:335 - Loaded bpf program: func#0 @0
0: R1=ctx(off=0,imm=0) R10=fp0
0: (61) r2 = *(u32 *)(r1 +0) ; R1=ctx(off=0,imm=0) R2_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff))
1: (54) w2 &= 65535 ; R2_w=scalar(umax=65535,var_off=(0x0; 0xffff))
2: (61) r3 = *(u32 *)(r1 +0) ; R1=ctx(off=0,imm=0) R3_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff))
3: (74) w3 >>= 16 ; R3_w=scalar(umax=65535,var_off=(0x0; 0xffff))
4: (61) r4 = *(u32 *)(r1 +4) ; R1=ctx(off=0,imm=0) R4_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff))
5: (61) r5 = *(u32 *)(r1 +8) ; R1=ctx(off=0,imm=0) R5_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff))
6: (b7) r0 = 1 ; R0_w=1
7: (95) exit
processed 8 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
lxc-start training 20231109080647.502 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_devices_cgroup_supported:553 - The bpf device cgroup is supported
lxc-start training 20231109080647.502 TRACE cgroup - ../src/lxc/cgroups/cgroup.c:cgroup_init:41 - Initialized cgroup driver cgfsng
lxc-start training 20231109080647.502 TRACE cgroup - ../src/lxc/cgroups/cgroup.c:cgroup_init:48 - Unified cgroup layout
lxc-start training 20231109080647.502 TRACE start - ../src/lxc/start.c:lxc_init:865 - Initialized cgroup driver
lxc-start training 20231109080647.502 DEBUG seccomp - ../src/lxc/seccomp.c:parse_config_v2:656 - Host native arch is [3221225534]
lxc-start training 20231109080647.502 TRACE seccomp - ../src/lxc/seccomp.c:get_new_ctx:470 - Added arch 2 to main seccomp context
lxc-start training 20231109080647.502 TRACE seccomp - ../src/lxc/seccomp.c:get_new_ctx:478 - Removed native arch from main seccomp context
lxc-start training 20231109080647.502 TRACE seccomp - ../src/lxc/seccomp.c:get_new_ctx:470 - Added arch 3 to main seccomp context
lxc-start training 20231109080647.503 TRACE seccomp - ../src/lxc/seccomp.c:get_new_ctx:478 - Removed native arch from main seccomp context
lxc-start training 20231109080647.503 TRACE seccomp - ../src/lxc/seccomp.c:get_new_ctx:483 - Arch 4 already present in main seccomp context
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "reject_force_umount # comment this to allow umount -f; not recommended"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "[all]"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "kexec_load errno 1"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[246:kexec_load] action[327681:errno] arch[0]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[246:kexec_load] action[327681:errno] arch[1073741827]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[246:kexec_load] action[327681:errno] arch[1073741886]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "open_by_handle_at errno 1"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[304:open_by_handle_at] action[327681:errno] arch[0]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[304:open_by_handle_at] action[327681:errno] arch[1073741827]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[304:open_by_handle_at] action[327681:errno] arch[1073741886]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "init_module errno 1"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[175:init_module] action[327681:errno] arch[0]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[175:init_module] action[327681:errno] arch[1073741827]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[175:init_module] action[327681:errno] arch[1073741886]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "finit_module errno 1"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[313:finit_module] action[327681:errno] arch[0]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[313:finit_module] action[327681:errno] arch[1073741827]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[313:finit_module] action[327681:errno] arch[1073741886]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:807 - Processing "delete_module errno 1"
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[176:delete_module] action[327681:errno] arch[0]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[176:delete_module] action[327681:errno] arch[1073741827]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[176:delete_module] action[327681:errno] arch[1073741886]
lxc-start training 20231109080647.503 INFO seccomp - ../src/lxc/seccomp.c:parse_config_v2:1017 - Merging compat seccomp contexts into main context
lxc-start training 20231109080647.503 TRACE seccomp - ../src/lxc/seccomp.c:parse_config_v2:1027 - Merged first compat seccomp context into main context
lxc-start training 20231109080647.503 TRACE seccomp - ../src/lxc/seccomp.c:parse_config_v2:1043 - Merged second compat seccomp context into main context
lxc-start training 20231109080647.503 TRACE start - ../src/lxc/start.c:lxc_init:872 - Read seccomp policy
lxc-start training 20231109080647.663 TRACE start - ../src/lxc/start.c:lxc_init:879 - Initialized LSM
lxc-start training 20231109080647.663 INFO start - ../src/lxc/start.c:lxc_init:881 - Container "training" is initialized
lxc-start training 20231109080647.680 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgroup_tree_create:727 - Created 10(lxc.monitor.training) cgroup
lxc-start training 20231109080647.680 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgroup_tree_create:742 - Opened newly created cgroup lxc.monitor.training as 11
lxc-start training 20231109080647.680 INFO cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_monitor_create:1391 - The monitor process uses "lxc.monitor.training" as cgroup
lxc-start training 20231109080647.680 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgfsng_delegate_controllers:3343 - Enabled "+cpuset +cpu +io +memory +hugetlb +pids +rdma +misc" controllers in the unified cgroup 10
lxc-start training 20231109080647.712 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_monitor_enter:1541 - Moved monitor (9538) into cgroup 11
lxc-start training 20231109080647.712 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_monitor_enter:1555 - Moved transient process into cgroup 11
lxc-start training 20231109080647.712 DEBUG storage - ../src/lxc/storage/storage.c:get_storage_by_name:209 - Detected rootfs type "dir"
lxc-start training 20231109080647.712 TRACE conf - ../src/lxc/conf.c:lxc_rootfs_init:588 - Pinned rootfs 13(.lxc_keep)
lxc-start training 20231109080647.712 TRACE conf - ../src/lxc/conf.c:lxc_rootfs_init:604 - Unlinked pinned file 12(.lxc_keep)
lxc-start training 20231109080647.713 TRACE sync - ../src/lxc/sync.c:lxc_sync_init:139 - Initialized synchronization infrastructure
lxc-start training 20231109080647.713 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgroup_tree_create:727 - Created 10(lxc.payload.training) cgroup
lxc-start training 20231109080647.713 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgroup_tree_create:742 - Opened newly created cgroup lxc.payload.training as 17
lxc-start training 20231109080647.713 INFO cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_payload_create:1499 - The container process uses "lxc.payload.training" as inner and "lxc.payload.training" as limit cgroup
lxc-start training 20231109080647.714 TRACE start - ../src/lxc/start.c:lxc_spawn:1702 - Spawned container directly into target cgroup via cgroup2 fd 17
lxc-start training 20231109080647.714 TRACE start - ../src/lxc/start.c:lxc_spawn:1742 - Cloned child process 9543
lxc-start training 20231109080647.714 TRACE start - ../src/lxc/start.c:core_scheduling:1560 - No new core scheduling domain requested
lxc-start training 20231109080647.714 TRACE utils - ../src/lxc/utils.c:lxc_can_use_pidfd:1821 - Kernel supports pidfds
lxc-start training 20231109080647.714 INFO start - ../src/lxc/start.c:lxc_spawn:1762 - Cloned CLONE_NEWNS
lxc-start training 20231109080647.714 INFO start - ../src/lxc/start.c:lxc_spawn:1762 - Cloned CLONE_NEWPID
lxc-start training 20231109080647.714 INFO start - ../src/lxc/start.c:lxc_spawn:1762 - Cloned CLONE_NEWUTS
lxc-start training 20231109080647.714 INFO start - ../src/lxc/start.c:lxc_spawn:1762 - Cloned CLONE_NEWIPC
lxc-start training 20231109080647.714 INFO start - ../src/lxc/start.c:lxc_spawn:1762 - Cloned CLONE_NEWNET
lxc-start training 20231109080647.714 INFO start - ../src/lxc/start.c:lxc_spawn:1762 - Cloned CLONE_NEWCGROUP
lxc-start training 20231109080647.714 TRACE start - ../src/lxc/start.c:lxc_spawn:1702 - Spawned container directly into target cgroup via cgroup2 fd 17
lxc-start training 20231109080647.714 DEBUG start - ../src/lxc/start.c:lxc_try_preserve_namespace:139 - Preserved mnt namespace via fd 19 and stashed path as mnt:/proc/9538/fd/19
lxc-start training 20231109080647.714 DEBUG start - ../src/lxc/start.c:lxc_try_preserve_namespace:139 - Preserved pid namespace via fd 20 and stashed path as pid:/proc/9538/fd/20
lxc-start training 20231109080647.714 DEBUG start - ../src/lxc/start.c:lxc_try_preserve_namespace:139 - Preserved uts namespace via fd 21 and stashed path as uts:/proc/9538/fd/21
lxc-start training 20231109080647.714 DEBUG start - ../src/lxc/start.c:lxc_try_preserve_namespace:139 - Preserved ipc namespace via fd 22 and stashed path as ipc:/proc/9538/fd/22
lxc-start training 20231109080647.714 DEBUG start - ../src/lxc/start.c:lxc_try_preserve_namespace:139 - Preserved net namespace via fd 23 and stashed path as net:/proc/9538/fd/23
lxc-start training 20231109080647.714 DEBUG start - ../src/lxc/start.c:lxc_try_preserve_namespace:139 - Preserved cgroup namespace via fd 24 and stashed path as cgroup:/proc/9538/fd/24
lxc-start training 20231109080647.714 WARN cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits_legacy:3155 - Invalid argument - Ignoring legacy cgroup limits on pure cgroup2 system
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgfsng_delegate_controllers:3343 - Enabled "+cpuset +cpu +io +memory +hugetlb +pids +rdma +misc" controllers in the unified cgroup 10
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:470 - Device cgroup will block ("allowlist") all devices by default
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:475 - Resetting cgroup device list
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.deny" to "a"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major -1, minor -1, access m, allow 1
lxc-start training 20231109080647.715 TRACE sync - ../src/lxc/sync.c:lxc_sync_wait_parent:110 - Child waiting for parent with sequence startup
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c *:* m"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type b, major -1, minor -1, access m, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "b *:* m"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 1, minor 3, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 1:3 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 1, minor 5, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 1:5 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 1, minor 7, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 1:7 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 5, minor 0, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 5:0 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 5, minor 1, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 5:1 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 5, minor 2, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 5:2 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 1, minor 8, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 1:8 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 1, minor 9, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 1:9 rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 136, minor -1, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 136:* rwm"
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:479 - Processing new device rule: type c, major 10, minor 229, access rwm, allow 1
lxc-start training 20231109080647.715 TRACE cgroup2_devices - ../src/lxc/cgroups/cgroup2_devices.c:bpf_list_add_device:516 - Added new device rule
lxc-start training 20231109080647.715 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3248 - Set "devices.allow" to "c 10:229 rwm"
lxc-start training 20231109080647.715 INFO cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_setup_limits:3251 - Limits for the unified cgroup hierarchy have been setup
lxc-start training 20231109080647.715 TRACE sync - ../src/lxc/sync.c:lxc_sync_barrier_child:97 - Parent waking child with sequence startup and waiting with sequence configure
lxc-start training 20231109080647.715 TRACE sync - ../src/lxc/sync.c:lxc_sync_wake_parent:104 - Child waking parent with sequence configure
lxc-start training 20231109080647.715 TRACE sync - ../src/lxc/sync.c:lxc_sync_wait_parent:110 - Child waiting for parent with sequence post-configure
lxc-start training 20231109080647.715 TRACE start - ../src/lxc/start.c:lxc_spawn:1834 - Allocated new network namespace id
lxc-start training 20231109080647.715 ERROR network - ../src/lxc/network.c:lxc_setup_l2proxy:3289 - File exists - Failed to add ipv4 dest "192.168.0.1" for network device "lo"
lxc-start training 20231109080647.716 ERROR network - ../src/lxc/network.c:lxc_create_network_priv:3423 - File exists - Failed to setup l2proxy
lxc-start training 20231109080647.716 ERROR start - ../src/lxc/start.c:lxc_spawn:1840 - Failed to create the network
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_MNT_NS=/proc/9538/fd/19
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_PID_NS=/proc/9538/fd/20
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_UTS_NS=/proc/9538/fd/21
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_IPC_NS=/proc/9538/fd/22
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_NET_NS=/proc/9538/fd/23
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_CGROUP_NS=/proc/9538/fd/24
lxc-start training 20231109080647.716 DEBUG network - ../src/lxc/network.c:lxc_delete_network:4173 - Deleted network devices
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_socket_pair:544 - Sent container state "ABORTING" to 5
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:483 - Set container state to ABORTING
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:486 - No state clients registered
lxc-start training 20231109080647.716 ERROR lxccontainer - ../src/lxc/lxccontainer.c:wait_on_daemonized_start:878 - Received container state "ABORTING" instead of "RUNNING"
lxc-start training 20231109080647.716 ERROR lxc_start - ../src/lxc/tools/lxc_start.c:main:306 - The container failed to start
lxc-start training 20231109080647.716 ERROR lxc_start - ../src/lxc/tools/lxc_start.c:main:309 - To get more details, run the container in foreground mode
lxc-start training 20231109080647.716 ERROR lxc_start - ../src/lxc/tools/lxc_start.c:main:311 - Additional information can be obtained by setting the --logfile and --logpriority options
lxc-start training 20231109080647.716 ERROR start - ../src/lxc/start.c:__lxc_start:2107 - Failed to spawn container "training"
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:483 - Set container state to ABORTING
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:486 - No state clients registered
lxc-start training 20231109080647.716 WARN start - ../src/lxc/start.c:lxc_abort:1036 - No such process - Failed to send SIGKILL via pidfd 18 for process 9543
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:483 - Set container state to STOPPING
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_serve_state_clients:486 - No state clients registered
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_MNT_NS=/proc/9538/fd/19
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_PID_NS=/proc/9538/fd/20
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_UTS_NS=/proc/9538/fd/21
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_IPC_NS=/proc/9538/fd/22
lxc-start training 20231109080647.716 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_NET_NS=/proc/9538/fd/23
lxc-start training 20231109080647.717 TRACE start - ../src/lxc/start.c:lxc_expose_namespace_environment:906 - Set environment variable LXC_CGROUP_NS=/proc/9538/fd/24
lxc-start training 20231109080648.724 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgroup_tree_remove:492 - Removed cgroup tree 10(lxc.payload.training)
lxc-start training 20231109080648.725 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgroup_tree_create:727 - Reusing 10(lxc.pivot) cgroup
lxc-start training 20231109080648.726 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:__cgroup_tree_create:742 - Opened cgroup lxc.pivot as 4
lxc-start training 20231109080648.113 TRACE cgfsng - ../src/lxc/cgroups/cgfsng.c:cgfsng_monitor_destroy:928 - Removed cgroup tree 10(lxc.monitor.training)
lxc-start training 20231109080648.113 TRACE start - ../src/lxc/start.c:lxc_end:963 - Closed command socket
lxc-start training 20231109080648.113 TRACE start - ../src/lxc/start.c:lxc_end:974 - Set container state to "STOPPED"
lxc-start training 20231109080648.113 INFO conf - ../src/lxc/conf.c:run_script_argv:341 - Executing script "/usr/share/lxcfs/lxc.reboot.hook" for container "training"
lxc-start training 20231109080648.113 TRACE conf - ../src/lxc/conf.c:run_script_argv:384 - Set environment variable: LXC_HOOK_TYPE=post-stop
lxc-start training 20231109080648.113 TRACE conf - ../src/lxc/conf.c:run_script_argv:389 - Set environment variable: LXC_HOOK_SECTION=lxc
the containers configuration file
# includes are inlined, that's why e.g. lxc.cap.drop and lxc.mount.auto occur twice
lxc.tty.dir = lxc
lxc.pty.max = 1024
lxc.tty.max = 4
lxc.cap.drop = mac_admin mac_override sys_time sys_module sys_rawio
lxc.hook.clone = /usr/share/lxc/hooks/clonehostname
lxc.cgroup.devices.deny = a
lxc.cgroup.devices.allow = c *:* m
lxc.cgroup.devices.allow = b *:* m
lxc.cgroup.devices.allow = c 1:3 rwm
lxc.cgroup.devices.allow = c 1:5 rwm
lxc.cgroup.devices.allow = c 1:7 rwm
lxc.cgroup.devices.allow = c 5:0 rwm
lxc.cgroup.devices.allow = c 5:1 rwm
lxc.cgroup.devices.allow = c 5:2 rwm
lxc.cgroup.devices.allow = c 1:8 rwm
lxc.cgroup.devices.allow = c 1:9 rwm
lxc.cgroup.devices.allow = c 136:* rwm
lxc.cgroup.devices.allow = c 10:229 rwm
lxc.cgroup2.devices.deny = a
lxc.cgroup2.devices.allow = c *:* m
lxc.cgroup2.devices.allow = b *:* m
lxc.cgroup2.devices.allow = c 1:3 rwm
lxc.cgroup2.devices.allow = c 1:5 rwm
lxc.cgroup2.devices.allow = c 1:7 rwm
lxc.cgroup2.devices.allow = c 5:0 rwm
lxc.cgroup2.devices.allow = c 5:1 rwm
lxc.cgroup2.devices.allow = c 5:2 rwm
lxc.cgroup2.devices.allow = c 1:8 rwm
lxc.cgroup2.devices.allow = c 1:9 rwm
lxc.cgroup2.devices.allow = c 136:* rwm
lxc.cgroup2.devices.allow = c 10:229 rwm
lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed
lxc.mount.entry = /sys/fs/fuse/connections sys/fs/fuse/connections none bind,optional 0 0
lxc.seccomp.profile = /usr/share/lxc/config/common.seccomp
lxc.hook.mount = /usr/share/lxcfs/lxc.mount.hook
lxc.hook.post-stop = /usr/share/lxcfs/lxc.reboot.hook
lxc.tty.dir =
lxc.cgroup.devices.allow = c 254:0 rm
lxc.cgroup.devices.allow = c 10:200 rwm
lxc.cgroup.devices.allow = c 10:228 rwm
lxc.cgroup.devices.allow = c 10:232 rwm
lxc.apparmor.profile = generated
lxc.apparmor.allow_nesting = 0
lxc.hook.version = 1
lxc.mount.auto = proc:mixed sys:ro cgroup:ro
lxc.mount.entry = run run tmpfs rw,nodev,relatime,mode=755,size=20m,create=dir 0 0
lxc.mount.entry = none dev/shm tmpfs rw,nosuid,nodev,mode=1777,size=100m,create=dir 0 0
lxc.mount.entry = /var/lib/sss var/lib/sss none bind,ro,nodev,nosuid,noexec,noatime,create=dir 0 0
lxc.mount.entry = /srv/home home none bind,nodev,nosuid,relatime 0 0
lxc.mount.entry = /srv/training/svn var/lib/svn/training none bind,nodev,nosuid,relatime 0 0
lxc.mount.entry = /srv/training/zerocms var/spool/zerocms none bind,nodev,nosuid,relatime 0 0
lxc.mount.entry = /srv/www/training.example.com var/www/training.example.com none bind,nodev,nosuid,relatime 0 0
lxc.cap.drop =
lxc.cap.keep = audit_write chown dac_override dac_read_search fowner fsetid kill net_bind_service net_raw setgid setfcap setuid sys_ptrace
lxc.start.auto = 1
lxc.tty.dir =
lxc.tty.max = 0
lxc.autodev = 1
lxc.rootfs.managed = 0
lxc.rootfs.path = dir:/var/lib/lxc/training/rootfs
lxc.uts.name = training.backend.example.com
lxc.arch = amd64
lxc.net.0.type = ipvlan
lxc.net.0.link = intra
lxc.net.0.flags = up
lxc.net.0.name = intra
lxc.net.0.ipvlan.mode = l3s
lxc.net.0.l2proxy = 1
lxc.net.0.ipv4.address = 192.168.0.1/20 192.168.0.255
lxc.net.0.ipv4.gateway = 192.168.0.254
For completeness, here is the TRACE output for lxc-stop:
lxc-stop training 20231109081425.359 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:148 - Command "get_init_pid" received response
lxc-stop training 20231109081425.360 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "get_init_pid"
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:148 - Command "get_state" received response
lxc-stop training 20231109081425.361 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "get_state"
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_get_state:1063 - Container "training" is in "RUNNING" state
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:148 - Command "get_state" received response
lxc-stop training 20231109081425.361 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "get_state"
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_get_state:1063 - Container "training" is in "RUNNING" state
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:137 - Received exact number of file descriptors 1 == 1 for command "get_init_pidfd"
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv:255 - Finished processing "get_init_pidfd" with file descriptor 5
lxc-stop training 20231109081425.361 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "get_init_pidfd"
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:148 - Command "get_init_pid" received response
lxc-stop training 20231109081425.361 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "get_init_pid"
lxc-stop training 20231109081425.361 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:148 - Command "add_state_client" received response
lxc-stop training 20231109081425.361 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "add_state_client"
lxc-stop training 20231109081425.361 TRACE commands - ../src/lxc/commands.c:lxc_cmd_add_state_client:1405 - State connection fd 4 ready to listen for container state changes
lxc-stop training 20231109081425.361 TRACE lxccontainer - ../src/lxc/lxccontainer.c:do_lxcapi_shutdown:2124 - Sent signal 30 to pidfd 5
lxc-stop training 20231109081526.135 DEBUG commands - ../src/lxc/commands.c:lxc_cmd_rsp_recv_fds:148 - Command "stop" received response
lxc-stop training 20231109081526.135 TRACE commands - ../src/lxc/commands.c:lxc_cmd:521 - Opened new command socket connection fd 4 for command "stop"
lxc-stop training 20231109081526.135 INFO commands - ../src/lxc/commands.c:lxc_cmd_stop:1110 - Container "training" has stopped
The text was updated successfully, but these errors were encountered:
The template below is mostly useful for bug reports and support questions.
Feel free to remove anything which doesn't apply to you and add more information where it makes sense.
Required information
lxc-start --version
: 5.0.3lxc-checkconfig
uname -a
:Linux my-hostname-here 6.4.0-2-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.4.4-3 (2023-08-08) x86_64 GNU/Linux
cat /proc/self/cgroup
:0::/
cat /proc/1/mounts
Issue description
I created a guest with an
ipvlan
network interface.It can be started exactly once; subsequent startup attempts fail with:
This is caused by the following routing entry being left intact on guest stop:
If I remove the route manually before the 2nd startup attempt, the guest starts correctly again.
(Incidentally, this route is wrong for my use-case because I want the guest and the host to be able to communicate with each other, so I have an ipvlan subinterface in the host namespace that's in the same subnet as the guest interface, and the route is supposed to point out through that. I guess I'll have to supply my own
.script.{up,down}
and losel2proxy
, but it would be better if this were configurable. I also think failing to add a route that already exists shouldn't be considered a fatal error.)Steps to reproduce
stop it using
lxc-stop
.try to start it again with
lxc-start
.Information to attach
dmesg
)There isn't any.
lxc-start -n <c> -l TRACE -o <logfile>
)For completeness, here is the TRACE output for
lxc-stop
:The text was updated successfully, but these errors were encountered: