[Bug 1560120] Re: Unprivileged nested container will not start inside a privileged container

2016-03-22 Thread Christopher Townsend
I have confirmed that the fix for this indeed does fix my issue. Thanks for your prompt attention! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1560120 Title: Unprivileged nested

[Bug 1560120] [NEW] Unprivileged nested container will not start inside a privileged container

2016-03-21 Thread Christopher Townsend
Public bug reported: This is a follow up to bug #1543697 where I have a Trusty host with ppa :ubuntu-lxc/stable installed and have a privileged Xenial LXC and a nested unprivileged LXC. After some recent update(s), the unprivileged nested LXC will not start again. I've attached a debug log.

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-03-07 Thread Christopher Townsend
Hi Serge, Thanks for working with me on this. So it does work when I ssh into the privileged container as user ubuntu and then start the unprivileged container. I'm guessing there may be no way to start the unprivileged container from lxc-attach like I want to, right? Here is the output you

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-03-07 Thread Christopher Townsend
I tried adding "lxc.include = /usr/share/lxc/config/nesting.conf" as I didn't know this existed. However, it didn't help. As you say, I can create unprivileged containers as user ubuntu, I just can't start them. Are you able to start unprivileged containers as user ubuntu? If so, how are you

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-03-04 Thread Christopher Townsend
Sure, here is the requested info: $ uname -a Linux Slave1 4.4.0-9-generic #24-Ubuntu SMP Mon Feb 29 19:33:19 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu.

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-03-04 Thread Christopher Townsend
I have version 2.0.0~rc5-0ubuntu1 on both the Xenial host and Xenial privileged container installed. I have rebooted the host and have also stopped and restarted the privileged container. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-03-04 Thread Christopher Townsend
This still doesn't seem fixed. I've attached the latest debug log. ** Attachment added: "start_test.out" https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1543697/+attachment/4588355/+files/start_test.out -- You received this bug notification because you are a member of Ubuntu Server

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-03-02 Thread Christopher Townsend
I have tried this again and the error is different now. I've attached a debug log. ** Attachment added: "start_test.out" https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1543697/+attachment/4587021/+files/start_test.out -- You received this bug notification because you are a member of

[Bug 1552355] [NEW] Unprivileged lxc will not start after being stopped

2016-03-02 Thread Christopher Townsend
Public bug reported: Using lxc package 2.0.0~rc4-0ubuntu1 on a Xenial host, I can start an unprivileged Xenial LXC, but if I stop it, it will not start again without rebooting the host. I've attached the debug output. ** Affects: lxc (Ubuntu) Importance: Undecided Status: New **

[Bug 1549363] Re: Unprivileged LXC will not start after today's updates

2016-02-29 Thread Christopher Townsend
The containers now start after today's updates (2.0.0~rc4-0ubuntu1). Also a new kernel was installed which may have fixed something too. At any rate, looks like it's fixed for now. Thanks! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed

[Bug 1549363] Re: Unprivileged LXC will not start after today's updates

2016-02-26 Thread Christopher Townsend
I updated to the latest LXC (2.0.0~rc3-0ubuntu2) and the cgroup permission issue still occurs. The unprivileged containers are created by the user and started by the user, ie, not root. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to

[Bug 1549363] Re: Unprivileged LXC will not start after today's updates

2016-02-26 Thread Christopher Townsend
I have rebooted my machine multiple times and the issue(s) still occur. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1549363 Title: Unprivileged LXC will not start after today's

[Bug 1549363] Re: Unprivileged LXC will not start after today's updates

2016-02-25 Thread Christopher Townsend
After the latest lxc updates (2.0.0~rc3-0ubuntu1), a new failure is now occurring. See attached debug log. ** Attachment added: "start_lxc.out" https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1549363/+attachment/4580930/+files/start_lxc.out -- You received this bug notification because

[Bug 1549363] [NEW] Unprivileged LXC will not start after today's updates

2016-02-24 Thread Christopher Townsend
Public bug reported: After today's (Feb. 24, 2016) updates, unprivileged LXC's will no longer start. Attaching 'start_lxc.out' debug log as well. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: lxc 2.0.0~rc2-0ubuntu2 ProcVersionSignature: Ubuntu 4.4.0-7.22-generic 4.4.2 Uname: Linux

[Bug 1543697] Re: Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-02-11 Thread Christopher Townsend
** Description changed: I have a host where I create a privileged Xenial container. Inside that privileged container, I create an unprivileged Xenial container using the ubuntu user in the privileged container. When I try starting the unprivileged container, I get the following error:

[Bug 1543697] [NEW] Unprivileged nested Xenial container will not start inside a privileged Xenial container

2016-02-09 Thread Christopher Townsend
Public bug reported: I have a host where I create a privileged Xenial container. Inside that privileged container, I create an unprivileged Xenial container using the ubuntu user in the privileged container. When I try starting the unprivileged container, I get the following error:

[Bug 1542438] Re: Python LXC api needs to be much better at error reporting

2016-02-08 Thread Christopher Townsend
Ok, thanks, that might work. I will have to think on how best to parse the log file for any error messages that are only applicable to the actual LXC Python API call the application is executing and pass these error messages back to the user and present them in a meaningful manner. -- You

[Bug 1542438] [NEW] Python LXC api needs to be much better at error reporting

2016-02-05 Thread Christopher Townsend
Public bug reported: I use the Python API extensively on the lp:libertine project. However, when there is an error somewhere in the LXC layer, the only thing that is returned is False which is not very useful when trying to figure out what has gone wrong. For example, I try to use the

[Bug 1519079] [NEW] Xenial container on Xenial host no longer runs systemd and can't get an IP address

2015-11-23 Thread Christopher Townsend
Public bug reported: I have a Xenial host with a Xenial LXC and as of today's updates, the container no longer gets an IP address and systemd does not appear to have run. This same exact container worked fine last Friday, only packages on my host changed. Also, I'm not sure if other host/LXC

[Bug 1519079] Re: Xenial container on Xenial host no longer runs systemd and can't get an IP address

2015-11-23 Thread Christopher Townsend
I've attached the list of packages that were updated when this issue started to occur. ** Attachment added: "list_of_packages" https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1519079/+attachment/4524270/+files/list_of_packages -- You received this bug notification because you are a

[Bug 1517107] Re: $PATH is getting clobbered when starting a container with Upstart

2015-11-23 Thread Christopher Townsend
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1517107 Title: $PATH is getting clobbered when starting a container

[Bug 1517107] [NEW] $PATH is getting clobbered when starting a container with Upstart

2015-11-17 Thread Christopher Townsend
Public bug reported: I have a script using the Python3 LXC API that starts up a container. If I use an Upstart job to call the script, the $PATH env var is getting clobbered and the container fails to start. ** Affects: lxc (Ubuntu) Importance: Undecided Status: New -- You

[Bug 1475751] Re: need phablet support for mods to /etc/lxc/lxc-usernet (vivid+stable ppa overaly)

2015-10-27 Thread Christopher Townsend
Hey Stéphane, I agree that hardcoding the phablet user is not the best way to go about this. This is really only needed for The Future in which devices use a kernel that supports unprivileged containers. I think at this juncture, going about the way where members of a lxc-net group

[Bug 1475751] Re: need phablet support for mods to /etc/lxc/lxc-usernet (vivid+stable ppa overaly)

2015-07-20 Thread Christopher Townsend
Hi Serge, Well, the problem is that /etc/lxc/lxc-usernet is read-only, so it can't be modified by a user action. I'm not really sure how modifications of system files is supposed to take place in the New World. I think for a short-term solution, we can take the Vivid lxc source package and

[Bug 1470135] Re: Wily lxc will not start on Wily host

2015-06-30 Thread Christopher Townsend
Yes, I think that is the bug. Here is the output: $ cat /proc/self/cgroup 10:cpuset:/user.slice 9:blkio:/user.slice 8:cpu,cpuacct:/user.slice 7:perf_event:/user.slice 6:devices:/user.slice 5:freezer:/user.slice 4:memory:/user.slice 3:net_cls,net_prio:/user.slice 2:hugetlb:/user.slice

[Bug 1470135] [NEW] Wily lxc will not start on Wily host

2015-06-30 Thread Christopher Townsend
Public bug reported: After today's (June 30) updates, a Wily LXC created on a Wily host will not start. ProblemType: Bug DistroRelease: Ubuntu 15.10 Package: lxc 1.1.2-0ubuntu3 [modified: usr/lib/x86_64-linux-gnu/lxc/lxc-net] ProcVersionSignature: Ubuntu 3.19.0-22.22-generic 3.19.8-ckt1 Uname:

[Bug 1470135] Re: Wily lxc will not start on Wily host

2015-06-30 Thread Christopher Townsend
I'm also attaching the log during the failure. ** Attachment added: start.out https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470135/+attachment/4422483/+files/start.out -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in

[Bug 1470135] Re: Wily lxc will not start on Wily host

2015-06-30 Thread Christopher Townsend
Also of note, there was an update to systemd today, which tends to cause issues with lxc:( -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1470135 Title: Wily lxc will not start on Wily

[Bug 1468611] Re: dnsmasq fails to start in lxc-net

2015-06-26 Thread Christopher Townsend
Hey Serge, Yes, I can confirm that setting LXC_DHCP_CONFILE=/dev/null does indeed make it work. Thanks! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to dnsmasq in Ubuntu. https://bugs.launchpad.net/bugs/1468611 Title: dnsmasq

[Bug 1468611] Re: dnsmasq fails to start in lxc-net

2015-06-25 Thread Christopher Townsend
I'm hitting this too. When the lxcbr0 device is not available, my unpriv'd containers will not start due to not being able to set up the network. If I just touch /etc/dnsmasq.conf, then it all works as expected. -- You received this bug notification because you are a member of Ubuntu Server

[Bug 1452451] Re: failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-13 Thread Christopher Townsend
The rootfs used Vivid and now Wily, but the issue remains with both. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1452451 Title: failed to change apparmor profile to

[Bug 1452451] Re: failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-13 Thread Christopher Townsend
Dang, I was afraid you might not be able to reproduce, being a race and all. I'm not sure it's possible to hand off the system as it's my primary development machine. I think I will take a stab in trying to debug this. A quick looks shows that it is failing in this block in lsm/apparmor.c: if

[Bug 1452451] Re: failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-13 Thread Christopher Townsend
So, if I remove the lxc-wait out of the start/wait/attach sequence, then I always get the failure. This really points to a race where RUNNING is being reported before it is really fully started. It looks like the RUNNING state is set in start.c, so perhaps it is being set a bit too early where

[Bug 1452451] Re: failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-08 Thread Christopher Townsend
I've been trying to capture a log of the failure when running lxc-attach and it seems to cause just enough delay to get by the race. Also, it does not always occur, but more time than not, the error happens leading more credence to this being a race. I've attached the config I use for the

[Bug 1452451] Re: failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-08 Thread Christopher Townsend
Actually, running sudo unity8-lxc-setup has a start/wait/attach sequence that is causing failures. Another way I try to reproduce after the whole container is setup is to create a little script with the following: lxc-start -n unity8-lxc lxc-wait -t 5 -s RUNNING -n unity8-lxc lxc-attach -n

[Bug 1452451] Re: failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-08 Thread Christopher Townsend
Hi Serge, This does not happen when doing this by hand, only in a script. And I can't seem to reproduce on a container created using a template. So far, I've only been able to reproduce this when creating the container using the procedure in lp:unity8-preview-lxc. This is a project that was

[Bug 1452437] Re: 15.04 container does not get an IP address when started

2015-05-07 Thread Christopher Townsend
This may be an lxc only issue as well, so I'm adding that package to this bug. ** Also affects: lxc (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu.

[Bug 1452451] [NEW] failed to change apparmor profile to lxc-container-default-with-nesting

2015-05-06 Thread Christopher Townsend
Public bug reported: I develop and maintain the unity8-lxc package (lp:unity8-preview-lxc) which uses an unpacked Ubuntu Next Desktop ISO as a privileged rootfs. It uses the lxc-container-default-with-nesting apparmor profile since we'd like to support containers within this. When I try to do a

[Bug 1347020] Re: systemd does not boot in a container

2015-04-01 Thread Christopher Townsend
Any ideas when this will be fixed in Trusty? This is blocking unity8-lxc from working anymore on Trusty hosts. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1347020 Title: systemd

[Bug 1435416] [NEW] Using cgm on cgroups that have a comma does not work

2015-03-23 Thread Christopher Townsend
Public bug reported: When I try using cgm on cgroups that have a comma, I get an Invalid Request error. For example, if I try cgm create net_cls,net_prio $USER inside a Vivid container, the Vivid host's cgmanager will start to spin at 100% CPU and the command fails. ProblemType: Bug

[Bug 1417909] Re: Container fails to start with error mounting /sys/fs/cgroup

2015-02-10 Thread Christopher Townsend
Hey Serge, Thanks for looking into this more and better documentation would be most helpful. I'm not really sure if it matters any more, but my python script does indeed ask to load /usr/share/lxc/config/ubuntu.common.conf. Here is the code snippet before I start adding custom config options:

[Bug 1417909] Re: Container fails to start with error mounting /sys/fs/cgroup

2015-02-10 Thread Christopher Townsend
Hi Serge, Ok, I understand I can fix this issue by adding that line in my config. However, my gripe now with this is that my configuration was working with no issues prior to an update in LXC, then it broke for no apparent reason. Why was it automounting /sys before and not now? Shouldn't this

[Bug 1417909] Re: Container fails to start with error mounting /sys/fs/cgroup

2015-02-06 Thread Christopher Townsend
** Changed in: lxc (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1417909 Title: Container fails to start with error mounting

[Bug 1417909] Re: Container fails to start with error mounting /sys/fs/cgroup

2015-02-05 Thread Christopher Townsend
Hey Serge, Yes, adding 'lxc.mount.auto = sys' fixes the issue. The container is an extracted ISO from http://cdimage.ubuntu.com/ubuntu- desktop-next/daily-live/current/vivid-desktop-amd64.iso for the Unity 8 in LXC project. -- You received this bug notification because you are a member of

[Bug 1417909] [NEW] Container fails to start with error mounting /sys/fs/cgroup

2015-02-03 Thread Christopher Townsend
Public bug reported: It seems a fairly recent update to LXC has caused this. This is a privileged container. I will attach debug output when trying to start the container. ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: lxc 1.1.0~rc4-0ubuntu1 ProcVersionSignature: Ubuntu

[Bug 1417909] Re: Container fails to start with error mounting /sys/fs/cgroup

2015-02-03 Thread Christopher Townsend
This is the debug output when starting the container. ** Attachment added: debug.txt https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1417909/+attachment/4311947/+files/debug.txt -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to

[Bug 1417909] Re: Container fails to start with error mounting /sys/fs/cgroup

2015-02-03 Thread Christopher Townsend
This is the generated LXC config file. ** Attachment added: config https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1417909/+attachment/4311948/+files/config -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu.

[Bug 1379030] [NEW] Extra lxc.mount.auto entry being added to config file

2014-10-08 Thread Christopher Townsend
Public bug reported: I'm using the Python API to append entries to the LXC config file. When I do the following: container.set_config_item(lxc.mount.auto, cgroup:mixed) I get an extra lxc.mount.auto entry in the config file. This is what it looks like: lxc.mount.auto = lxc.mount.auto =