Hello,
today I install an lxc Container with Debian 9.02 and do an dist-upgrade, now I am not able to start the container anymore because I get the Error Message
and the log contains:
I hope this will be fixed in proxmox ASAP otherwise the usage of lxc in productive environment will not be possible!
Many thanks for your support in advance!
Guenter
today I install an lxc Container with Debian 9.02 and do an dist-upgrade, now I am not able to start the container anymore because I get the Error Message
Code:
#lxc-start -F -n 103 --logfile=lxc.log --logpriority=debug
unsupported debian version '9.1'
lxc-start: conf.c: run_buffer: 405 Script exited with status 25.
lxc-start: start.c: lxc_init: 450 Failed to run lxc.hook.pre-start for container "103".
lxc-start: start.c: __lxc_start: 1321 Failed to initialize container "103".
lxc-start: tools/lxc_start.c: main: 366 The container failed to start.
lxc-start: tools/lxc_start.c: main: 370 Additional information can be obtained by setting the --logfile and --logpriority options.
root@server:/mnt2/usr/local/Xeoma# lxc-start -n 103
lxc-start: tools/lxc_start.c: main: 366 The container failed to start.
lxc-start: tools/lxc_start.c: main: 368 To get more details, run the container in foreground mode.
lxc-start: tools/lxc_start.c: main: 370 Additional information can be obtained by setting the --logfile and --logpriority options
and the log contains:
lxc-start 20170722113609.552 INFO lxc_start_ui - tools/lxc_start.c:main:275 - using rcfile /var/lib/lxc/103/config
lxc-start 20170722113609.552 WARN lxc_confile - confile.c:config_pivotdir:1910 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 20170722113609.552 WARN lxc_start - start.c:lxc_check_inherited:238 - Inherited fd: 3.
lxc-start 20170722113609.552 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for reject_force_umount action 0.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for reject_force_umount action 0.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .[all].
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .kexec_load errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for kexec_load action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for kexec_load action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .open_by_handle_at errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for open_by_handle_at action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for open_by_handle_at action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .init_module errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for init_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for init_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .finit_module errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for finit_module action 327681.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for finit_module action 327681.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .delete_module errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for delete_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for delete_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:580 - Merging in the compat Seccomp ctx into the main one.
lxc-start 20170722113609.553 INFO lxc_conf - conf.c:run_script_argv:424 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "103", config section "lxc".
lxc-start 20170722113610.424 ERROR lxc_conf - conf.c:run_buffer:405 - Script exited with status 25.
lxc-start 20170722113610.425 ERROR lxc_start - start.c:lxc_init:450 - Failed to run lxc.hook.pre-start for container "103".
lxc-start 20170722113610.426 ERROR lxc_start - start.c:__lxc_start:1321 - Failed to initialize container "103".
lxc-start 20170722113610.426 ERROR lxc_start_ui - tools/lxc_start.c:main:366 - The container failed to start.
lxc-start 20170722113610.426 ERROR lxc_start_ui - tools/lxc_start.c:main:370 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start 20170722113658.218 INFO lxc_start_ui - tools/lxc_start.c:main:275 - using rcfile /var/lib/lxc/103/config
lxc-start 20170722113658.219 WARN lxc_confile - confile.c:config_pivotdir:1910 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 20170722113658.225 WARN lxc_start - start.c:lxc_check_inherited:238 - Inherited fd: 3.
lxc-start 20170722113658.225 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for reject_force_umount action 0.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for reject_force_umount action 0.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .[all].
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .kexec_load errno 1.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for kexec_load action 327681.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for kexec_load action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .open_by_handle_at errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for open_by_handle_at action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for open_by_handle_at action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .init_module errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for init_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for init_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .finit_module errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for finit_module action 327681.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for finit_module action 327681.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .delete_module errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for delete_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for delete_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:580 - Merging in the compat Seccomp ctx into the main one.
lxc-start 20170722113658.227 INFO lxc_conf - conf.c:run_script_argv:424 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "103", config section "lxc".
lxc-start 20170722113658.504 ERROR lxc_conf - conf.c:run_buffer:405 - Script exited with status 25.
lxc-start 20170722113658.504 ERROR lxc_start - start.c:lxc_init:450 - Failed to run lxc.hook.pre-start for container "103".
lxc-start 20170722113658.504 ERROR lxc_start - start.c:__lxc_start:1321 - Failed to initialize container "103".
lxc-start 20170722113658.504 ERROR lxc_start_ui - tools/lxc_start.c:main:366 - The container failed to start.
lxc-start 20170722113658.504 ERROR lxc_start_ui - tools/lxc_start.c:main:370 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start 20170722114935.859 INFO lxc_start_ui - tools/lxc_start.c:main:275 - using rcfile /var/lib/lxc/103/config
lxc-start 20170722114935.860 WARN lxc_confile - confile.c:config_pivotdir:1910 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 20170722114935.867 WARN lxc_start - start.c:lxc_check_inherited:238 - Inherited fd: 3.
lxc-start 20170722114935.867 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for reject_force_umount action 0.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for reject_force_umount action 0.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .[all].
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .kexec_load errno 1.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for kexec_load action 327681.
lxc-start 20170722113609.552 WARN lxc_confile - confile.c:config_pivotdir:1910 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 20170722113609.552 WARN lxc_start - start.c:lxc_check_inherited:238 - Inherited fd: 3.
lxc-start 20170722113609.552 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for reject_force_umount action 0.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for reject_force_umount action 0.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .[all].
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .kexec_load errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for kexec_load action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for kexec_load action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .open_by_handle_at errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for open_by_handle_at action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for open_by_handle_at action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .init_module errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for init_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for init_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .finit_module errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for finit_module action 327681.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for finit_module action 327681.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113609.553 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .delete_module errno 1.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for delete_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for delete_module action 327681.
lxc-start 20170722113609.553 INFO lxc_seccomp - seccomp.carse_config_v2:580 - Merging in the compat Seccomp ctx into the main one.
lxc-start 20170722113609.553 INFO lxc_conf - conf.c:run_script_argv:424 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "103", config section "lxc".
lxc-start 20170722113610.424 ERROR lxc_conf - conf.c:run_buffer:405 - Script exited with status 25.
lxc-start 20170722113610.425 ERROR lxc_start - start.c:lxc_init:450 - Failed to run lxc.hook.pre-start for container "103".
lxc-start 20170722113610.426 ERROR lxc_start - start.c:__lxc_start:1321 - Failed to initialize container "103".
lxc-start 20170722113610.426 ERROR lxc_start_ui - tools/lxc_start.c:main:366 - The container failed to start.
lxc-start 20170722113610.426 ERROR lxc_start_ui - tools/lxc_start.c:main:370 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start 20170722113658.218 INFO lxc_start_ui - tools/lxc_start.c:main:275 - using rcfile /var/lib/lxc/103/config
lxc-start 20170722113658.219 WARN lxc_confile - confile.c:config_pivotdir:1910 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 20170722113658.225 WARN lxc_start - start.c:lxc_check_inherited:238 - Inherited fd: 3.
lxc-start 20170722113658.225 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for reject_force_umount action 0.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for reject_force_umount action 0.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .[all].
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .kexec_load errno 1.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for kexec_load action 327681.
lxc-start 20170722113658.226 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for kexec_load action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .open_by_handle_at errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for open_by_handle_at action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for open_by_handle_at action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .init_module errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for init_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for init_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .finit_module errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for finit_module action 327681.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for finit_module action 327681.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:270 - Seccomp: got negative for syscall: -10085: finit_module.
lxc-start 20170722113658.227 WARN lxc_seccomp - seccomp.c:do_resolve_add_rule:271 - This syscall will NOT be blacklisted.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .delete_module errno 1.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for delete_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for delete_module action 327681.
lxc-start 20170722113658.227 INFO lxc_seccomp - seccomp.carse_config_v2:580 - Merging in the compat Seccomp ctx into the main one.
lxc-start 20170722113658.227 INFO lxc_conf - conf.c:run_script_argv:424 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "103", config section "lxc".
lxc-start 20170722113658.504 ERROR lxc_conf - conf.c:run_buffer:405 - Script exited with status 25.
lxc-start 20170722113658.504 ERROR lxc_start - start.c:lxc_init:450 - Failed to run lxc.hook.pre-start for container "103".
lxc-start 20170722113658.504 ERROR lxc_start - start.c:__lxc_start:1321 - Failed to initialize container "103".
lxc-start 20170722113658.504 ERROR lxc_start_ui - tools/lxc_start.c:main:366 - The container failed to start.
lxc-start 20170722113658.504 ERROR lxc_start_ui - tools/lxc_start.c:main:370 - Additional information can be obtained by setting the --logfile and --logpriority options.
lxc-start 20170722114935.859 INFO lxc_start_ui - tools/lxc_start.c:main:275 - using rcfile /var/lib/lxc/103/config
lxc-start 20170722114935.860 WARN lxc_confile - confile.c:config_pivotdir:1910 - lxc.pivotdir is ignored. It will soon become an error.
lxc-start 20170722114935.867 WARN lxc_start - start.c:lxc_check_inherited:238 - Inherited fd: 3.
lxc-start 20170722114935.867 INFO lxc_lsm - lsm/lsm.c:lsm_init:48 - LSM security driver AppArmor
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .reject_force_umount # comment this to allow umount -f; not recommended.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for reject_force_umount action 0.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:570 - Adding compat rule for reject_force_umount action 0.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.c:do_resolve_add_rule:251 - Setting Seccomp rule to reject force umounts.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .[all].
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:402 - processing: .kexec_load errno 1.
lxc-start 20170722114935.868 INFO lxc_seccomp - seccomp.carse_config_v2:567 - Adding native rule for kexec_load action 327681.
I hope this will be fixed in proxmox ASAP otherwise the usage of lxc in productive environment will not be possible!
Many thanks for your support in advance!
Guenter