Debian container doesn't boot

Miquel Nebot

New Member
Apr 28, 2018
6
0
1
47
Hello, good afternoon,
On Saturday the hypervisor was updated and since then a container based on Debian does not start. It is rare that there is another machine with Debian on the same host that boots. The error is as follows:

TASK ERROR: command 'systemctl start pve-container@100' failed: exit code 1

Can somebody help me? The hypervisor is up to date and I use the PVE repositories pve-no-subscription repository.

Thanks!
 
First issue... When I type "pct mount 100"...

View attachment 7556

And second... LOG shows:

lxc-start 100 20180601151601.287 INFO lxc_lsm - lsm/lsm.c:lsm_init:46 - LSM security driver AppArmor
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .reject_force_umount # comment this to allow umount -f; not recommended
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for reject_force_umount #comment this to allow umount -f; not recommended action 0(kill)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for reject_force_umount action 0(kill)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .[all]
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .kexec_load errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for kexec_load errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for kexec_load action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .open_by_handle_at errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for open_by_handle_at errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for open_by_handle_at action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .init_module errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for init_module errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for init_module action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .finit_module errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for finit_module errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for finit_module action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .delete_module errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for delete_module errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for delete_module action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:775 - Merging in the compat Seccomp ctx into the main one
lxc-start 100 20180601151601.287 INFO lxc_conf - conf.c:run_script_argv:368 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "100", config section "lxc"
lxc-start 100 20180601151602.788 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start with output: mount: /dev/loop1: can't read superblock

lxc-start 100 20180601151602.804 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start with output: command 'mount /dev/loop1 /var/lib/lxc/100/rootfs//' failed: exit code 32

lxc-start 100 20180601151602.812 ERROR lxc_conf - conf.c:run_buffer:347 - Script exited with status 255
lxc-start 100 20180601151602.812 ERROR lxc_start - start.c:lxc_init:815 - Failed to run lxc.hook.pre-start for container "100"
lxc-start 100 20180601151602.813 ERROR lxc_start - start.c:__lxc_start:1849 - Failed to initialize container "100"
 
Please give:
$ pct config 100
$ mount

run "$ journalctl -f" in extra tab, give output while running "pct mount 100"

$ pct config 100 shows:

root@pve2:~# pct config 100
arch: amd64cores: 2
hostname: vm0-deb9fs
lock: mountedmemory: 2048
net0: name=eth0,bridge=vmbr0,gw=192.168.1.1,hwaddr=BA:42:90:0F:26:24,ip=192.168.1.25/24,type=vethonboot: 1
ostype: debian
rootfs: local_hdd1:100/vm-100-disk-1.raw,size=1500Gstartup: order=1,up=30,down=0
swap: 512

$ mount shows:

sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)proc on /proc type proc (rw,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4001292k,nr_inodes=1000323,mode=755)devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=804436k,mode=755)/dev/mapper/pve-root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,relatime)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=41,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=2611)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
/dev/sdb1 on /mnt/intel2_ssd type ext4 (rw,nosuid,noexec,relatime,errors=remount-ro,data=ordered)
/dev/sdd1 on /mnt/hitachi2_hdd type ext4 (rw,nosuid,noexec,relatime,errors=remount-ro,data=ordered)
/dev/sdc1 on /mnt/hitachi1_hdd type ext4 (rw,nosuid,noexec,relatime,errors=remount-ro,data=ordered)
lxcfs on /var/lib/lxcfs type fuse.lxcfs (rw,nosuid,nodev,relatime,user_id=0,group_id=0,allow_other)
/dev/fuse on /etc/pve type fuse (rw,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions,allow_other)
tmpfs on /run/user/0 type tmpfs (rw,nosuid,nodev,relatime,size=804432k,mode=700)

$ journalctl -f shows:

Jun 01 17:29:30 pve2 systemd[14543]: Reached target Sockets.
Jun 01 17:29:30 pve2 systemd[14543]: Reached target Paths.
Jun 01 17:29:30 pve2 systemd[14543]: Reached target Basic System.
Jun 01 17:29:30 pve2 systemd[14543]: Reached target Default.
Jun 01 17:29:30 pve2 login[14557]: ROOT LOGIN on '/dev/pts/1'
Jun 01 17:29:30 pve2 systemd[14543]: Startup finished in 11ms.
Jun 01 17:29:30 pve2 systemd[1]: Started User Manager for UID 0.
Jun 01 17:29:50 pve2 pvedaemon[1598]: <root@pam> successful auth for user 'root@pam'
Jun 01 17:30:00 pve2 systemd[1]: Starting Proxmox VE replication runner...
Jun 01 17:30:00 pve2 systemd[1]: Started Proxmox VE replication runner.
Jun 01 17:30:41 pve2 pvedaemon[1599]: <root@pam> successful auth for user 'root@pam'
Jun 01 17:30:41 pve2 pvedaemon[14775]: starting termproxy UPID:pve2:000039B7:00820FE3:5B1166A1:vncshell::root@pam:
Jun 01 17:30:41 pve2 pvedaemon[1600]: <root@pam> starting task UPID:pve2:000039B7:00820FE3:5B1166A1:vncshell::root@pam:
Jun 01 17:30:41 pve2 pvedaemon[1599]: <root@pam> successful auth for user 'root@pam'
Jun 01 17:30:41 pve2 login[14780]: pam_unix(login:session): session opened for user root by (uid=0)
Jun 01 17:30:41 pve2 systemd-logind[939]: New session 60 of user root.
Jun 01 17:30:41 pve2 systemd[1]: Started Session 60 of user root.
Jun 01 17:30:41 pve2 login[14785]: ROOT LOGIN on '/dev/pts/2'
Jun 01 17:31:00 pve2 systemd[1]: Starting Proxmox VE replication runner...
Jun 01 17:31:00 pve2 systemd[1]: Started Proxmox VE replication runner.
Jun 01 17:31:37 pve2 pveproxy[1652]: worker 12534 finished
Jun 01 17:31:37 pve2 pveproxy[1652]: starting 1 worker(s)
Jun 01 17:31:37 pve2 pveproxy[1652]: worker 14972 started
Jun 01 17:31:41 pve2 pveproxy[14971]: got inotify poll request in wrong process - disabling inotify
Jun 01 17:32:00 pve2 systemd[1]: Starting Proxmox VE replication runner...
Jun 01 17:32:00 pve2 systemd[1]: Started Proxmox VE replication runner.
 
try:

mkdir /ct-100-test
mount -o loop -t ext4 /mnt/hitachi1_hdd/images/100/vm-100-disk-1.raw /ct-100-test

if you get that superblock error the image (and maybe the underlaying hw disk) is corrupted, have to ask coworkers what to do then.
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!