Debian container doesn't boot

Miquel Nebot

New Member
Apr 28, 2018
6
0
1
48
Hello, good afternoon,
On Saturday the hypervisor was updated and since then a container based on Debian does not start. It is rare that there is another machine with Debian on the same host that boots. The error is as follows:

TASK ERROR: command 'systemctl start pve-container@100' failed: exit code 1

Can somebody help me? The hypervisor is up to date and I use the PVE repositories pve-no-subscription repository.

Thanks!
 
First issue... When I type "pct mount 100"...

View attachment 7556

And second... LOG shows:

lxc-start 100 20180601151601.287 INFO lxc_lsm - lsm/lsm.c:lsm_init:46 - LSM security driver AppArmor
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .reject_force_umount # comment this to allow umount -f; not recommended
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for reject_force_umount #comment this to allow umount -f; not recommended action 0(kill)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for reject_force_umount action 0(kill)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:411 - Setting Seccomp rule to reject force umounts
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .[all]
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .kexec_load errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for kexec_load errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for kexec_load action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .open_by_handle_at errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for open_by_handle_at errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for open_by_handle_at action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .init_module errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for init_module errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for init_module action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .finit_module errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for finit_module errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for finit_module action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:585 - processing: .delete_module errno 1
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:761 - Adding native rule for delete_module errno 1 action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:765 - Adding compat rule for delete_module action 327681(errno)
lxc-start 100 20180601151601.287 INFO lxc_seccomp - seccomp.c:parse_config_v2:775 - Merging in the compat Seccomp ctx into the main one
lxc-start 100 20180601151601.287 INFO lxc_conf - conf.c:run_script_argv:368 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "100", config section "lxc"
lxc-start 100 20180601151602.788 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start with output: mount: /dev/loop1: can't read superblock

lxc-start 100 20180601151602.804 DEBUG lxc_conf - conf.c:run_buffer:338 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start with output: command 'mount /dev/loop1 /var/lib/lxc/100/rootfs//' failed: exit code 32

lxc-start 100 20180601151602.812 ERROR lxc_conf - conf.c:run_buffer:347 - Script exited with status 255
lxc-start 100 20180601151602.812 ERROR lxc_start - start.c:lxc_init:815 - Failed to run lxc.hook.pre-start for container "100"
lxc-start 100 20180601151602.813 ERROR lxc_start - start.c:__lxc_start:1849 - Failed to initialize container "100"
 
Please give:
$ pct config 100
$ mount

run "$ journalctl -f" in extra tab, give output while running "pct mount 100"

$ pct config 100 shows:

root@pve2:~# pct config 100
arch: amd64cores: 2
hostname: vm0-deb9fs
lock: mountedmemory: 2048
net0: name=eth0,bridge=vmbr0,gw=192.168.1.1,hwaddr=BA:42:90:0F:26:24,ip=192.168.1.25/24,type=vethonboot: 1
ostype: debian
rootfs: local_hdd1:100/vm-100-disk-1.raw,size=1500Gstartup: order=1,up=30,down=0
swap: 512

$ mount shows:

sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)proc on /proc type proc (rw,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4001292k,nr_inodes=1000323,mode=755)devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=804436k,mode=755)/dev/mapper/pve-root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,relatime)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=41,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=2611)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
/dev/sdb1 on /mnt/intel2_ssd type ext4 (rw,nosuid,noexec,relatime,errors=remount-ro,data=ordered)
/dev/sdd1 on /mnt/hitachi2_hdd type ext4 (rw,nosuid,noexec,relatime,errors=remount-ro,data=ordered)
/dev/sdc1 on /mnt/hitachi1_hdd type ext4 (rw,nosuid,noexec,relatime,errors=remount-ro,data=ordered)
lxcfs on /var/lib/lxcfs type fuse.lxcfs (rw,nosuid,nodev,relatime,user_id=0,group_id=0,allow_other)
/dev/fuse on /etc/pve type fuse (rw,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions,allow_other)
tmpfs on /run/user/0 type tmpfs (rw,nosuid,nodev,relatime,size=804432k,mode=700)

$ journalctl -f shows:

Jun 01 17:29:30 pve2 systemd[14543]: Reached target Sockets.
Jun 01 17:29:30 pve2 systemd[14543]: Reached target Paths.
Jun 01 17:29:30 pve2 systemd[14543]: Reached target Basic System.
Jun 01 17:29:30 pve2 systemd[14543]: Reached target Default.
Jun 01 17:29:30 pve2 login[14557]: ROOT LOGIN on '/dev/pts/1'
Jun 01 17:29:30 pve2 systemd[14543]: Startup finished in 11ms.
Jun 01 17:29:30 pve2 systemd[1]: Started User Manager for UID 0.
Jun 01 17:29:50 pve2 pvedaemon[1598]: <root@pam> successful auth for user 'root@pam'
Jun 01 17:30:00 pve2 systemd[1]: Starting Proxmox VE replication runner...
Jun 01 17:30:00 pve2 systemd[1]: Started Proxmox VE replication runner.
Jun 01 17:30:41 pve2 pvedaemon[1599]: <root@pam> successful auth for user 'root@pam'
Jun 01 17:30:41 pve2 pvedaemon[14775]: starting termproxy UPID:pve2:000039B7:00820FE3:5B1166A1:vncshell::root@pam:
Jun 01 17:30:41 pve2 pvedaemon[1600]: <root@pam> starting task UPID:pve2:000039B7:00820FE3:5B1166A1:vncshell::root@pam:
Jun 01 17:30:41 pve2 pvedaemon[1599]: <root@pam> successful auth for user 'root@pam'
Jun 01 17:30:41 pve2 login[14780]: pam_unix(login:session): session opened for user root by (uid=0)
Jun 01 17:30:41 pve2 systemd-logind[939]: New session 60 of user root.
Jun 01 17:30:41 pve2 systemd[1]: Started Session 60 of user root.
Jun 01 17:30:41 pve2 login[14785]: ROOT LOGIN on '/dev/pts/2'
Jun 01 17:31:00 pve2 systemd[1]: Starting Proxmox VE replication runner...
Jun 01 17:31:00 pve2 systemd[1]: Started Proxmox VE replication runner.
Jun 01 17:31:37 pve2 pveproxy[1652]: worker 12534 finished
Jun 01 17:31:37 pve2 pveproxy[1652]: starting 1 worker(s)
Jun 01 17:31:37 pve2 pveproxy[1652]: worker 14972 started
Jun 01 17:31:41 pve2 pveproxy[14971]: got inotify poll request in wrong process - disabling inotify
Jun 01 17:32:00 pve2 systemd[1]: Starting Proxmox VE replication runner...
Jun 01 17:32:00 pve2 systemd[1]: Started Proxmox VE replication runner.
 
try:

mkdir /ct-100-test
mount -o loop -t ext4 /mnt/hitachi1_hdd/images/100/vm-100-disk-1.raw /ct-100-test

if you get that superblock error the image (and maybe the underlaying hw disk) is corrupted, have to ask coworkers what to do then.