"lxc.cgroup.devices" is meaningless for unprivileged containers as those
can never create those devices anyway, so they'll only ever have access
to whatever devices lxc provides and nothing more. All our own default
configs specifically do not set that cgroup controller for unprivileged
containers.

The error you're getting specifically suggests that the cgroups that are
delegated to your unprivileged users do not include the devices
controller which does match what I'm seeing in /proc/self/cgroup on my
system here.

If you wanted to be able to write to the devices cgroup, you would need
your user session to have the devices cgroup in /proc/self/cgroup point
to a path that your user can write to. At which point the config should
work, though still effectively be meaningless.

** Changed in: lxc (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1843490

Title:
  lxc.cgroup.devices.allow prevents unprivileged container from starting

Status in lxc package in Ubuntu:
  Invalid

Bug description:
  Adding lxc.cgroup.devices.allow directives to an unprivileged
  container config prevent the container from starting. These lxc-start
  errors look relevant:

  
  lxc-start testbox 20190910192712.171 WARN     cgfsng - 
cgroups/cgfsng.c:get_hierarchy:204 - There is no useable devices controller
  lxc-start testbox 20190910192712.171 ERROR    cgfsng - 
cgroups/cgfsng.c:cg_legacy_set_data:2191 - Failed to setup limits for the 
"devices" controller. The controller seems to be unused by "cgfsng" cgroup 
driver or not enabled on the cgroup hierarchy
  lxc-start testbox 20190910192712.171 WARN     cgfsng - 
cgroups/cgfsng.c:__cg_legacy_setup_limits:2228 - Failed to set "devices.allow" 
to "c 10:57 rwm"

  
  It seems to me that I used lxc.cgroup.devices.allow directives without 
trouble a few years ago. I wonder which system upgrades broke it.

  
  To reproduce:

  (Note: subuid, subgid, and lxc-usernet are already configured for this
  user.)

  $ lsb_release -a
  No LSB modules are available.
  Distributor ID:       Ubuntu
  Description:  Ubuntu 19.04
  Release:      19.04
  Codename:     disco

  $ dpkg-query --show libpam-cgfs lxc1
  libpam-cgfs   3.0.3-0ubuntu1
  lxc1  3.0.3-0ubuntu1

  $ lxc-create -t download -n testbox -- -d ubuntu -r bionic -a amd64
  The cached copy has expired, re-downloading...
  Setting up the GPG keyring
  Downloading the image index
  Downloading the rootfs
  Downloading the metadata
  The image cache is now ready
  Unpacking the rootfs

  ---
  You just created an Ubuntu bionic amd64 (20190910_07:42) container.

  To enable SSH, run: apt install openssh-server
  No default root or user password are set by LXC.

  $ echo "lxc.cgroup.devices.allow = c 10:57 rwm" >> lxc/testbox/config

  $ lxc-start -n testbox -o debug.out -l trace
  lxc-start: testbox: lxccontainer.c: wait_on_daemonized_start: 842 Received 
container state "ABORTING" instead of "RUNNING"
  lxc-start: testbox: tools/lxc_start.c: main: 330 The container failed to start
  lxc-start: testbox: tools/lxc_start.c: main: 333 To get more details, run the 
container in foreground mode
  lxc-start: testbox: tools/lxc_start.c: main: 336 Additional information can 
be obtained by setting the --logfile and --logpriority options

