With PVE 6.4, I had functional tun/tap (think ZeroTier) inside privileged LXC with the following config:
In PVE 7, with or without
No failure messages are logged on the host system (apparmor, for example), but several of these:
Is there a guide for re-enabling node creation inside privileged containers? This has borked some of my LXC infrastructure. I'm happy to convert privileged back to unprivileged if required.
Code:
lxc.cgroup.devices.allow: c 10:200 rwm
lxc.mount.entry: /dev/net/tun dev/net/tun none bind,create=file
features: mknod=1
, ZeroTier now fails:zerotier-one[171]: ERROR: unable to configure virtual network port: could not open TUN/TAP device: No such file or directory
No failure messages are logged on the host system (apparmor, for example), but several of these:
[43177.694811] audit: type=1400 audit(1625803544.343:276): apparmor="STATUS" operation="profile_replace" info="not policy admin" error=-13 label="lxc-105_</var/lib/lxc>//&:lxc-105_<-var-lib-lxc>:unconfined" pid=438874 comm="apparmor_parser"
Is there a guide for re-enabling node creation inside privileged containers? This has borked some of my LXC infrastructure. I'm happy to convert privileged back to unprivileged if required.
Last edited: