Advertisement
Guest User

Untitled

a guest
Dec 1st, 2021
63
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.09 KB | None | 0 0
  1. lxc-start 105 20211201135933.946 INFO confile - confile.c:set_config_idmaps:2092 - Read uid map: type u nsid 0 hostid 100000 range 65536
  2. lxc-start 105 20211201135933.946 INFO confile - confile.c:set_config_idmaps:2092 - Read uid map: type g nsid 0 hostid 100000 range 65536
  3. lxc-start 105 20211201135933.946 INFO lsm - lsm/lsm.c:lsm_init_static:40 - Initialized LSM security driver AppArmor
  4. lxc-start 105 20211201135933.946 INFO conf - conf.c:run_script_argv:332 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "105", config section "lxc"
  5. lxc-start 105 20211201135934.516 DEBUG terminal - terminal.c:lxc_terminal_peer_default:672 - Using terminal "/dev/tty" as proxy
  6. lxc-start 105 20211201135934.516 DEBUG terminal - terminal.c:lxc_terminal_winsz:60 - Set window size to 237 columns and 63 rows
  7. lxc-start 105 20211201135934.519 DEBUG seccomp - seccomp.c:parse_config_v2:656 - Host native arch is [3221225534]
  8. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "reject_force_umount # comment this to allow umount -f; not recommended"
  9. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
  10. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
  11. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
  12. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "[all]"
  13. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "kexec_load errno 1"
  14. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[246:kexec_load] action[327681:errno] arch[0]
  15. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[246:kexec_load] action[327681:errno] arch[1073741827]
  16. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[246:kexec_load] action[327681:errno] arch[1073741886]
  17. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "open_by_handle_at errno 1"
  18. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[304:open_by_handle_at] action[327681:errno] arch[0]
  19. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[304:open_by_handle_at] action[327681:errno] arch[1073741827]
  20. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[304:open_by_handle_at] action[327681:errno] arch[1073741886]
  21. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "init_module errno 1"
  22. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[175:init_module] action[327681:errno] arch[0]
  23. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[175:init_module] action[327681:errno] arch[1073741827]
  24. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[175:init_module] action[327681:errno] arch[1073741886]
  25. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "finit_module errno 1"
  26. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[313:finit_module] action[327681:errno] arch[0]
  27. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[313:finit_module] action[327681:errno] arch[1073741827]
  28. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[313:finit_module] action[327681:errno] arch[1073741886]
  29. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "delete_module errno 1"
  30. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[176:delete_module] action[327681:errno] arch[0]
  31. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[176:delete_module] action[327681:errno] arch[1073741827]
  32. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[176:delete_module] action[327681:errno] arch[1073741886]
  33. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "ioctl errno 1 [1,0x9400,SCMP_CMP_MASKED_EQ,0xff00]"
  34. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:547 - arg_cmp[0]: SCMP_CMP(1, 7, 65280, 37888)
  35. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[16:ioctl] action[327681:errno] arch[0]
  36. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:547 - arg_cmp[0]: SCMP_CMP(1, 7, 65280, 37888)
  37. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[16:ioctl] action[327681:errno] arch[1073741827]
  38. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:547 - arg_cmp[0]: SCMP_CMP(1, 7, 65280, 37888)
  39. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[16:ioctl] action[327681:errno] arch[1073741886]
  40. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:807 - Processing "keyctl errno 38"
  41. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding native rule for syscall[250:keyctl] action[327718:errno] arch[0]
  42. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[250:keyctl] action[327718:errno] arch[1073741827]
  43. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:do_resolve_add_rule:564 - Adding compat rule for syscall[250:keyctl] action[327718:errno] arch[1073741886]
  44. lxc-start 105 20211201135934.519 INFO seccomp - seccomp.c:parse_config_v2:1017 - Merging compat seccomp contexts into main context
  45. lxc-start 105 20211201135934.670 INFO start - start.c:lxc_init:855 - Container "105" is initialized
  46. lxc-start 105 20211201135934.686 INFO cgfsng - cgroups/cgfsng.c:cgfsng_monitor_create:1064 - The monitor process uses "lxc.monitor/105" as cgroup
  47. lxc-start 105 20211201135934.686 DEBUG storage - storage/storage.c:storage_query:233 - Detected rootfs type "dir"
  48. lxc-start 105 20211201135934.686 DEBUG storage - storage/storage.c:storage_query:233 - Detected rootfs type "dir"
  49. lxc-start 105 20211201135934.686 INFO cgfsng - cgroups/cgfsng.c:cgfsng_payload_create:1172 - The container process uses "lxc/105/ns" as inner and "lxc/105" as limit cgroup
  50. lxc-start 105 20211201135934.687 INFO start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWUSER
  51. lxc-start 105 20211201135934.687 INFO start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWNS
  52. lxc-start 105 20211201135934.687 INFO start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWPID
  53. lxc-start 105 20211201135934.687 INFO start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWUTS
  54. lxc-start 105 20211201135934.687 INFO start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWIPC
  55. lxc-start 105 20211201135934.687 INFO start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWCGROUP
  56. lxc-start 105 20211201135934.687 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved user namespace via fd 21 and stashed path as user:/proc/1404/fd/21
  57. lxc-start 105 20211201135934.687 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved mnt namespace via fd 22 and stashed path as mnt:/proc/1404/fd/22
  58. lxc-start 105 20211201135934.687 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved pid namespace via fd 23 and stashed path as pid:/proc/1404/fd/23
  59. lxc-start 105 20211201135934.687 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved uts namespace via fd 24 and stashed path as uts:/proc/1404/fd/24
  60. lxc-start 105 20211201135934.687 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved ipc namespace via fd 25 and stashed path as ipc:/proc/1404/fd/25
  61. lxc-start 105 20211201135934.687 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved cgroup namespace via fd 26 and stashed path as cgroup:/proc/1404/fd/26
  62. lxc-start 105 20211201135934.687 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2948 - The binary "/usr/bin/newuidmap" does have the setuid bit set
  63. lxc-start 105 20211201135934.687 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2948 - The binary "/usr/bin/newgidmap" does have the setuid bit set
  64. lxc-start 105 20211201135934.687 DEBUG conf - conf.c:lxc_map_ids:3018 - Functional newuidmap and newgidmap binary found
  65. lxc-start 105 20211201135934.690 INFO start - start.c:do_start:1085 - Unshared CLONE_NEWNET
  66. lxc-start 105 20211201135934.690 INFO cgfsng - cgroups/cgfsng.c:cgfsng_setup_limits:2851 - Limits for the unified cgroup hierarchy have been setup
  67. lxc-start 105 20211201135934.691 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2948 - The binary "/usr/bin/newuidmap" does have the setuid bit set
  68. lxc-start 105 20211201135934.691 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2948 - The binary "/usr/bin/newgidmap" does have the setuid bit set
  69. lxc-start 105 20211201135934.691 DEBUG conf - conf.c:lxc_map_ids:3018 - Functional newuidmap and newgidmap binary found
  70. lxc-start 105 20211201135934.692 NOTICE utils - utils.c:lxc_drop_groups:1345 - Dropped supplimentary groups
  71. lxc-start 105 20211201135934.693 DEBUG start - start.c:lxc_try_preserve_namespace:139 - Preserved net namespace via fd 5 and stashed path as net:/proc/1404/fd/5
