command 'systemctl start pve-container@201' failed: exit code 1

ouaolegq

New Member
Mar 22, 2019
8
0
1
31
Job for pve-container@201.service failed because the control process exited with error code.
See "systemctl status pve-container@201.service" and "journalctl -xe" for details.
TASK ERROR: command 'systemctl start pve-container@201' failed: exit code 1

lxc-start 201 -o 201.log -l debug

lxc-start 201 20190322084955.290 INFO lxc_container - lxccontainer.c:do_lxcapi_start:939 - Attempting to set proc title to [lxc monitor] /var/lib/lxc 201
lxc-start 201 20190322084955.291 INFO lxc_lsm - lsm/lsm.c:lsm_init:46 - LSM security driver AppArmor
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .reject_force_umount # comment this to allow umount -f; not recommended
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for reject_force_umount # comment this to allow umount -f; not recommended action 0(kill)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for reject_force_umount action 0(kill)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .[all]
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .kexec_load errno 1
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for kexec_load errno 1 action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for kexec_load action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .open_by_handle_at errno 1
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for open_by_handle_at errno 1 action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for open_by_handle_at action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .init_module errno 1
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for init_module errno 1 action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for init_module action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .finit_module errno 1
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for finit_module errno 1 action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for finit_module action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .delete_module errno 1
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for delete_module errno 1 action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for delete_module action 327681(errno)
lxc-start 201 20190322084955.291 INFO lxc_seccomp - seccomp.c:parse_config_v2:775 - Merging in the compat Seccomp ctx into the main one
lxc-start 201 20190322084955.292 INFO lxc_conf - conf.c:run_script_argv:368 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "201", config section "lxc"
lxc-start 201 20190322084957.755 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 201 lxc pre-start with output: mount: /dev/loop12: can't read superblock

lxc-start 201 20190322084957.771 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 201 lxc pre-start with output: command 'mount /dev/loop12 /var/lib/lxc/201/rootfs//' failed: exit code 32

lxc-start 201 20190322084957.784 ERROR lxc_conf - conf.c:run_buffer:347 - Script exited with status 255
lxc-start 201 20190322084957.784 ERROR lxc_start - start.c:lxc_init:815 - Failed to run lxc.hook.pre-start for container "201"
lxc-start 201 20190322084957.784 ERROR lxc_start - start.c:__lxc_start:1849 - Failed to initialize container "201"
lxc-start 201 20190322084957.807 DEBUG lxc_container - lxccontainer.c:wait_on_daemonized_start:812 - First child 26496 exited
lxc-start 201 20190322084957.807 ERROR lxc_container - lxccontainer.c:wait_on_daemonized_start:815 - No such file or directory - Failed to receive the container state
 
lxc-start 201 20190322084957.755 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 201 lxc pre-start with output: mount: /dev/loop12: can't read superblock
maybe the container's image is corrupted?
try running a fsck with `pct fsck 201 --device rootfs` (check `man pct`)

hope this helps!
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!