[pve-devel] [PATCH v3 ct 00/12] mount hotplugging & new mount api

Oguz Bektas o.bektas at proxmox.com
Tue Nov 19 16:56:55 CET 2019


hi,

this breaks mounting with mountopts. (hotplug and normal mount)

reproduce:
- install new kernel
- make a CT
- run it
- try to hotplug a mp with any mountoption (ro, noatime, nosuid, noexec,
nodev)
- mount will fail with exit code 32
- shutdown CT
- boot CT
- mp will be created, it will fail to mount properly and CT won't start.
- remove mp, CT will start again.

see attached lxc.log and journal.log

On Tue, Nov 19, 2019 at 10:34:32AM +0100, Wolfgang Bumiller wrote:
> Changes to v2:
> * Factor `walk_tree_nofollow` to be usable with fds as starting point.
> * Create destination directory entries (this was completely missing in
>   the staged code path api).
> * Test for new kernel api with `move_mount` instead of `fsopen` since
>   we don't actually use `fsopen` currently.
> * Factor out `mountpoint_insert_staged()` to be used from the pre-start
>   hook & hotplug code (this is where the directory tree creation was
>   added)
> * Rename vmconfig_apply_pending_mountpoint to just apply_pending_mountpoint.
> * Switch into the `/usr/bin/lxc-start` apparmor profile for mount point
>   hotplugging. (Otherwise hotplugging can potentially allow more options
>   than we can use later at a normal container startup.)
> 
> Previous changes from v1 to v2:
> * Add a helper to LXC::PVE::Tools to check for availability of the new
>   mount api (new patch 1), and use that in the prestart hook and mount
>   functions.
> * Add a check to the mount hotplug code to not attempt to perform
>   hotplugging on older kernels.
> 
> Wolfgang Bumiller (12):
>   tools: add can_use_new_mount_api helper
>   split walk_tree_nofollow to allow a start fd
>   implement "staged mountpoints"
>   add mountpoint_insert_staged helper
>   add open_pid_fd, open_lxc_pid, open_ppid helpers
>   split open_namespace out of enter_namespace
>   add get_container_namespace helper
>   add mount stage directory helpers
>   prestart-hook: use staged mountpoints on newer kernels
>   config: apply_pending_mountpoint helper
>   implement mountpoint hotplugging
>   use lxc-start apparmor profile for mount hotplugging
> 
>  src/PVE/LXC.pm            | 232 +++++++++++++++++++++++++++++++++++---
>  src/PVE/LXC/Config.pm     |  94 ++++++++++-----
>  src/PVE/LXC/Tools.pm      |  18 +++
>  src/lxc-pve-prestart-hook |  78 +++++++++++--
>  4 files changed, 371 insertions(+), 51 deletions(-)
> 
> -- 
> 2.20.1
> 
-------------- next part --------------
lxc-start 100 20191119152902.486 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536
lxc-start 100 20191119152902.486 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536
lxc-start 100 20191119152902.486 INFO     lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 100
lxc-start 100 20191119152902.487 INFO     lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount  # comment this to allow umount -f;  not recommended"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38"
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno)
lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context
lxc-start 100 20191119152902.487 INFO     conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "100", config section "lxc"
lxc-start 100 20191119152902.855 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: mount: /run/pve/mountpoints/mp1: cannot mount /dev/mapper/pve-vm--100--disk--2 read-only.

lxc-start 100 20191119152902.855 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: command 'mount -o nodev,noatime /dev/dm-10 /run/pve/mountpoints/mp1' failed: exit code 32

lxc-start 100 20191119152902.864 ERROR    conf - conf.c:run_buffer:352 - Script exited with status 32
lxc-start 100 20191119152902.864 ERROR    start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "100"
lxc-start 100 20191119152902.864 ERROR    start - start.c:__lxc_start:2032 - Failed to initialize container "100"
lxc-start 100 20191119152902.872 DEBUG    lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 4558 exited
lxc-start 100 20191119152902.872 ERROR    lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state
lxc-start 100 20191119152902.872 ERROR    lxc_start - tools/lxc_start.c:main:329 - The container failed to start
lxc-start 100 20191119152902.872 ERROR    lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode
lxc-start 100 20191119152902.872 ERROR    lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options
lxc-start 101 20191119154847.456 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536
lxc-start 101 20191119154847.456 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536
lxc-start 101 20191119154847.456 INFO     lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 101
lxc-start 101 20191119154847.456 INFO     lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount  # comment this to allow umount -f;  not recommended"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1"
lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38"
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno)
lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context
lxc-start 101 20191119154847.457 INFO     conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "101", config section "lxc"
lxc-start 101 20191119154847.878 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: mount: /run/pve/mountpoints/mp5: cannot mount /dev/mapper/pve-vm--101--disk--6 read-only.

