[pve-devel] [PATCH v3 ct 00/12] mount hotplugging & new mount api

Oguz Bektas o.bektas at proxmox.com
Tue Nov 19 17:51:25 CET 2019


On Tue, Nov 19, 2019 at 04:56:55PM +0100, Oguz Bektas wrote:
> hi,
> 
> this breaks mounting with mountopts. (hotplug and normal mount)

testing with the older kernel now. hotplugging isn't supported because
of the old version, but we can actually mount mps with mountoptions with
the older kernel.


> 
> reproduce:
> - install new kernel
> - make a CT
> - run it
> - try to hotplug a mp with any mountoption (ro, noatime, nosuid, noexec,
> nodev)
> - mount will fail with exit code 32
> - shutdown CT
> - boot CT
> - mp will be created, it will fail to mount properly and CT won't start.
> - remove mp, CT will start again.
> 
> see attached lxc.log and journal.log
> 
> On Tue, Nov 19, 2019 at 10:34:32AM +0100, Wolfgang Bumiller wrote:
> > Changes to v2:
> > * Factor `walk_tree_nofollow` to be usable with fds as starting point.
> > * Create destination directory entries (this was completely missing in
> >   the staged code path api).
> > * Test for new kernel api with `move_mount` instead of `fsopen` since
> >   we don't actually use `fsopen` currently.
> > * Factor out `mountpoint_insert_staged()` to be used from the pre-start
> >   hook & hotplug code (this is where the directory tree creation was
> >   added)
> > * Rename vmconfig_apply_pending_mountpoint to just apply_pending_mountpoint.
> > * Switch into the `/usr/bin/lxc-start` apparmor profile for mount point
> >   hotplugging. (Otherwise hotplugging can potentially allow more options
> >   than we can use later at a normal container startup.)
> > 
> > Previous changes from v1 to v2:
> > * Add a helper to LXC::PVE::Tools to check for availability of the new
> >   mount api (new patch 1), and use that in the prestart hook and mount
> >   functions.
> > * Add a check to the mount hotplug code to not attempt to perform
> >   hotplugging on older kernels.
> > 
> > Wolfgang Bumiller (12):
> >   tools: add can_use_new_mount_api helper
> >   split walk_tree_nofollow to allow a start fd
> >   implement "staged mountpoints"
> >   add mountpoint_insert_staged helper
> >   add open_pid_fd, open_lxc_pid, open_ppid helpers
> >   split open_namespace out of enter_namespace
> >   add get_container_namespace helper
> >   add mount stage directory helpers
> >   prestart-hook: use staged mountpoints on newer kernels
> >   config: apply_pending_mountpoint helper
> >   implement mountpoint hotplugging
> >   use lxc-start apparmor profile for mount hotplugging
> > 
> >  src/PVE/LXC.pm            | 232 +++++++++++++++++++++++++++++++++++---
> >  src/PVE/LXC/Config.pm     |  94 ++++++++++-----
> >  src/PVE/LXC/Tools.pm      |  18 +++
> >  src/lxc-pve-prestart-hook |  78 +++++++++++--
> >  4 files changed, 371 insertions(+), 51 deletions(-)
> > 
> > -- 
> > 2.20.1
> > 

> lxc-start 100 20191119152902.486 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536
> lxc-start 100 20191119152902.486 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536
> lxc-start 100 20191119152902.486 INFO     lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 100
> lxc-start 100 20191119152902.487 INFO     lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount  # comment this to allow umount -f;  not recommended"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38"
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO     seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context
> lxc-start 100 20191119152902.487 INFO     conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "100", config section "lxc"
> lxc-start 100 20191119152902.855 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: mount: /run/pve/mountpoints/mp1: cannot mount /dev/mapper/pve-vm--100--disk--2 read-only.
> 
> lxc-start 100 20191119152902.855 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: command 'mount -o nodev,noatime /dev/dm-10 /run/pve/mountpoints/mp1' failed: exit code 32
> 
> lxc-start 100 20191119152902.864 ERROR    conf - conf.c:run_buffer:352 - Script exited with status 32
> lxc-start 100 20191119152902.864 ERROR    start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "100"
> lxc-start 100 20191119152902.864 ERROR    start - start.c:__lxc_start:2032 - Failed to initialize container "100"
> lxc-start 100 20191119152902.872 DEBUG    lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 4558 exited
> lxc-start 100 20191119152902.872 ERROR    lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state
> lxc-start 100 20191119152902.872 ERROR    lxc_start - tools/lxc_start.c:main:329 - The container failed to start
> lxc-start 100 20191119152902.872 ERROR    lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode
> lxc-start 100 20191119152902.872 ERROR    lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options
> lxc-start 101 20191119154847.456 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536
> lxc-start 101 20191119154847.456 INFO     confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536
> lxc-start 101 20191119154847.456 INFO     lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 101
> lxc-start 101 20191119154847.456 INFO     lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount  # comment this to allow umount -f;  not recommended"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1"
> lxc-start 101 20191119154847.456 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38"
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO     seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context
> lxc-start 101 20191119154847.457 INFO     conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "101", config section "lxc"
> lxc-start 101 20191119154847.878 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: mount: /run/pve/mountpoints/mp5: cannot mount /dev/mapper/pve-vm--101--disk--6 read-only.
> 
> lxc-start 101 20191119154847.878 DEBUG    conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: command 'mount -o noatime /dev/dm-15 /run/pve/mountpoints/mp5' failed: exit code 32
> 
> lxc-start 101 20191119154847.886 ERROR    conf - conf.c:run_buffer:352 - Script exited with status 32
> lxc-start 101 20191119154847.886 ERROR    start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "101"
> lxc-start 101 20191119154847.886 ERROR    start - start.c:__lxc_start:2032 - Failed to initialize container "101"
> lxc-start 101 20191119154847.897 DEBUG    lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 13321 exited
> lxc-start 101 20191119154847.897 ERROR    lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state
> lxc-start 101 20191119154847.897 ERROR    lxc_start - tools/lxc_start.c:main:329 - The container failed to start
> lxc-start 101 20191119154847.897 ERROR    lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode
> lxc-start 101 20191119154847.897 ERROR    lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options

> -- A start job for unit pve-container at 101.service has begun execution.
> --
> -- The job identifier is 3591.
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-7): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-8): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-11): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-12): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-13): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-14): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime"
> Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime"
> Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:70): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime"
> Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:71): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime"
> Nov 19 16:53:21 mphotplug kernel: lxc-start[14554]: segfault at 50 ip 00007feca73b0f8b sp 00007fff068cb9d0 error 4 in liblxc.so.1.6.0[7feca7357000+8a000]
> Nov 19 16:53:21 mphotplug kernel: Code: 9b c0 ff ff 4d 85 ff 0f 85 82 02 00 00 66 90 48 8b 73 50 48 8b bb f8 00 00 00 e8 80 78 fa ff 4c 8b 74 24 10 48 89 de 4c 89 f7 <41> ff 56 50 4c 89 f7 48 89 de 41 ff 56 58 48 8b 83 f8 00 00 00 8b
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: lxccontainer.c: wait_on_daemonized_start: 865 No such file or directory - Failed to receive the container state
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 329 The container failed to start
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 332 To get more details, run the container in foreground mode
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 335 Additional information can be obtained by setting the --logfile and --logpriority options
> Nov 19 16:53:21 mphotplug systemd[1]: pve-container at 101.service: Control process exited, code=exited, status=1/FAILURE
> -- Subject: Unit process exited
> -- Defined-By: systemd
> -- Support: https://www.debian.org/support
> --
> -- An ExecStart= process belonging to unit pve-container at 101.service has exited.
> --
> -- The process' exit code is 'exited' and its exit status is 1.
> Nov 19 16:53:21 mphotplug systemd[1]: pve-container at 101.service: Failed with result 'exit-code'.
> 

> root at mphotplug:~# cat /etc/pve/lxc/101.conf
> arch: amd64
> cores: 1
> hostname: arch
> memory: 512
> mp0: local-lvm:vm-101-disk-1,mp=fsdf,size=1G
> mp1: local-lvm:vm-101-disk-2,mp=afkdjl,size=8G
> mp2: local-lvm:vm-101-disk-3,mp=sdfghj,size=1G
> mp3: local-lvm:vm-101-disk-4,mp=dfghjk,size=1G
> mp4: local-lvm:vm-101-disk-5,mp=dfghjkloijuhgfd,size=1G
> mp5: local-lvm:vm-101-disk-7,mp=/fsdfji4eowfjsdkl,mountoptions=noatime,size=8G
> net0: name=eth0,bridge=vmbr0,firewall=1,hwaddr=9E:F0:C2:CF:BE:39,ip=dhcp,type=veth
> ostype: archlinux
> rootfs: local-lvm:vm-101-disk-0,size=8G
> swap: 512
> unprivileged: 1
> unused0: local-lvm:vm-101-disk-6

> _______________________________________________
> pve-devel mailing list
> pve-devel at pve.proxmox.com
> https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel





More information about the pve-devel mailing list