Hello,
I've just updated to Proxmox 5.x and only two of a 20th of CT can start. The others ones fail. I also have a VM which work great.
I've tried to run pct fsck 102 in case it was a fs error but I got this error :
Here is my CT 102 config :
And here are the log when i run lxc-start -lDEBUG -o /var/log/lxcErr.log -F -n 102 :
I hope I've provided all necessary informations.
TMG
PS : I can create and run new CT without any problem
I've just updated to Proxmox 5.x and only two of a 20th of CT can start. The others ones fail. I also have a VM which work great.
I've tried to run pct fsck 102 in case it was a fs error but I got this error :
Code:
unable to run fsck for 'ssd:subvol-102-disk-1' (format == subvol)
Here is my CT 102 config :
Code:
arch: amd64
cores: 1
cpulimit: 8
cpuunits: 4096
hostname: Plex
memory: 4096
net0: bridge=vmbr0,gw=192.168.0.1,hwaddr=32:32:32:39:35:61,ip=192.168.0.102/24,name=eth0,type=veth
onboot: 1
ostype: debian
rootfs: ssd:subvol-102-disk-1,size=14G
swap: 512
And here are the log when i run lxc-start -lDEBUG -o /var/log/lxcErr.log -F -n 102 :
Code:
lxc-start 102 20180112225943.991 INFO lxc_start_ui - tools/lxc_start.c:main:280 - using rcfile /var/lib/lxc/102/config
lxc-start 102 20180112225943.991 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:610 - Adding native rule for reject_force_umount action 0(kill).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:276 - Setting Seccomp rule to reject force umounts.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:614 - Adding compat rule for reject_force_umount action 0(kill).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:276 - Setting Seccomp rule to reject force umounts.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:276 - Setting Seccomp rule to reject force umounts.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .[all].
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .kexec_load errno 1.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:610 - Adding native rule for kexec_load action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:614 - Adding compat rule for kexec_load action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .open_by_handle_at errno 1.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:610 - Adding native rule for open_by_handle_at action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:614 - Adding compat rule for open_by_handle_at action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .init_module errno 1.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:610 - Adding native rule for init_module action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:614 - Adding compat rule for init_module action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .finit_module errno 1.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:610 - Adding native rule for finit_module action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:614 - Adding compat rule for finit_module action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:435 - processing: .delete_module errno 1.
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:610 - Adding native rule for delete_module action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:614 - Adding compat rule for delete_module action 327681(errno).
lxc-start 102 20180112225943.991 INFO lxc_seccomp - seccomp.c:parse_config_v2:624 - Merging in the compat Seccomp ctx into the main one.
lxc-start 102 20180112225943.991 INFO lxc_conf - conf.c:run_script_argv:457 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "102", config section "lxc".
lxc-start 102 20180112225944.436 DEBUG lxc_conf - conf.c:run_buffer:429 - Script /usr/share/lxc/hooks/lxc-pve-prestart-hook 102 lxc pre-start with output: unable to detect OS distribution
.
lxc-start 102 20180112225944.443 ERROR lxc_conf - conf.c:run_buffer:438 - Script exited with status 2.
lxc-start 102 20180112225944.443 ERROR lxc_start - start.c:lxc_init:651 - Failed to run lxc.hook.pre-start for container "102".
lxc-start 102 20180112225944.443 ERROR lxc_start - start.c:__lxc_start:1444 - Failed to initialize container "102".
lxc-start 102 20180112225944.443 ERROR lxc_start_ui - tools/lxc_start.c:main:371 - The container failed to start.
lxc-start 102 20180112225944.443 ERROR lxc_start_ui - tools/lxc_start.c:main:375 - Additional information can be obtained by setting the --logfile and --logpriority options.
I hope I've provided all necessary informations.
TMG
PS : I can create and run new CT without any problem