lxc-start 101 20191119154847.878 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: command 'mount -o noatime /dev/dm-15 /run/pve/mountpoints/mp5' failed: exit code 32

lxc-start 101 20191119154847.886 ERROR    conf - conf.c:run_buffer:352 - Script exited with status 32
lxc-start 101 20191119154847.886 ERROR    start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "101"
lxc-start 101 20191119154847.886 ERROR    start - start.c:__lxc_start:2032 - Failed to initialize container "101"
lxc-start 101 20191119154847.897 DEBUG    lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 13321 exited
lxc-start 101 20191119154847.897 ERROR    lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state
lxc-start 101 20191119154847.897 ERROR    lxc_start - tools/lxc_start.c:main:329 - The container failed to start
lxc-start 101 20191119154847.897 ERROR    lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode
lxc-start 101 20191119154847.897 ERROR    lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options
-------------- next part --------------
-- A start job for unit pve-container at 101.service has begun execution.
--
-- The job identifier is 3591.
Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-7): mounted filesystem with ordered data mode. Opts: (null)
Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-8): mounted filesystem with ordered data mode. Opts: (null)
Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-11): mounted filesystem with ordered data mode. Opts: (null)
Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-12): mounted filesystem with ordered data mode. Opts: (null)
Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-13): mounted filesystem with ordered data mode. Opts: (null)
Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-14): mounted filesystem with ordered data mode. Opts: (null)
Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime"
Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime"
Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:70): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime"
Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:71): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime"
Nov 19 16:53:21 mphotplug kernel: lxc-start[14554]: segfault at 50 ip 00007feca73b0f8b sp 00007fff068cb9d0 error 4 in liblxc.so.1.6.0[7feca7357000+8a000]
Nov 19 16:53:21 mphotplug kernel: Code: 9b c0 ff ff 4d 85 ff 0f 85 82 02 00 00 66 90 48 8b 73 50 48 8b bb f8 00 00 00 e8 80 78 fa ff 4c 8b 74 24 10 48 89 de 4c 89 f7 <41> ff 56 50 4c 89 f7 48 89 de 41 ff 56 58 48 8b 83 f8 00 00 00 8b
Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: lxccontainer.c: wait_on_daemonized_start: 865 No such file or directory - Failed to receive the container state
Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 329 The container failed to start
Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 332 To get more details, run the container in foreground mode
Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 335 Additional information can be obtained by setting the --logfile and --logpriority options
Nov 19 16:53:21 mphotplug systemd[1]: pve-container at 101.service: Control process exited, code=exited, status=1/FAILURE
-- Subject: Unit process exited
-- Defined-By: systemd
-- Support: https://www.debian.org/support
--
-- An ExecStart= process belonging to unit pve-container at 101.service has exited.
--
-- The process' exit code is 'exited' and its exit status is 1.
Nov 19 16:53:21 mphotplug systemd[1]: pve-container at 101.service: Failed with result 'exit-code'.

-------------- next part --------------
root at mphotplug:~# cat /etc/pve/lxc/101.conf
arch: amd64
cores: 1
hostname: arch
memory: 512
mp0: local-lvm:vm-101-disk-1,mp=fsdf,size=1G
mp1: local-lvm:vm-101-disk-2,mp=afkdjl,size=8G
mp2: local-lvm:vm-101-disk-3,mp=sdfghj,size=1G
mp3: local-lvm:vm-101-disk-4,mp=dfghjk,size=1G
mp4: local-lvm:vm-101-disk-5,mp=dfghjkloijuhgfd,size=1G
mp5: local-lvm:vm-101-disk-7,mp=/fsdfji4eowfjsdkl,mountoptions=noatime,size=8G
net0: name=eth0,bridge=vmbr0,firewall=1,hwaddr=9E:F0:C2:CF:BE:39,ip=dhcp,type=veth
ostype: archlinux
rootfs: local-lvm:vm-101-disk-0,size=8G
swap: 512
unprivileged: 1
unused0: local-lvm:vm-101-disk-6


More information about the pve-devel mailing list