LXC container won't start

Robertas

New Member
May 5, 2016
19
0
1
32
I am using lxc containers on nfs storage. It was working well, until yesterday I had to restart my NFS server and proxmox won't boot my existing containers. I can create a new container which does boot up, but it won't start existing containers.

I am getting:
Code:
lxc-start: lxc_start.c: main: 344 The container failed to start.
lxc-start: lxc_start.c: main: 346 To get more details, run the container in foreground mode.
lxc-start: lxc_start.c: main: 348 Additional information can be obtained by setting the --logfile and --logpriority options.
TASK ERROR: command 'lxc-start -n 104' failed: exit code 1


I've tried starting them via lxc-start -n 444 -F --logfile=lxc.log --logpriority=debug
Code:
lxc-start 1463041070.075 INFO  lxc_start_ui - lxc_start.c:main:264 - using rcfile /var/lib/lxc/104/config
  lxc-start 1463041070.075 WARN  lxc_confile - confile.c:config_pivotdir:1817 - lxc.pivotdir is ignored.  It will soon become an error.
  lxc-start 1463041070.077 WARN  lxc_cgmanager - cgmanager.c:cgm_get:994 - do_cgm_get exited with error
  lxc-start 1463041070.077 INFO  lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .reject_force_umount  # comment this to allow umount -f;  not recommended.
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for reject_force_umount action 0
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts

  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for reject_force_umount action 0
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:do_resolve_add_rule:216 - Setting seccomp rule to reject force umounts

  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .[all].
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .kexec_load errno 1.
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for kexec_load action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for kexec_load action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .open_by_handle_at errno 1.
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for open_by_handle_at action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for open_by_handle_at action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .init_module errno 1.
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for init_module action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for init_module action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .finit_module errno 1.
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for finit_module action 327681
  lxc-start 1463041070.078 WARN  lxc_seccomp - seccomp.c:do_resolve_add_rule:233 - Seccomp: got negative # for syscall: finit_module
  lxc-start 1463041070.078 WARN  lxc_seccomp - seccomp.c:do_resolve_add_rule:234 - This syscall will NOT be blacklisted
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for finit_module action 327681
  lxc-start 1463041070.078 WARN  lxc_seccomp - seccomp.c:do_resolve_add_rule:233 - Seccomp: got negative # for syscall: finit_module
  lxc-start 1463041070.078 WARN  lxc_seccomp - seccomp.c:do_resolve_add_rule:234 - This syscall will NOT be blacklisted
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:324 - processing: .delete_module errno 1.
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:426 - Adding native rule for delete_module action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:429 - Adding compat rule for delete_module action 327681
  lxc-start 1463041070.078 INFO  lxc_seccomp - seccomp.c:parse_config_v2:436 - Merging in the compat seccomp ctx into the main one
  lxc-start 1463041070.078 INFO  lxc_conf - conf.c:run_script_argv:362 - Executing script '/usr/share/lxc/hooks/lxc-pve-prestart-hook' for container '104', config section 'lxc'
  lxc-start 1463041070.910 ERROR  lxc_conf - conf.c:run_buffer:342 - Script exited with status 255
  lxc-start 1463041070.910 ERROR  lxc_start - start.c:lxc_init:436 - failed to run pre-start hooks for container '104'.
  lxc-start 1463041070.910 ERROR  lxc_start - start.c:__lxc_start:1170 - failed to initialize the container
  lxc-start 1463041070.910 ERROR  lxc_start_ui - lxc_start.c:main:344 - The container failed to start.
  lxc-start 1463041070.910 ERROR  lxc_start_ui - lxc_start.c:main:348 - Additional information can be obtained by setting the --logfile and --logpriority options.
 
It seems my problem is the nfs server itself, my zfs filesystem is faulty which does return generic io error even if I try read the type of container disk, by running `file vm-xxx.raw`. Thanks for help!
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!