hi, this breaks mounting with mountopts. (hotplug and normal mount)
reproduce: - install new kernel - make a CT - run it - try to hotplug a mp with any mountoption (ro, noatime, nosuid, noexec, nodev) - mount will fail with exit code 32 - shutdown CT - boot CT - mp will be created, it will fail to mount properly and CT won't start. - remove mp, CT will start again. see attached lxc.log and journal.log On Tue, Nov 19, 2019 at 10:34:32AM +0100, Wolfgang Bumiller wrote: > Changes to v2: > * Factor `walk_tree_nofollow` to be usable with fds as starting point. > * Create destination directory entries (this was completely missing in > the staged code path api). > * Test for new kernel api with `move_mount` instead of `fsopen` since > we don't actually use `fsopen` currently. > * Factor out `mountpoint_insert_staged()` to be used from the pre-start > hook & hotplug code (this is where the directory tree creation was > added) > * Rename vmconfig_apply_pending_mountpoint to just apply_pending_mountpoint. > * Switch into the `/usr/bin/lxc-start` apparmor profile for mount point > hotplugging. (Otherwise hotplugging can potentially allow more options > than we can use later at a normal container startup.) > > Previous changes from v1 to v2: > * Add a helper to LXC::PVE::Tools to check for availability of the new > mount api (new patch 1), and use that in the prestart hook and mount > functions. > * Add a check to the mount hotplug code to not attempt to perform > hotplugging on older kernels. > > Wolfgang Bumiller (12): > tools: add can_use_new_mount_api helper > split walk_tree_nofollow to allow a start fd > implement "staged mountpoints" > add mountpoint_insert_staged helper > add open_pid_fd, open_lxc_pid, open_ppid helpers > split open_namespace out of enter_namespace > add get_container_namespace helper > add mount stage directory helpers > prestart-hook: use staged mountpoints on newer kernels > config: apply_pending_mountpoint helper > implement mountpoint hotplugging > use lxc-start apparmor profile for mount hotplugging > > src/PVE/LXC.pm | 232 +++++++++++++++++++++++++++++++++++--- > src/PVE/LXC/Config.pm | 94 ++++++++++----- > src/PVE/LXC/Tools.pm | 18 +++ > src/lxc-pve-prestart-hook | 78 +++++++++++-- > 4 files changed, 371 insertions(+), 51 deletions(-) > > -- > 2.20.1 >
lxc-start 100 20191119152902.486 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536 lxc-start 100 20191119152902.486 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536 lxc-start 100 20191119152902.486 INFO lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 100 lxc-start 100 20191119152902.487 INFO lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount # comment this to allow umount -f; not recommended" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38" lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno) lxc-start 100 20191119152902.487 INFO seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context lxc-start 100 20191119152902.487 INFO conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "100", config section "lxc" lxc-start 100 20191119152902.855 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: mount: /run/pve/mountpoints/mp1: cannot mount /dev/mapper/pve-vm--100--disk--2 read-only. lxc-start 100 20191119152902.855 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 100 lxc pre-start produced output: command 'mount -o nodev,noatime /dev/dm-10 /run/pve/mountpoints/mp1' failed: exit code 32 lxc-start 100 20191119152902.864 ERROR conf - conf.c:run_buffer:352 - Script exited with status 32 lxc-start 100 20191119152902.864 ERROR start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "100" lxc-start 100 20191119152902.864 ERROR start - start.c:__lxc_start:2032 - Failed to initialize container "100" lxc-start 100 20191119152902.872 DEBUG lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 4558 exited lxc-start 100 20191119152902.872 ERROR lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state lxc-start 100 20191119152902.872 ERROR lxc_start - tools/lxc_start.c:main:329 - The container failed to start lxc-start 100 20191119152902.872 ERROR lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode lxc-start 100 20191119152902.872 ERROR lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options lxc-start 101 20191119154847.456 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type u nsid 0 hostid 100000 range 65536 lxc-start 101 20191119154847.456 INFO confile - confile.c:set_config_idmaps:2003 - Read uid map: type g nsid 0 hostid 100000 range 65536 lxc-start 101 20191119154847.456 INFO lxccontainer - lxccontainer.c:do_lxcapi_start:994 - Set process title to [lxc monitor] /var/lib/lxc 101 lxc-start 101 20191119154847.456 INFO lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "reject_force_umount # comment this to allow umount -f; not recommended" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for reject_force_umount action 0(kill) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:do_resolve_add_rule:535 - Set seccomp rule to reject force umounts lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "[all]" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "kexec_load errno 1" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for kexec_load action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for kexec_load action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "open_by_handle_at errno 1" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for open_by_handle_at action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "init_module errno 1" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for init_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for init_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for init_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for init_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "finit_module errno 1" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for finit_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for finit_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for finit_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for finit_module action 327681(errno) lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "delete_module