  $ cat debug.out
  lxc-start testbox 20190910192712.380 INFO     confile - 
confile.c:set_config_idmaps:1555 - Read uid map: type u nsid 0 hostid 100000 
range 65536
  lxc-start testbox 20190910192712.380 INFO     confile - 
confile.c:set_config_idmaps:1555 - Read uid map: type g nsid 0 hostid 100000 
range 65536
  lxc-start testbox 20190910192712.382 TRACE    commands - 
commands.c:lxc_cmd:300 - Connection refused - Command "get_init_pid" failed to 
connect command socket
  lxc-start testbox 20190910192712.383 TRACE    commands - 
commands.c:lxc_cmd:300 - Connection refused - Command "get_state" failed to 
connect command socket
  lxc-start testbox 20190910192712.383 TRACE    start - 
start.c:lxc_init_handler:748 - Created anonymous pair {4,5} of unix sockets
  lxc-start testbox 20190910192712.383 TRACE    commands - 
commands.c:lxc_cmd_init:1248 - Creating abstract unix socket 
"/home/ubuntu/lxc/testbox/command"
  lxc-start testbox 20190910192712.383 TRACE    start - 
start.c:lxc_init_handler:760 - Unix domain socket 6 for command server is ready
  lxc-start testbox 20190910192712.388 INFO     lxccontainer - 
lxccontainer.c:do_lxcapi_start:961 - Set process title to [lxc monitor] 
/home/ubuntu/lxc testbox
  lxc-start testbox 20190910192712.392 TRACE    start - start.c:lxc_start:2052 
- Doing lxc_start
  lxc-start testbox 20190910192712.393 INFO     lsm - lsm/lsm.c:lsm_init:50 - 
LSM security driver AppArmor
  lxc-start testbox 20190910192712.393 TRACE    start - start.c:lxc_init:777 - 
Initialized LSM
  lxc-start testbox 20190910192712.395 TRACE    seccomp - 
seccomp.c:get_new_ctx:458 - Added arch 2 to main seccomp context
  lxc-start testbox 20190910192712.395 TRACE    seccomp - 
seccomp.c:get_new_ctx:466 - Removed native arch from main seccomp context
  lxc-start testbox 20190910192712.395 TRACE    seccomp - 
seccomp.c:get_new_ctx:458 - Added arch 3 to main seccomp context
  lxc-start testbox 20190910192712.395 TRACE    seccomp - 
seccomp.c:get_new_ctx:466 - Removed native arch from main seccomp context
  lxc-start testbox 20190910192712.395 TRACE    seccomp - 
seccomp.c:get_new_ctx:471 - Arch 4 already present in main seccomp context
  lxc-start testbox 20190910192712.395 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "reject_force_umount  # comment this 
to allow umount -f;  not recommended"
  lxc-start testbox 20190910192712.395 INFO     seccomp - 
seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
  lxc-start testbox 20190910192712.395 INFO     seccomp - 
seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for 
reject_force_umount action 0(kill)
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for 
reject_force_umount action 0(kill)
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for 
reject_force_umount action 0(kill)
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for 
reject_force_umount action 0(kill)
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "[all]"
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "kexec_load errno 1"
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for kexec_load 
action 327681(errno)
  lxc-start testbox 20190910192712.396 INFO     seccomp - 
seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for 
kexec_load action 327681(errno)
  lxc-start testbox 20190910192712.397 INFO     seccomp - 
seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for 
kexec_load action 327681(errno)
  lxc-start testbox 20190910192712.397 INFO     seccomp - 
seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for 
kexec_load action 327681(errno)
  lxc-start testbox 20190910192712.397 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "open_by_handle_at errno 1"
  lxc-start testbox 20190910192712.397 INFO     seccomp - 
seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for 
open_by_handle_at action 327681(errno)
  lxc-start testbox 20190910192712.397 INFO     seccomp - 
seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for 
open_by_handle_at action 327681(errno)
  lxc-start testbox 20190910192712.397 INFO     seccomp - 
seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for 
open_by_handle_at action 327681(errno)
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for 
open_by_handle_at action 327681(errno)
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "init_module errno 1"