  72. lxc-start 105 20211201135934.697 INFO conf - conf.c:run_script_argv:332 - Executing script "/usr/share/lxc/lxcnetaddbr" for container "105", config section "net"
  73. lxc-start 105 20211201135935.289 DEBUG network - network.c:netdev_configure_server_veth:849 - Instantiated veth tunnel "veth105i0 <--> vethHdmPrn"
  74. lxc-start 105 20211201135935.290 NOTICE utils - utils.c:lxc_drop_groups:1345 - Dropped supplimentary groups
  75. lxc-start 105 20211201135935.290 NOTICE utils - utils.c:lxc_switch_uid_gid:1321 - Switched to gid 0
  76. lxc-start 105 20211201135935.290 NOTICE utils - utils.c:lxc_switch_uid_gid:1330 - Switched to uid 0
  77. lxc-start 105 20211201135935.292 DEBUG conf - conf.c:lxc_mount_rootfs:1394 - Mounted rootfs "/var/lib/lxc/105/rootfs" onto "/usr/lib/x86_64-linux-gnu/lxc/rootfs" with options "(null)"
  78. lxc-start 105 20211201135935.292 INFO conf - conf.c:setup_utsname:846 - Set hostname to "ct"
  79. lxc-start 105 20211201135935.862 DEBUG network - network.c:setup_hw_addr:3814 - Mac address "A2:34:45:8B:6C:72" on "eth0" has been setup
  80. lxc-start 105 20211201135935.862 DEBUG network - network.c:lxc_network_setup_in_child_namespaces_common:3964 - Network device "eth0" has been setup
  81. lxc-start 105 20211201135935.862 INFO network - network.c:lxc_setup_network_in_child_namespaces:4022 - Finished setting up network devices with caller assigned names
  82. lxc-start 105 20211201135935.862 INFO conf - conf.c:mount_autodev:1182 - Preparing "/dev"
  83. lxc-start 105 20211201135935.863 INFO conf - conf.c:mount_autodev:1242 - Prepared "/dev"
  84. lxc-start 105 20211201135935.863 DEBUG conf - conf.c:lxc_mount_auto_mounts:725 - Invalid argument - Tried to ensure procfs is unmounted
  85. lxc-start 105 20211201135935.863 DEBUG conf - conf.c:lxc_mount_auto_mounts:740 - Invalid argument - Tried to ensure sysfs is unmounted
  86. lxc-start 105 20211201135935.864 ERROR utils - utils.c:safe_mount:1198 - Operation not permitted - Failed to mount "proc" onto "/usr/lib/x86_64-linux-gnu/lxc/rootfs/proc"
  87. lxc-start 105 20211201135935.864 ERROR conf - conf.c:lxc_mount_auto_mounts:782 - Operation not permitted - Failed to mount "proc" on "/usr/lib/x86_64-linux-gnu/lxc/rootfs/proc" with flags 14
  88. lxc-start 105 20211201135935.864 ERROR conf - conf.c:lxc_setup:3636 - Failed to setup first automatic mounts
  89. lxc-start 105 20211201135935.864 ERROR start - start.c:do_start:1265 - Failed to setup container "105"
  90. lxc-start 105 20211201135935.864 ERROR sync - sync.c:sync_wait:36 - An error occurred in another process (expected sequence number 5)
  91. lxc-start 105 20211201135935.865 DEBUG network - network.c:lxc_delete_network:4180 - Deleted network devices
  92. lxc-start 105 20211201135935.866 ERROR start - start.c:__lxc_start:2073 - Failed to spawn container "105"
  93. lxc-start 105 20211201135935.866 WARN start - start.c:lxc_abort:1016 - No such process - Failed to send SIGKILL via pidfd 20 for process 1426
  94. lxc-start 105 20211201135935.230 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2948 - The binary "/usr/bin/newuidmap" does have the setuid bit set
  95. lxc-start 105 20211201135935.230 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2948 - The binary "/usr/bin/newgidmap" does have the setuid bit set
  96. lxc-start 105 20211201135935.230 DEBUG conf - conf.c:lxc_map_ids:3018 - Functional newuidmap and newgidmap binary found
  97. lxc-start 105 20211201135935.233 NOTICE utils - utils.c:lxc_drop_groups:1345 - Dropped supplimentary groups
  98. lxc-start 105 20211201135935.262 INFO conf - conf.c:run_script_argv:332 - Executing script "/usr/share/lxc/hooks/lxc-pve-poststop-hook" for container "105", config section "lxc"
  99. lxc-start 105 20211201135936.225 INFO conf - conf.c:run_script_argv:332 - Executing script "/usr/share/lxcfs/lxc.reboot.hook" for container "105", config section "lxc"
  100. lxc-start 105 20211201135936.525 ERROR lxc_start - tools/lxc_start.c:main:308 - The container failed to start
  101. lxc-start 105 20211201135936.525 ERROR lxc_start - tools/lxc_start.c:main:313 - Additional information can be obtained by setting the --logfile and --logpriority options
  102.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement