Search results for query: lxc.mount.entry

  1. E

    Proxmox VE 9.0 BETA released!

    ...ssd:vm-603-disk-0,size=100G swap: 512 tags: community-script;container unprivileged: 1 lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net/tun dev/net/tun none bind,create=file lxc.idmap: u 0 100000 165536 lxc.idmap: g 0 100000 165536 So yes, they both are enabled. The tun...
  2. B

    [SOLVED] Blank WebUI after Update to 8.4.5

    Hello Community, i have the same problem here. After Update pve-manager 8.4.4 to 8.4.5 When I call up the WebGUI, a blank screen appears. I cant do anything. What information can I provide to fix the problem? Best regards, Thomas /var/log/apt/term.log grep -C3 -Ei 'error|warn|fail'...
  3. R

    TrueNAS VM, autofs mount, dependent LXCs?

    Is this done on the host or LXC? When i try on lxc, i get permission denied for editing the fstab.
  4. A

    [SOLVED] Plex in LXC cannot perform HW Transcoding

    ...lxc.cgroup.devices.allow: c 195:* rwm lxc.cgroup.devices.allow: c 234:* rwm lxc.cgroup.devices.allow: c 226:* rwm lxc.mount.entry: /dev/dri/card0 dev/dri/card0 none bind,optional,create=file lxc.mount.entry: /dev/dri/card1 dev/dri/card1 none bind,optional,create=file lxc.mount.entry...
  5. 0

    ovpn_dco_v2 module to lxc unprivileged container for Openvpn.

    ...(running kernel: 6.8.8-2-pve)) even with this recommendation lxc.cgroup.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net dev/net none bind,create=dir features: nesting=1 Upd: after few restarts of an OpenVPN daemon the following errors disappeared: 2025-07-23 15:05:50...
  6. fireon

    ovpn_dco_v2 module to lxc unprivileged container for Openvpn.

    I use also OpenVPN on an unprivileged Ubuntu 24.04 CT. Packages come directly from the repositories. But I had to set this LXC features: lxc.cgroup.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net dev/net none bind,create=dir features: nesting=1 This allows openvpn to work normally here.
  7. Q

    [SOLVED] Proxmox VE 9.0 BETA LCX Docker not working

    Hey Guys, I updated to VE 9.0 Beta, and since then, my LCX Docker apps haven't been running. Every container is showing the same error message: Does anyone have a solution for this? PS: i m also not able to restore a backup
  8. R

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    Every time I restart the container, the Samba share gets disconnected, even though I made an entry in /etc/fstab. Is there another way to make the mount persistent?
  9. L

    Creating virtual joysticks using mknod in unprivileged container?

    ...ostype: debian rootfs: local-lvm:vm-110-disk-0,size=100G swap: 512 unprivileged: 1 lxc.mount.entry: /dev/input dev/input none bind,optional,create=dir lxc.mount.entry: /run/udev mnt/udev none bind,optional,create=dir lxc.cgroup2.devices.allow: b 13:* rwm lxc.cgroup2.devices.allow: c 13:* rwm...
  10. U

    jellyfin

    thank God it works. thank you very much:)
  11. M

    Proxmox LXC & ZeroTier

    ...1 features: keyctl=1,nesting=1 net0: name=eth0,bridge=vmbr0,firewall=1,type=veth lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net dev/net none bind,create=dir 0 0 lxc: /etc/network/interfaces conf auto eth0 iface eth0 inet manual auto br0 iface br0 inet static bridge_ports...
  12. M

    Proxmox LXC & ZeroTier

    ...wäre TUN) lxc.cgroup2.devices.allow: c 10:229 rwm # Mountet das TAP-Device vom Host in den Container. create=dir/file ist wichtig! lxc.mount.entry: /dev/net/tap dev/net/tap none bind,create=file,optional,create=dir 0 0 im lxc: systemctl disable --now systemd-networkd.service...
  13. groque

    jellyfin

    It looks like mp0 was added as /dev/sda1 inside the LXC, which is usually used for device mappings. Follow these steps instead:  Remove the wrong mount point In Resources → Mount Points delete the entry that maps mp0 to /dev/sda1. If your container is privileged, skip to step 5 Add explicit...
  14. M

    Proxmox LXC & ZeroTier

    ...swap: 512 unprivileged: 1 features: keyctl=1,nesting=1 lxc.apparmor.profile: unconfined lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net dev/net none bind,create=dir pve: chown 100000:100000 /dev/net/tun ausgeführt Teilerfolg. Das zt...-Interface wurde im neuen...
  15. news

    Proxmox LXC & ZeroTier

    ...ausführliche Antwort. Jetzt sehe ich den Weg der Pakete. Ich habe dieses Setting gefunden: lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net dev/net none bind,create=dir Bitte teste das in deiner LXC. ich hätte auf ein Fehlen eines Parameters abgezielt: features: nesting=1...
  16. M

    Proxmox LXC & ZeroTier

    ...onboot: 1 ostype: debian rootfs: roon:vm-100-disk-0,size=150G swap: 512 lxc.cgroup2.devices.allow: c 10:200 rwm lxc.mount.entry: /dev/net/tun dev/net/tun none bind,create=file 3. LXC Container (`100`) - `/etc/network/interfaces` (Hier existiert das `ztrf2vix7s`-Interface, erhält aber keine...
  17. P

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    The nobody issue was resolved as follows. The result is the same as adding a passthrough device in the resource menu below. #lxc.mount.entry: /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file dev0: /dev/dri/renderD128,gid=44,uid=0
  18. P

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    The nobody issue was resolved as follows. The result is the same as adding a passthrough device in the resource menu below. #lxc.mount.entry: /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file dev0: /dev/dri/renderD128,gid=44,uid=0
  19. Y

    Podman in rootless mode on LXC container

    I followed your guide and can successfully run podman in rootless mode. But now it has another problem which is whenever the LXC is rebooted and it shows Error: current system boot ID differs from cached boot ID; an unhandled reboot has occurred. Please delete directories...
  20. K

    Unable to initialize Google Coral USB Accelerator in LXC container (used to work)

    Try, temporarily, changing the lxc mount to: lxc.mount.entry: /dev/bus/usb dev/bus/usb none bind,optional,create=dir