errno 1" lxc-start 101 20191119154847.456 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for delete_module action 327681(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for delete_module action 327681(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for delete_module action 327681(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for delete_module action 327681(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:789 - Processing "keyctl errno 38" lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:975 - Added native rule for arch 0 for keyctl action 327718(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:984 - Added compat rule for arch 1073741827 for keyctl action 327718(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:994 - Added compat rule for arch 1073741886 for keyctl action 327718(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:1004 - Added native rule for arch -1073741762 for keyctl action 327718(errno) lxc-start 101 20191119154847.457 INFO seccomp - seccomp.c:parse_config_v2:1008 - Merging compat seccomp contexts into main context lxc-start 101 20191119154847.457 INFO conf - conf.c:run_script_argv:372 - Executing script "/usr/share/lxc/hooks/lxc-pve-prestart-hook" for container "101", config section "lxc" lxc-start 101 20191119154847.878 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: mount: /run/pve/mountpoints/mp5: cannot mount /dev/mapper/pve-vm--101--disk--6 read-only. lxc-start 101 20191119154847.878 DEBUG conf - conf.c:run_buffer:340 - Script exec /usr/share/lxc/hooks/lxc-pve-prestart-hook 101 lxc pre-start produced output: command 'mount -o noatime /dev/dm-15 /run/pve/mountpoints/mp5' failed: exit code 32 lxc-start 101 20191119154847.886 ERROR conf - conf.c:run_buffer:352 - Script exited with status 32 lxc-start 101 20191119154847.886 ERROR start - start.c:lxc_init:897 - Failed to run lxc.hook.pre-start for container "101" lxc-start 101 20191119154847.886 ERROR start - start.c:__lxc_start:2032 - Failed to initialize container "101" lxc-start 101 20191119154847.897 DEBUG lxccontainer - lxccontainer.c:wait_on_daemonized_start:862 - First child 13321 exited lxc-start 101 20191119154847.897 ERROR lxccontainer - lxccontainer.c:wait_on_daemonized_start:865 - No such file or directory - Failed to receive the container state lxc-start 101 20191119154847.897 ERROR lxc_start - tools/lxc_start.c:main:329 - The container failed to start lxc-start 101 20191119154847.897 ERROR lxc_start - tools/lxc_start.c:main:332 - To get more details, run the container in foreground mode lxc-start 101 20191119154847.897 ERROR lxc_start - tools/lxc_start.c:main:335 - Additional information can be obtained by setting the --logfile and --logpriority options
-- A start job for unit pve-container@101.service has begun execution. -- -- The job identifier is 3591. Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-7): mounted filesystem with ordered data mode. Opts: (null) Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-8): mounted filesystem with ordered data mode. Opts: (null) Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-11): mounted filesystem with ordered data mode. Opts: (null) Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-12): mounted filesystem with ordered data mode. Opts: (null) Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-13): mounted filesystem with ordered data mode. Opts: (null) Nov 19 16:53:21 mphotplug kernel: EXT4-fs (dm-14): mounted filesystem with ordered data mode. Opts: (null) Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime" Nov 19 16:53:21 mphotplug audit[14583]: AVC apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime" Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:70): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="rw, noatime" Nov 19 16:53:21 mphotplug kernel: audit: type=1400 audit(1574178801.609:71): apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/run/pve/mountpoints/mp5/" pid=14583 comm="mount" fstype="ext4" srcname="/dev/dm-16" flags="ro, noatime" Nov 19 16:53:21 mphotplug kernel: lxc-start[14554]: segfault at 50 ip 00007feca73b0f8b sp 00007fff068cb9d0 error 4 in liblxc.so.1.6.0[7feca7357000+8a000] Nov 19 16:53:21 mphotplug kernel: Code: 9b c0 ff ff 4d 85 ff 0f 85 82 02 00 00 66 90 48 8b 73 50 48 8b bb f8 00 00 00 e8 80 78 fa ff 4c 8b 74 24 10 48 89 de 4c 89 f7 <41> ff 56 50 4c 89 f7 48 89 de 41 ff 56 58 48 8b 83 f8 00 00 00 8b Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: lxccontainer.c: wait_on_daemonized_start: 865 No such file or directory - Failed to receive the container state Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 329 The container failed to start Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 332 To get more details, run the container in foreground mode Nov 19 16:53:21 mphotplug lxc-start[14542]: lxc-start: 101: tools/lxc_start.c: main: 335 Additional information can be obtained by setting the --logfile and --logpriority options Nov 19 16:53:21 mphotplug systemd[1]: pve-container@101.service: Control process exited, code=exited, status=1/FAILURE -- Subject: Unit process exited -- Defined-By: systemd -- Support: https://www.debian.org/support -- -- An ExecStart= process belonging to unit pve-container@101.service has exited. -- -- The process' exit code is 'exited' and its exit status is 1. Nov 19 16:53:21 mphotplug systemd[1]: pve-container@101.service: Failed with result 'exit-code'.
root@mphotplug:~# cat /etc/pve/lxc/101.conf arch: amd64 cores: 1 hostname: arch memory: 512 mp0: local-lvm:vm-101-disk-1,mp=fsdf,size=1G mp1: local-lvm:vm-101-disk-2,mp=afkdjl,size=8G mp2: local-lvm:vm-101-disk-3,mp=sdfghj,size=1G mp3: local-lvm:vm-101-disk-4,mp=dfghjk,size=1G mp4: local-lvm:vm-101-disk-5,mp=dfghjkloijuhgfd,size=1G mp5: local-lvm:vm-101-disk-7,mp=/fsdfji4eowfjsdkl,mountoptions=noatime,size=8G net0: name=eth0,bridge=vmbr0,firewall=1,hwaddr=9E:F0:C2:CF:BE:39,ip=dhcp,type=veth ostype: archlinux rootfs: local-lvm:vm-101-disk-0,size=8G swap: 512 unprivileged: 1 unused0: local-lvm:vm-101-disk-6
_______________________________________________ pve-devel mailing list pve-devel@pve.proxmox.com https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel