[pve-devel] [PATCH v3 ct 00/12] mount hotplugging & new mount api
Oguz Bektas
o.bektas at proxmox.com
Tue Nov 19 17:51:25 CET 2019
On Tue, Nov 19, 2019 at 04:56:55PM +0100, Oguz Bektas wrote:
> hi,
>
> this breaks mounting with mountopts. (hotplug and normal mount)
testing with the older kernel now. hotplugging isn't supported because
of the old version, but we can actually mount mps with mountoptions with
the older kernel.
>
> reproduce:
> - install new kernel
> - make a CT
> - run it
> - try to hotplug a mp with any mountoption (ro, noatime, nosuid, noexec,
> nodev)
> - mount will fail with exit code 32
> - shutdown CT
> - boot CT
> - mp will be created, it will fail to mount properly and CT won't start.
> - remove mp, CT will start again.
>
> see attached lxc.log and journal.log
>
> On Tue, Nov 19, 2019 at 10:34:32AM +0100, Wolfgang Bumiller wrote:
> > Changes to v2:
> > * Factor `walk_tree_nofollow` to be usable with fds as starting point.
> > * Create destination directory entries (this was completely missing in
> > the staged code path api).
> > * Test for new kernel api with `move_mount` instead of `fsopen` since
> > we don't actually use `fsopen` currently.
> > * Factor out `mountpoint_insert_staged()` to be used from the pre-start
> > hook & hotplug code (this is where the directory tree creation was
> > added)
> > * Rename vmconfig_apply_pending_mountpoint to just apply_pending_mountpoint.
> > * Switch into the `/usr/bin/lxc-start` apparmor profile for mount point
> > hotplugging. (Otherwise hotplugging can potentially allow more options
> > than we can use later at a normal container startup.)
> >
> > Previous changes from v1 to v2:
> > * Add a helper to LXC::PVE::Tools to check for availability of the new
> > mount api (new patch 1), and use that in the prestart hook and mount
> > functions.
> > * Add a check to the mount hotplug code to not attempt to perform
> > hotplugging on older kernels.
> >
> > Wolfgang Bumiller (12):
> > tools: add can_use_new_mount_api helper
> > split walk_tree_nofollow to allow a start fd
> > implement "staged mountpoints"
> > add mountpoint_insert_staged helper
> > add open_pid_fd, open_lxc_pid, open_ppid helpers
> > split open_namespace out of enter_namespace
> > add get_container_namespace helper
> > add mount stage directory helpers
> > prestart-hook: use staged mountpoints on newer kernels
> > config: apply_pending_mountpoint helper
> > implement mountpoint hotplugging
> > use lxc-start apparmor profile for mount hotplugging
> >
> > src/PVE/LXC.pm | 232 +++++++++++++++++++++++++++++++++++---
> > src/PVE/LXC/Config.pm | 94 ++++++++++-----
> > src/PVE/LXC/Tools.pm | 18 +++
> > src/lxc-pve-prestart-hook | 78 +++++++++++--
> > 4 files changed, 371 insertions(+), 51 deletions(-)
> >
> > --
> > 2.20.1
> >
> lxc-start 100 20191119152902.486 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536
> lxc-start 100 20191119152902.486 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536
> lxc-start 100 20191119152902.486 INFO lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 100
> lxc-start 100 20191119152902.487 INFO lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount # comment this to allow umount -f; not recommended"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38"
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno)
> lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context
> lxc-start 100 20191119152902.487 INFO conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "100", config section "lxc"
> lxc-start 100 20191119152902.855 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: mount: /run/pve/mountpoints/mp1: cannot mount /dev/mapper/pve-vm--100--disk--2 read-only.
>
> lxc-start 100 20191119152902.855 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: command 'mount -o nodev,noatime /dev/dm-10 /run/pve/mountpoints/mp1' failed: exit code 32
>
> lxc-start 100 20191119152902.864 ERROR conf - conf.c:run_buffer:352 - Script exited with status 32
> lxc-start 100 20191119152902.864 ERROR start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "100"
> lxc-start 100 20191119152902.864 ERROR start - start.c:__lxc_start:2032 - Failed to initialize container "100"
> lxc-start 100 20191119152902.872 DEBUG lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 4558 exited
> lxc-start 100 20191119152902.872 ERROR lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state
> lxc-start 100 20191119152902.872 ERROR lxc_start - tools/lxc_start.c:main:329 - The container failed to start
> lxc-start 100 20191119152902.872 ERROR lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode
> lxc-start 100 20191119152902.872 ERROR lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options
> lxc-start 101 20191119154847.456 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536
> lxc-start 101 20191119154847.456 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536
> lxc-start 101 20191119154847.456 INFO lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 101
> lxc-start 101 20191119154847.456 INFO lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount # comment this to allow umount -f; not recommended"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno)
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1"
> lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38"
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno)
> lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context
> lxc-start 101 20191119154847.457 INFO conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "101", config section "lxc"
> lxc-start 101 20191119154847.878 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: mount: /run/pve/mountpoints/mp5: cannot mount /dev/mapper/pve-vm--101--disk--6 read-only.
>
> lxc-start 101 20191119154847.878 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: command 'mount -o noatime /dev/dm-15 /run/pve/mountpoints/mp5' failed: exit code 32
>
> lxc-start 101 20191119154847.886 ERROR conf - conf.c:run_buffer:352 - Script exited with status 32
> lxc-start 101 20191119154847.886 ERROR start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "101"
> lxc-start 101 20191119154847.886 ERROR start - start.c:__lxc_start:2032 - Failed to initialize container "101"
> lxc-start 101 20191119154847.897 DEBUG lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 13321 exited
> lxc-start 101 20191119154847.897 ERROR lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state
> lxc-start 101 20191119154847.897 ERROR lxc_start - tools/lxc_start.c:main:329 - The container failed to start
> lxc-start 101 20191119154847.897 ERROR lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode
> lxc-start 101 20191119154847.897 ERROR lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options
> -- A start job for unit pve-container at 101.service has begun execution.
> --
> -- The job identifier is 3591.
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-7): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-8): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-11): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-12): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-13): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-14): mounted filesystem with ordered data mode. Opts: (null)
> Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime"
> Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime"
> Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:70): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime"
> Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:71): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime"
> Nov 19 16:53:21 mphotplug kernel: lxc-start[14554]: segfault at 50 ip 00007feca73b0f8b sp 00007fff068cb9d0 error 4 in liblxc.so.1.6.0[7feca7357000+8a000]
> Nov 19 16:53:21 mphotplug kernel: Code: 9b c0 ff ff 4d 85 ff 0f 85 82 02 00 00 66 90 48 8b 73 50 48 8b bb f8 00 00 00 e8 80 78 fa ff 4c 8b 74 24 10 48 89 de 4c 89 f7 <41> ff 56 50 4c 89 f7 48 89 de 41 ff 56 58 48 8b 83 f8 00 00 00 8b
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: lxccontainer.c: wait_on_daemonized_start: 865 No such file or directory - Failed to receive the container state
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 329 The container failed to start
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 332 To get more details, run the container in foreground mode
> Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 335 Additional information can be obtained by setting the --logfile and --logpriority options
> Nov 19 16:53:21 mphotplug systemd[1]: pve-container at 101.service: Control process exited, code=exited, status=1/FAILURE
> -- Subject: Unit process exited
> -- Defined-By: systemd
> -- Support: https://www.debian.org/support
> --
> -- An ExecStart= process belonging to unit pve-container at 101.service has exited.
> --
> -- The process' exit code is 'exited' and its exit status is 1.
> Nov 19 16:53:21 mphotplug systemd[1]: pve-container at 101.service: Failed with result 'exit-code'.
>
> root at mphotplug:~# cat /etc/pve/lxc/101.conf
> arch: amd64
> cores: 1
> hostname: arch
> memory: 512
> mp0: local-lvm:vm-101-disk-1,mp=fsdf,size=1G
> mp1: local-lvm:vm-101-disk-2,mp=afkdjl,size=8G
> mp2: local-lvm:vm-101-disk-3,mp=sdfghj,size=1G
> mp3: local-lvm:vm-101-disk-4,mp=dfghjk,size=1G
> mp4: local-lvm:vm-101-disk-5,mp=dfghjkloijuhgfd,size=1G
> mp5: local-lvm:vm-101-disk-7,mp=/fsdfji4eowfjsdkl,mountoptions=noatime,size=8G
> net0: name=eth0,bridge=vmbr0,firewall=1,hwaddr=9E:F0:C2:CF:BE:39,ip=dhcp,type=veth
> ostype: archlinux
> rootfs: local-lvm:vm-101-disk-0,size=8G
> swap: 512
> unprivileged: 1
> unused0: local-lvm:vm-101-disk-6
> _______________________________________________
> pve-devel mailing list
> pve-devel at pve.proxmox.com
> https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
More information about the pve-devel
mailing list