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for init_module 
action 327681(errno)
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for 
init_module action 327681(errno)
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for 
init_module action 327681(errno)
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for 
init_module action 327681(errno)
  lxc-start testbox 20190910192712.398 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "finit_module errno 1"
  lxc-start testbox 20190910192712.399 INFO     seccomp - 
seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for finit_module 
action 327681(errno)
  lxc-start testbox 20190910192712.399 INFO     seccomp - 
seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for 
finit_module action 327681(errno)
  lxc-start testbox 20190910192712.399 INFO     seccomp - 
seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for 
finit_module action 327681(errno)
  lxc-start testbox 20190910192712.399 INFO     seccomp - 
seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for 
finit_module action 327681(errno)
  lxc-start testbox 20190910192712.399 INFO     seccomp - 
seccomp.c:parse_config_v2:759 - Processing "delete_module errno 1"
  lxc-start testbox 20190910192712.399 INFO     seccomp - 
seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for delete_module 
action 327681(errno)
  lxc-start testbox 20190910192712.400 INFO     seccomp - 
seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for 
delete_module action 327681(errno)
  lxc-start testbox 20190910192712.400 INFO     seccomp - 
seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for 
delete_module action 327681(errno)
  lxc-start testbox 20190910192712.400 INFO     seccomp - 
seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for 
delete_module action 327681(errno)
  lxc-start testbox 20190910192712.400 INFO     seccomp - 
seccomp.c:parse_config_v2:970 - Merging compat seccomp contexts into main 
context
  lxc-start testbox 20190910192712.400 TRACE    seccomp - 
seccomp.c:parse_config_v2:980 - Merged first compat seccomp context into main 
context
  lxc-start testbox 20190910192712.400 TRACE    seccomp - 
seccomp.c:parse_config_v2:996 - Merged second compat seccomp context into main 
context
  lxc-start testbox 20190910192712.400 TRACE    start - start.c:lxc_init:784 - 
Read seccomp policy
  lxc-start testbox 20190910192712.400 TRACE    start - 
start.c:lxc_serve_state_clients:466 - Set container state to STARTING
  lxc-start testbox 20190910192712.400 TRACE    start - 
start.c:lxc_serve_state_clients:469 - No state clients registered
  lxc-start testbox 20190910192712.401 TRACE    start - start.c:lxc_init:792 - 
Set container state to "STARTING"
  lxc-start testbox 20190910192712.401 TRACE    start - start.c:lxc_init:855 - 
Set environment variables
  lxc-start testbox 20190910192712.402 TRACE    start - start.c:lxc_init:862 - 
Ran pre-start hooks
  lxc-start testbox 20190910192712.402 TRACE    start - 
start.c:setup_signal_fd:359 - Created signal file descriptor 7
  lxc-start testbox 20190910192712.402 TRACE    start - start.c:lxc_init:873 - 
Set up signal fd
  lxc-start testbox 20190910192712.412 DEBUG    terminal - 
terminal.c:lxc_terminal_peer_default:707 - No such device - The process does 
not have a controlling terminal
  lxc-start testbox 20190910192712.412 TRACE    start - start.c:lxc_init:881 - 
Created console
  lxc-start testbox 20190910192712.412 DEBUG    conf - 
conf.c:chown_mapped_root:3166 - trying to chown "/dev/pts/2" to 1000
  lxc-start testbox 20190910192712.547 TRACE    terminal - 
terminal.c:lxc_terminal_map_ids:1225 - Chowned terminal "/dev/pts/2"
  lxc-start testbox 20190910192712.547 TRACE    start - start.c:lxc_init:888 - 
Chowned console
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1031 - basecginfo is:
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1032 - 
12:pids:/user.slice/user-1000.slice/session-4.scope
  11:devices:/user.slice
  10:net_cls,net_prio:/
  9:perf_event:/
  8:cpu,cpuacct:/user.slice
  7:rdma:/
  6:cpuset:/
  5:hugetlb:/
  4:memory:/user.slice/user-1000.slice/session-4.scope
  3:blkio:/user.slice
  2:freezer:/user/ubuntu/0
  1:name=systemd:/user.slice/user-1000.slice/session-4.scope
  0::/user.slice/user-1000.slice/session-4.scope

  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 0: 
pids
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 1: 
devices
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 2: 
net_cls
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 3: 
net_prio
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 4: 
perf_event
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 5: 
cpu
  lxc-start testbox 20190910192712.549 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 6: 
cpuacct
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 7: 
rdma
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 8: 
cpuset
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 9: 
hugetlb
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 10: 
memory
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 11: 
blkio
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 12: 
freezer
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 13: 
cgroup2
  lxc-start testbox 20190910192712.550 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1038 - named subsystem 0: 
name=systemd
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:cg_hybrid_init:2459 - Writable cgroup hierarchies:
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1012 -   Hierarchies:
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1017 -   0: base_cgroup: 
/user.slice/user-1000.slice/session-4.scope
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1018 -       mountpoint:  
/sys/fs/cgroup/systemd
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1019 -       controllers:
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1021 -       0: name=systemd
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1017 -   1: base_cgroup: 
/user/ubuntu/0
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1018 -       mountpoint:  
/sys/fs/cgroup/freezer
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1019 -       controllers:
  lxc-start testbox 20190910192712.553 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1021 -       0: freezer
  lxc-start testbox 20190910192712.554 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1017 -   2: base_cgroup: 
/user.slice/user-1000.slice/session-4.scope
  lxc-start testbox 20190910192712.554 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1018 -       mountpoint:  
/sys/fs/cgroup/memory
  lxc-start testbox 20190910192712.554 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1019 -       controllers:
  lxc-start testbox 20190910192712.554 TRACE    cgfsng - 
cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1021 -       0: memory
  lxc-start testbox 20190910192712.554 TRACE    cgroup - 
cgroups/cgroup.c:cgroup_init:56 - Initialized cgroup driver cgfsng
  lxc-start testbox 20190910192712.554 TRACE    cgroup - 
cgroups/cgroup.c:cgroup_init:61 - Running with hybrid cgroup layout
  lxc-start testbox 20190910192712.554 TRACE    start - start.c:lxc_init:895 - 
Initialized cgroup driver
  lxc-start testbox 20190910192712.554 INFO     start - start.c:lxc_init:897 - 
Container "testbox" is initialized
  lxc-start testbox 20190910192712.561 TRACE    start - start.c:lxc_spawn:1684 
- Cloned child process 8596
  lxc-start testbox 20190910192712.561 INFO     start - start.c:lxc_spawn:1688 
- Cloned CLONE_NEWUSER
  lxc-start testbox 20190910192712.561 INFO     start - start.c:lxc_spawn:1688 
- Cloned CLONE_NEWNS
  lxc-start testbox 20190910192712.561 INFO     start - start.c:lxc_spawn:1688 
- Cloned CLONE_NEWPID
  lxc-start testbox 20190910192712.561 INFO     start - start.c:lxc_spawn:1688 
- Cloned CLONE_NEWUTS
  lxc-start testbox 20190910192712.561 INFO     start - start.c:lxc_spawn:1688 
- Cloned CLONE_NEWIPC
  lxc-start testbox 20190910192712.561 DEBUG    start - 
start.c:lxc_try_preserve_namespaces:196 - Preserved user namespace via fd 14
  lxc-start testbox 20190910192712.561 DEBUG    start - 
start.c:lxc_try_preserve_namespaces:196 - Preserved mnt namespace via fd 15
  lxc-start testbox 20190910192712.562 DEBUG    start - 
start.c:lxc_try_preserve_namespaces:196 - Preserved pid namespace via fd 16
  lxc-start testbox 20190910192712.562 DEBUG    start - 
start.c:lxc_try_preserve_namespaces:196 - Preserved uts namespace via fd 17
  lxc-start testbox 20190910192712.562 DEBUG    start - 
start.c:lxc_try_preserve_namespaces:196 - Preserved ipc namespace via fd 18
  lxc-start testbox 20190910192712.562 DEBUG    conf - 
conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newuidmap" 
does have the setuid bit set
  lxc-start testbox 20190910192712.562 DEBUG    conf - 
conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newgidmap" 
does have the setuid bit set
  lxc-start testbox 20190910192712.562 TRACE    caps - 
caps.c:lxc_ambient_caps_up:192 - Raised = 
cap_chown,cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_linux_immutable,cap_net_bind_service,cap_net_broadcast,cap_net_admin,cap_net_raw,cap_ipc_lock,cap_ipc_owner,cap_sys_module,cap_sys_rawio,cap_sys_chroot,cap_sys_ptrace,cap_sys_pacct,cap_sys_admin,cap_sys_boot,cap_sys_nice,cap_sys_resource,cap_sys_time,cap_sys_tty_config,cap_mknod,cap_lease,cap_audit_write,cap_audit_control,cap_setfcap,cap_mac_override,cap_mac_admin,cap_syslog,cap_wake_alarm,cap_block_suspend,cap_audit_read+eip
 in inheritable and ambient capability set
  lxc-start testbox 20190910192712.563 DEBUG    conf - conf.c:lxc_map_ids:2928 
- Functional newuidmap and newgidmap binary found
  lxc-start testbox 20190910192712.595 TRACE    conf - conf.c:lxc_map_ids:3002 
- newuidmap wrote mapping "newuidmap 8596 0 100000 65536"
  lxc-start testbox 20190910192712.626 TRACE    conf - conf.c:lxc_map_ids:3002 
- newgidmap wrote mapping "newgidmap 8596 0 100000 65536"
  lxc-start testbox 20190910192712.632 INFO     start - start.c:do_start:1136 - 
Unshared CLONE_NEWNET
  lxc-start testbox 20190910192712.633 INFO     cgfsng - 
cgroups/cgfsng.c:__cg_legacy_setup_limits:2237 - Limits for the legacy cgroup 
hierarchies have been setup
  lxc-start testbox 20190910192712.635 TRACE    conf - 
conf.c:get_minimal_idmap:4265 - Allocated minimal idmapping
  lxc-start testbox 20190910192712.637 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing uid mapping for "8601" in new user 
namespace: nsuid 0 - hostid 100000 - range 65536
  lxc-start testbox 20190910192712.637 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing uid mapping for "8601" in new user 
namespace: nsuid 65536 - hostid 1000 - range 1
  lxc-start testbox 20190910192712.637 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing gid mapping for "8601" in new user 
namespace: nsuid 0 - hostid 100000 - range 65536
  lxc-start testbox 20190910192712.637 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing gid mapping for "8601" in new user 
namespace: nsuid 65536 - hostid 1000 - range 1
  lxc-start testbox 20190910192712.638 DEBUG    conf - 
conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newuidmap" 
does have the setuid bit set
  lxc-start testbox 20190910192712.638 DEBUG    conf - 
conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newgidmap" 
does have the setuid bit set
  lxc-start testbox 20190910192712.638 DEBUG    conf - conf.c:lxc_map_ids:2928 
- Functional newuidmap and newgidmap binary found
  lxc-start testbox 20190910192712.670 TRACE    conf - conf.c:lxc_map_ids:3002 
- newuidmap wrote mapping "newuidmap 8601 0 100000 65536 65536 1000 1"
  lxc-start testbox 20190910192712.702 TRACE    conf - conf.c:lxc_map_ids:3002 
- newgidmap wrote mapping "newgidmap 8601 0 100000 65536 65536 1000 1"
  lxc-start testbox 20190910192712.703 TRACE    conf - 
conf.c:run_userns_fn:4091 - Calling function "chown_cgroup_wrapper"
  lxc-start testbox 20190910192712.709 DEBUG    start - start.c:lxc_spawn:1742 
- Preserved net namespace via fd 10
  lxc-start testbox 20190910192712.709 WARN     start - start.c:lxc_spawn:1746 
- Operation not permitted - Failed to allocate new network namespace id
  lxc-start testbox 20190910192712.713 INFO     network - 
network.c:lxc_create_network_unpriv_exec:2150 - Execing lxc-user-nic create 
/home/ubuntu/lxc testbox 8596 veth lxcbr0 (null)
  lxc-start testbox 20190910192712.134 TRACE    network - 
network.c:lxc_create_network_unpriv_exec:2181 - Received output 
"eth0:58:vethC0OBRR:59" from lxc-user-nic
  lxc-start testbox 20190910192712.134 TRACE    network - 
network.c:lxc_network_send_veth_names_to_child:3077 - Sent network device name 
"eth0" to child
  lxc-start testbox 20190910192712.134 TRACE    network - 
network.c:lxc_network_recv_veth_names_from_parent:3102 - Received network 
device name "eth0" from parent
  lxc-start testbox 20190910192712.134 NOTICE   utils - 
utils.c:lxc_switch_uid_gid:1378 - Switched to gid 0
  lxc-start testbox 20190910192712.134 NOTICE   utils - 
utils.c:lxc_switch_uid_gid:1387 - Switched to uid 0
  lxc-start testbox 20190910192712.134 NOTICE   utils - 
utils.c:lxc_setgroups:1400 - Dropped additional groups
  lxc-start testbox 20190910192712.134 INFO     start - start.c:do_start:1242 - 
Unshared CLONE_NEWCGROUP
  lxc-start testbox 20190910192712.135 TRACE    conf - 
conf.c:remount_all_slave:3349 - Remounted all mount table entries as MS_SLAVE
  lxc-start testbox 20190910192712.135 DEBUG    storage - 
storage/storage.c:get_storage_by_name:231 - Detected rootfs type "dir"
  lxc-start testbox 20190910192712.135 TRACE    dir - 
storage/dir.c:dir_mount:203 - Mounted "/home/ubuntu/lxc/testbox/rootfs" on 
"/usr/lib/x86_64-linux-gnu/lxc"
  lxc-start testbox 20190910192712.135 DEBUG    conf - 
conf.c:lxc_mount_rootfs:1332 - Mounted rootfs "/home/ubuntu/lxc/testbox/rootfs" 
onto "/usr/lib/x86_64-linux-gnu/lxc" with options "(null)"
  lxc-start testbox 20190910192712.135 INFO     conf - conf.c:setup_utsname:791 
- Set hostname to "testbox"
  lxc-start testbox 20190910192712.136 DEBUG    network - 
network.c:setup_hw_addr:2767 - Mac address "00:16:3e:0b:60:a9" on "eth0" has 
been setup
  lxc-start testbox 20190910192712.138 DEBUG    network - 
network.c:lxc_setup_netdev_in_child_namespaces:3032 - Network device "eth0" has 
been setup
  lxc-start testbox 20190910192712.138 INFO     network - 
network.c:lxc_setup_network_in_child_namespaces:3053 - network has been setup
  lxc-start testbox 20190910192712.138 INFO     conf - 
conf.c:mount_autodev:1118 - Preparing "/dev"
  lxc-start testbox 20190910192712.138 TRACE    conf - 
conf.c:mount_autodev:1142 - Mounted tmpfs on "/usr/lib/x86_64-linux-gnu/lxc/dev"
  lxc-start testbox 20190910192712.138 INFO     conf - 
conf.c:mount_autodev:1165 - Prepared "/dev"
  lxc-start testbox 20190910192712.139 INFO     conf - 
conf.c:run_script_argv:356 - Executing script "/usr/share/lxcfs/lxc.mount.hook" 
for container "testbox", config section "lxc"
  lxc-start testbox 20190910192712.168 INFO     conf - 
conf.c:lxc_fill_autodev:1209 - Populating "/dev"
  lxc-start testbox 20190910192712.168 DEBUG    conf - 
conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/full" onto 
"/usr/lib/x86_64-linux-gnu/lxc/dev/full"
  lxc-start testbox 20190910192712.168 DEBUG    conf - 
conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/null" onto 
"/usr/lib/x86_64-linux-gnu/lxc/dev/null"
  lxc-start testbox 20190910192712.168 DEBUG    conf - 
conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/random" onto 
"/usr/lib/x86_64-linux-gnu/lxc/dev/random"
  lxc-start testbox 20190910192712.169 DEBUG    conf - 
conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/tty" onto 
"/usr/lib/x86_64-linux-gnu/lxc/dev/tty"
  lxc-start testbox 20190910192712.169 DEBUG    conf - 
conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/urandom" 
onto "/usr/lib/x86_64-linux-gnu/lxc/dev/urandom"
  lxc-start testbox 20190910192712.169 DEBUG    conf - 
conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/zero" onto 
"/usr/lib/x86_64-linux-gnu/lxc/dev/zero"
  lxc-start testbox 20190910192712.169 INFO     conf - 
conf.c:lxc_fill_autodev:1286 - Populated "/dev"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2027 
- Remounting "/sys/fs/fuse/connections" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/fs/fuse/connections" to respect bind or 
remount options
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2048 
- Flags for "/sys/fs/fuse/connections" were 4096, required extra flags are 0
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2058 
- Mountflags already were 4096, skipping remount
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "/sys/fs/fuse/connections" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/fs/fuse/connections" with filesystem type 
"none"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2027 
- Remounting "/sys/kernel/debug" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/debug" to respect bind or remount 
options
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2048 
- Flags for "/sys/kernel/debug" were 4096, required extra flags are 0
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2058 
- Mountflags already were 4096, skipping remount
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "/sys/kernel/debug" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/debug" with filesystem type "none"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2027 
- Remounting "/sys/kernel/security" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/security" to respect bind or remount 
options
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2048 
- Flags for "/sys/kernel/security" were 4110, required extra flags are 14
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "/sys/kernel/security" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/security" with filesystem type "none"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2027 
- Remounting "/sys/fs/pstore" on "/usr/lib/x86_64-linux-gnu/lxc/sys/fs/pstore" 
to respect bind or remount options
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2048 
- Flags for "/sys/fs/pstore" were 4110, required extra flags are 14
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "/sys/fs/pstore" on "/usr/lib/x86_64-linux-gnu/lxc/sys/fs/pstore" 
with filesystem type "none"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "mqueue" on "/usr/lib/x86_64-linux-gnu/lxc/dev/mqueue" with 
filesystem type "mqueue"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2027 
- Remounting "/sys/firmware/efi/efivars" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/firmware/efi/efivars" to respect bind or 
remount options
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2048 
- Flags for "/sys/firmware/efi/efivars" were 4110, required extra flags are 14
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "/sys/firmware/efi/efivars" on 
"/usr/lib/x86_64-linux-gnu/lxc/sys/firmware/efi/efivars" with filesystem type 
"none"
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2027 
- Remounting "/proc/sys/fs/binfmt_misc" on 
"/usr/lib/x86_64-linux-gnu/lxc/proc/sys/fs/binfmt_misc" to respect bind or 
remount options
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2048 
- Flags for "/proc/sys/fs/binfmt_misc" were 4096, required extra flags are 0
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2058 
- Mountflags already were 4096, skipping remount
  lxc-start testbox 20190910192712.169 DEBUG    conf - conf.c:mount_entry:2102 
- Mounted "/proc/sys/fs/binfmt_misc" on 
"/usr/lib/x86_64-linux-gnu/lxc/proc/sys/fs/binfmt_misc" with filesystem type 
"none"
  lxc-start testbox 20190910192712.169 INFO     conf - 
conf.c:mount_file_entries:2333 - Finished setting up mounts
  lxc-start testbox 20190910192712.169 DEBUG    conf - 
conf.c:lxc_setup_dev_console:1771 - Mounted pts device "/dev/pts/2" onto 
"/usr/lib/x86_64-linux-gnu/lxc/dev/console"
  lxc-start testbox 20190910192712.169 INFO     utils - 
utils.c:lxc_mount_proc_if_needed:1231 - I am 1, /proc/self points to "1"
  lxc-start testbox 20190910192712.170 TRACE    conf - 
conf.c:lxc_pivot_root:1540 - pivot_root("/usr/lib/x86_64-linux-gnu/lxc") 
successful
  lxc-start testbox 20190910192712.170 WARN     conf - 
conf.c:lxc_setup_devpts:1616 - Invalid argument - Failed to unmount old devpts 
instance
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_devpts:1653 - Mount new devpts instance with options 
"gid=5,newinstance,ptmxmode=0666,mode=0620,max=1024"
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_devpts:1672 - Created dummy "/dev/ptmx" file as bind mount 
target
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_devpts:1677 - Bind mounted "/dev/pts/ptmx" to "/dev/ptmx"
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/0" with master fd 11 and 
slave fd 14
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/1" with master fd 15 and 
slave fd 16
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/2" with master fd 17 and 
slave fd 18
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/3" with master fd 19 and 
slave fd 20
  lxc-start testbox 20190910192712.170 INFO     conf - 
conf.c:lxc_allocate_ttys:1005 - Finished creating 4 tty devices
  lxc-start testbox 20190910192712.170 TRACE    conf - 
conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/0" with master fd 11 
and slave fd 14 to parent
  lxc-start testbox 20190910192712.170 TRACE    conf - 
conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/1" with master fd 15 
and slave fd 16 to parent
  lxc-start testbox 20190910192712.170 TRACE    conf - 
conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/2" with master fd 17 
and slave fd 18 to parent
  lxc-start testbox 20190910192712.170 TRACE    conf - 
conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/3" with master fd 19 
and slave fd 20 to parent
  lxc-start testbox 20190910192712.170 TRACE    conf - 
conf.c:lxc_send_ttys_to_parent:1063 - Sent 4 ttys to parent
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/0" onto "/dev/tty1"
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/1" onto "/dev/tty2"
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/2" onto "/dev/tty3"
  lxc-start testbox 20190910192712.170 DEBUG    conf - 
conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/3" onto "/dev/tty4"
  lxc-start testbox 20190910192712.170 INFO     conf - 
conf.c:lxc_setup_ttys:949 - Finished setting up 4 /dev/tty<N> device(s)
  lxc-start testbox 20190910192712.170 INFO     conf - 
conf.c:setup_personality:1716 - Set personality to "0x0"
  lxc-start testbox 20190910192712.170 DEBUG    conf - conf.c:setup_caps:2506 - 
Capabilities have been setup
  lxc-start testbox 20190910192712.170 NOTICE   conf - conf.c:lxc_setup:3692 - 
The container "testbox" is set up
  lxc-start testbox 20190910192712.170 INFO     lsm - 
lsm/lsm.c:lsm_process_label_set_at:178 - Set AppArmor label to 
"lxc-container-default-cgns"
  lxc-start testbox 20190910192712.170 INFO     apparmor - 
lsm/apparmor.c:apparmor_process_label_set:249 - Changed apparmor profile to 
lxc-container-default-cgns
  #
  # pseudo filter code start
  #
  # filter for arch x86_64 (3221225534)
  if ($arch == 3221225534)
    # filter for syscall "finit_module" (313) [priority: 65535]
    if ($syscall == 313)
      action ERRNO(1);
    # filter for syscall "open_by_handle_at" (304) [priority: 65535]
    if ($syscall == 304)
      action ERRNO(1);
    # filter for syscall "kexec_load" (246) [priority: 65535]
    if ($syscall == 246)
      action ERRNO(1);
    # filter for syscall "delete_module" (176) [priority: 65535]
    if ($syscall == 176)
      action ERRNO(1);
    # filter for syscall "init_module" (175) [priority: 65535]
    if ($syscall == 175)
      action ERRNO(1);
    # filter for syscall "umount2" (166) [priority: 65533]
    if ($syscall == 166)
      if ($a1.hi32 & 0x00000000 == 0)
        if ($a1.lo32 & 0x00000001 == 1)
          action ERRNO(13);
    # default action
    action ALLOW;
  # filter for arch x86 (1073741827)
  if ($arch == 1073741827)
    # filter for syscall "finit_module" (350) [priority: 65535]
    if ($syscall == 350)
      action ERRNO(1);
    # filter for syscall "open_by_handle_at" (342) [priority: 65535]
    if ($syscall == 342)
      action ERRNO(1);
    # filter for syscall "kexec_load" (283) [priority: 65535]
    if ($syscall == 283)
      action ERRNO(1);
    # filter for syscall "delete_module" (129) [priority: 65535]
    if ($syscall == 129)
      action ERRNO(1);
    # filter for syscall "init_module" (128) [priority: 65535]
    if ($syscall == 128)
      action ERRNO(1);
    # filter for syscall "umount2" (52) [priority: 65534]
    if ($syscall == 52)
      if ($a1 & 0x00000001 == 1)
        action ERRNO(13);
    # default action
    action ALLOW;
  # filter for arch x32 (3221225534)
  if ($arch == 3221225534)
    # filter for syscall "kexec_load" (1073742352) [priority: 65535]
    if ($syscall == 1073742352)
      action ERRNO(1);
    # filter for syscall "finit_module" (1073742137) [priority: 65535]
    if ($syscall == 1073742137)
      action ERRNO(1);
    # filter for syscall "open_by_handle_at" (1073742128) [priority: 65535]
    if ($syscall == 1073742128)
      action ERRNO(1);
    # filter for syscall "delete_module" (1073742000) [priority: 65535]
    if ($syscall == 1073742000)
      action ERRNO(1);
    # filter for syscall "init_module" (1073741999) [priority: 65535]
    if ($syscall == 1073741999)
      action ERRNO(1);
    # filter for syscall "umount2" (1073741990) [priority: 65534]
    if ($syscall == 1073741990)
      if ($a1 & 0x00000001 == 1)
        action ERRNO(13);
    # default action
    action ALLOW;
  # invalid architecture action
  action KILL;
  #
  # pseudo filter code end
  #
  lxc-start testbox 20190910192712.171 WARN     cgfsng - 
cgroups/cgfsng.c:get_hierarchy:204 - There is no useable devices controller
  lxc-start testbox 20190910192712.171 ERROR    cgfsng - 
cgroups/cgfsng.c:cg_legacy_set_data:2191 - Failed to setup limits for the 
"devices" controller. The controller seems to be unused by "cgfsng" cgroup 
driver or not enabled on the cgroup hierarchy
  lxc-start testbox 20190910192712.171 WARN     cgfsng - 
cgroups/cgfsng.c:__cg_legacy_setup_limits:2228 - Failed to set "devices.allow" 
to "c 10:57 rwm"
  lxc-start testbox 20190910192712.171 ERROR    start - start.c:lxc_spawn:1802 
- Failed to setup legacy device cgroup controller limits
  lxc-start testbox 20190910192712.171 DEBUG    network - 
network.c:lxc_delete_network:3180 - Deleted network devices
  lxc-start testbox 20190910192712.171 TRACE    start - 
start.c:lxc_serve_state_socket_pair:536 - Sent container state "ABORTING" to 5
  lxc-start testbox 20190910192712.171 TRACE    start - 
start.c:lxc_serve_state_clients:466 - Set container state to ABORTING
  lxc-start testbox 20190910192712.171 TRACE    start - 
start.c:lxc_serve_state_clients:469 - No state clients registered
  lxc-start testbox 20190910192712.171 DEBUG    lxccontainer - 
lxccontainer.c:wait_on_daemonized_start:830 - First child 8588 exited
  lxc-start testbox 20190910192712.171 ERROR    lxccontainer - 
lxccontainer.c:wait_on_daemonized_start:842 - Received container state 
"ABORTING" instead of "RUNNING"
  lxc-start testbox 20190910192712.171 ERROR    lxc_start - 
tools/lxc_start.c:main:330 - The container failed to start
  lxc-start testbox 20190910192712.171 ERROR    lxc_start - 
tools/lxc_start.c:main:333 - To get more details, run the container in 
foreground mode
  lxc-start testbox 20190910192712.171 ERROR    lxc_start - 
tools/lxc_start.c:main:336 - Additional information can be obtained by setting 
the --logfile and --logpriority options
  lxc-start testbox 20190910192712.171 ERROR    start - 
start.c:__lxc_start:1939 - Failed to spawn container "testbox"
  lxc-start testbox 20190910192712.171 TRACE    start - 
start.c:lxc_serve_state_clients:466 - Set container state to STOPPING
  lxc-start testbox 20190910192712.171 TRACE    start - 
start.c:lxc_serve_state_clients:469 - No state clients registered
  lxc-start testbox 20190910192712.171 TRACE    conf - 
conf.c:get_minimal_idmap:4265 - Allocated minimal idmapping
  lxc-start testbox 20190910192712.171 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing uid mapping for "8669" in new user 
namespace: nsuid 0 - hostid 100000 - range 65536
  lxc-start testbox 20190910192712.171 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing uid mapping for "8669" in new user 
namespace: nsuid 65536 - hostid 1000 - range 1
  lxc-start testbox 20190910192712.171 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing gid mapping for "8669" in new user 
namespace: nsuid 0 - hostid 100000 - range 65536
  lxc-start testbox 20190910192712.171 TRACE    conf - 
conf.c:userns_exec_1:4345 - Establishing gid mapping for "8669" in new user 
namespace: nsuid 65536 - hostid 1000 - range 1
  lxc-start testbox 20190910192712.171 DEBUG    conf - 
conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newuidmap" 
does have the setuid bit set
  lxc-start testbox 20190910192712.171 DEBUG    conf - 
conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newgidmap" 
does have the setuid bit set
  lxc-start testbox 20190910192712.171 DEBUG    conf - conf.c:lxc_map_ids:2928 
- Functional newuidmap and newgidmap binary found
  lxc-start testbox 20190910192712.173 TRACE    conf - conf.c:lxc_map_ids:3002 
- newuidmap wrote mapping "newuidmap 8669 0 100000 65536 65536 1000 1"
  lxc-start testbox 20190910192712.175 TRACE    conf - conf.c:lxc_map_ids:3002 
- newgidmap wrote mapping "newgidmap 8669 0 100000 65536 65536 1000 1"
  lxc-start testbox 20190910192712.175 TRACE    conf - 
conf.c:run_userns_fn:4091 - Calling function "cgroup_rmdir_wrapper"
  lxc-start testbox 20190910192712.176 TRACE    start - start.c:lxc_fini:1001 - 
Closed command socket
  lxc-start testbox 20190910192712.176 TRACE    start - start.c:lxc_fini:1012 - 
Set container state to "STOPPED"
  lxc-start testbox 20190910192712.176 INFO     conf - 
conf.c:run_script_argv:356 - Executing script 
"/usr/share/lxcfs/lxc.reboot.hook" for container "testbox", config section "lxc"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1843490/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to