lxd-bridge.service exits success on failure to run dnsmasq
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
lxd (Ubuntu) |
Fix Released
|
Low
|
Unassigned |
Bug Description
I recently upgraded during yakkety development cycle, rebooted and found i could not launch containers. The failure can be seen below.
The issue seemed to be that dnsmasq is installed and was binding to all port 53 leaving lxd-bridge unable to bind. However, the systemd service does not recognize it failed. it seems an error in the '|| cleanup' in /usr/lib/
I think chaning that to simply '|| exit' would correctly show failure.
$ systemctl status lxd-bridge --no-pager -l
● lxd-bridge.service - LXD - network bridge
Loaded: loaded (/lib/systemd/
Active: active (exited) since Mon 2016-08-15 09:37:38 EDT; 1 day 3h ago
Docs: man:lxd(1)
Main PID: 4426 (code=exited, status=0/SUCCESS)
Tasks: 0 (limit: 4915)
Memory: 0B
CPU: 0
CGroup: /system.
Aug 15 09:37:38 milhouse systemd[1]: Starting LXD - network bridge...
Aug 15 09:37:38 milhouse lxd-bridge.
Aug 15 09:37:38 milhouse lxd-bridge.
Aug 15 09:37:38 milhouse systemd[1]: Started LXD - network bridge.
==== Failure example ===
$ lxc launch ubuntu-
Creating y1
Starting y1
error: Error calling 'lxd forkstart y1 /var/lib/
Try `lxc info --show-log y1` for more info
$ lxc info --show-log y1
Name: y1
Architecture: x86_64
Created: 2016/08/15 20:00 UTC
Status: Stopped
Type: persistent
Profiles: default
Log:
lxc 20160815160056.225 INFO lxc_start - start.c:
lxc 20160815160056.225 INFO lxc_start - start.c:
lxc 20160815160056.228 INFO lxc_container - lxccontainer.
lxc 20160815160056.228 INFO lxc_start - start.c:
lxc 20160815160056.228 INFO lxc_lsm - lsm/lsm.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.228 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_seccomp - seccomp.
lxc 20160815160056.229 INFO lxc_conf - conf.c:
lxc 20160815160056.229 INFO lxc_start - start.c:
lxc 20160815160056.229 INFO lxc_start - start.c:
lxc 20160815160056.232 INFO lxc_monitor - monitor.
lxc 20160815160056.315 DEBUG lxc_start - start.c:
lxc 20160815160056.316 DEBUG lxc_console - console.
lxc 20160815160056.316 INFO lxc_start - start.c:
lxc 20160815160056.317 DEBUG lxc_start - start.c:
lxc 20160815160056.317 INFO lxc_start - start.c:
lxc 20160815160056.317 INFO lxc_confile - confile.
lxc 20160815160056.317 INFO lxc_confile - confile.
lxc 20160815160056.322 ERROR lxc_conf - conf.c:
lxc 20160815160056.356 ERROR lxc_conf - conf.c:
lxc 20160815160056.356 ERROR lxc_start - start.c:
lxc 20160815160056.356 ERROR lxc_start - start.c:
lxc 20160815160056.357 INFO lxc_conf - conf.c:
lxc 20160815160056.860 INFO lxc_conf - conf.c:
lxc 20160815160056.934 WARN lxc_commands - commands.
lxc 20160815160056.934 WARN lxc_commands - commands.
lxc 20160815160056.937 INFO lxc_confile - confile.
lxc 20160815160056.937 INFO lxc_confile - confile.
lxc 20160815160124.089 INFO lxc_confile - confile.
lxc 20160815160124.089 INFO lxc_confile - confile.
lxc 20160815160124.093 INFO lxc_confile - confile.
lxc 20160815160124.093 INFO lxc_confile - confile.
ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: lxd 2.0.3-0ubuntu2
ProcVersionSign
Uname: Linux 4.4.0-34-generic x86_64
NonfreeKernelMo
ApportVersion: 2.20.3-0ubuntu7
Architecture: amd64
CurrentDesktop: Unity
Date: Tue Aug 16 12:44:17 2016
EcryptfsInUse: Yes
InstallationDate: Installed on 2015-07-23 (390 days ago)
InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20150722.1)
SourcePackage: lxd
UpgradeStatus: No upgrade log present (probably fresh install)
Related bugs:
* bug 1613820: lxd-bridge.service races against dnsmasq package's dnsmasq.service
description: | updated |
Changed in lxd (Ubuntu): | |
status: | New → Triaged |
importance: | Undecided → Low |
tags: | added: patch |
Changed in lxd (Ubuntu): | |
status: | Triaged → Fix Committed |
This bug was fixed in the package lxd - 2.1-0ubuntu1
---------------
lxd (2.1-0ubuntu1) yakkety; urgency=medium
* New upstream release (2.1)
- All the bugfixes listed as part of LXD 2.0.1, 2.0.2, 2.0.3 and 2.0.4
- client: Add a lxc shell alias by default allowed_ credentials key
- client: Build unix-like aliases directly into LXC
- client: Generate the client certificate on-demand
- client/copy: Allow additional profiles and config (LP: #1585307)
- client/copy: Pick a random name if not specified (LP: #1585308)
- client/image: Add --format and json output
- client/image: Allow deleting multiple images at once
- client/list: Add support for config key columns
- client/profile: lxc profile apply is now lxc profile assign
- client/profile: New lxc profile add and lxc profile remove sub-commands
- client/version: Do not show the version command by default
- daemon: Add a global core.https_
- daemon: Implement ETag support for all PUT calls
- daemon: Implement PKI authentication
- daemon: Implement the PATCH method for all endpoints that have PUT
- daemon/container: Add config key for container force shutdown timeout
- daemon/container: Add some seccomp knobs
- daemon/container: Add support for the "usb" device type
- daemon/container: Record the last used date for containers
- daemon/zfs: Allow forcing snapshot removal through configuration
- tests: Fix for newer shellcheck
- lxd-bridge: Fail on dnsmasq failure (LP: #1613815)
- c/r: switch to the new ->migrate API
- c/r: use liblxc's new preserves_inodes feature
- c/r: bump ghost limit
-- Stéphane Graber <email address hidden> Wed, 17 Aug 2016 19:31:36 -0400