So is there a workaround? In my case, I'm trying to access an OpenCL gpu from a userland container. I was assuming that the below might be enough.
lxc.mount.entry = /dev/dri/card1 dev/dri/card1 none bind,optional,create=file lxc.mount.entry = /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file lxc.cgroup.devices.allow = c 226:* rwm The mounts work (although owned by nobody:nobody instead of root:video) and the devices cgroup stanza in the config file generates the container boot error, as described above. The mounts are not enough to get opencl access in the container: running "clinfo" (the opencl diagnostic) in the container doesn't find the devices (I presume because of ... well, something to do with /dev/dri but don't really know) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1843490 Title: lxc.cgroup.devices.allow prevents unprivileged container from starting Status in lxc package in Ubuntu: Invalid Bug description: Adding lxc.cgroup.devices.allow directives to an unprivileged container config prevent the container from starting. These lxc-start errors look relevant: lxc-start testbox 20190910192712.171 WARN cgfsng - cgroups/cgfsng.c:get_hierarchy:204 - There is no useable devices controller lxc-start testbox 20190910192712.171 ERROR cgfsng - cgroups/cgfsng.c:cg_legacy_set_data:2191 - Failed to setup limits for the "devices" controller. The controller seems to be unused by "cgfsng" cgroup driver or not enabled on the cgroup hierarchy lxc-start testbox 20190910192712.171 WARN cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2228 - Failed to set "devices.allow" to "c 10:57 rwm" It seems to me that I used lxc.cgroup.devices.allow directives without trouble a few years ago. I wonder which system upgrades broke it. To reproduce: (Note: subuid, subgid, and lxc-usernet are already configured for this user.) $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 19.04 Release: 19.04 Codename: disco $ dpkg-query --show libpam-cgfs lxc1 libpam-cgfs 3.0.3-0ubuntu1 lxc1 3.0.3-0ubuntu1 $ lxc-create -t download -n testbox -- -d ubuntu -r bionic -a amd64 The cached copy has expired, re-downloading... Setting up the GPG keyring Downloading the image index Downloading the rootfs Downloading the metadata The image cache is now ready Unpacking the rootfs --- You just created an Ubuntu bionic amd64 (20190910_07:42) container. To enable SSH, run: apt install openssh-server No default root or user password are set by LXC. $ echo "lxc.cgroup.devices.allow = c 10:57 rwm" >> lxc/testbox/config $ lxc-start -n testbox -o debug.out -l trace lxc-start: testbox: lxccontainer.c: wait_on_daemonized_start: 842 Received container state "ABORTING" instead of "RUNNING" lxc-start: testbox: tools/lxc_start.c: main: 330 The container failed to start lxc-start: testbox: tools/lxc_start.c: main: 333 To get more details, run the container in foreground mode lxc-start: testbox: tools/lxc_start.c: main: 336 Additional information can be obtained by setting the --logfile and --logpriority options $ cat debug.out lxc-start testbox 20190910192712.380 INFO confile - confile.c:set_config_idmaps:1555 - Read uid map: type u nsid 0 hostid 100000 range 65536 lxc-start testbox 20190910192712.380 INFO confile - confile.c:set_config_idmaps:1555 - Read uid map: type g nsid 0 hostid 100000 range 65536 lxc-start testbox 20190910192712.382 TRACE commands - commands.c:lxc_cmd:300 - Connection refused - Command "get_init_pid" failed to connect command socket lxc-start testbox 20190910192712.383 TRACE commands - commands.c:lxc_cmd:300 - Connection refused - Command "get_state" failed to connect command socket lxc-start testbox 20190910192712.383 TRACE start - start.c:lxc_init_handler:748 - Created anonymous pair {4,5} of unix sockets lxc-start testbox 20190910192712.383 TRACE commands - commands.c:lxc_cmd_init:1248 - Creating abstract unix socket "/home/ubuntu/lxc/testbox/command" lxc-start testbox 20190910192712.383 TRACE start - start.c:lxc_init_handler:760 - Unix domain socket 6 for command server is ready lxc-start testbox 20190910192712.388 INFO lxccontainer - lxccontainer.c:do_lxcapi_start:961 - Set process title to [lxc monitor] /home/ubuntu/lxc testbox lxc-start testbox 20190910192712.392 TRACE start - start.c:lxc_start:2052 - Doing lxc_start lxc-start testbox 20190910192712.393 INFO lsm - lsm/lsm.c:lsm_init:50 - LSM security driver AppArmor lxc-start testbox 20190910192712.393 TRACE start - start.c:lxc_init:777 - Initialized LSM lxc-start testbox 20190910192712.395 TRACE seccomp - seccomp.c:get_new_ctx:458 - Added arch 2 to main seccomp context lxc-start testbox 20190910192712.395 TRACE seccomp - seccomp.c:get_new_ctx:466 - Removed native arch from main seccomp context lxc-start testbox 20190910192712.395 TRACE seccomp - seccomp.c:get_new_ctx:458 - Added arch 3 to main seccomp context lxc-start testbox 20190910192712.395 TRACE seccomp - seccomp.c:get_new_ctx:466 - Removed native arch from main seccomp context lxc-start testbox 20190910192712.395 TRACE seccomp - seccomp.c:get_new_ctx:471 - Arch 4 already present in main seccomp context lxc-start testbox 20190910192712.395 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "reject_force_umount # comment this to allow umount -f; not recommended" lxc-start testbox 20190910192712.395 INFO seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts lxc-start testbox 20190910192712.395 INFO seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for reject_force_umount action 0(kill) lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for reject_force_umount action 0(kill) lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for reject_force_umount action 0(kill) lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:do_resolve_add_rule:505 - Set seccomp rule to reject force umounts lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for reject_force_umount action 0(kill) lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "[all]" lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "kexec_load errno 1" lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for kexec_load action 327681(errno) lxc-start testbox 20190910192712.396 INFO seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for kexec_load action 327681(errno) lxc-start testbox 20190910192712.397 INFO seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for kexec_load action 327681(errno) lxc-start testbox 20190910192712.397 INFO seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for kexec_load action 327681(errno) lxc-start testbox 20190910192712.397 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "open_by_handle_at errno 1" lxc-start testbox 20190910192712.397 INFO seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for open_by_handle_at action 327681(errno) lxc-start testbox 20190910192712.397 INFO seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for open_by_handle_at action 327681(errno) lxc-start testbox 20190910192712.397 INFO seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for open_by_handle_at action 327681(errno) lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for open_by_handle_at action 327681(errno) lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "init_module errno 1" lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for init_module action 327681(errno) lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for init_module action 327681(errno) lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for init_module action 327681(errno) lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for init_module action 327681(errno) lxc-start testbox 20190910192712.398 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "finit_module errno 1" lxc-start testbox 20190910192712.399 INFO seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for finit_module action 327681(errno) lxc-start testbox 20190910192712.399 INFO seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for finit_module action 327681(errno) lxc-start testbox 20190910192712.399 INFO seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for finit_module action 327681(errno) lxc-start testbox 20190910192712.399 INFO seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for finit_module action 327681(errno) lxc-start testbox 20190910192712.399 INFO seccomp - seccomp.c:parse_config_v2:759 - Processing "delete_module errno 1" lxc-start testbox 20190910192712.399 INFO seccomp - seccomp.c:parse_config_v2:937 - Added native rule for arch 0 for delete_module action 327681(errno) lxc-start testbox 20190910192712.400 INFO seccomp - seccomp.c:parse_config_v2:946 - Added compat rule for arch 1073741827 for delete_module action 327681(errno) lxc-start testbox 20190910192712.400 INFO seccomp - seccomp.c:parse_config_v2:956 - Added compat rule for arch 1073741886 for delete_module action 327681(errno) lxc-start testbox 20190910192712.400 INFO seccomp - seccomp.c:parse_config_v2:966 - Added native rule for arch -1073741762 for delete_module action 327681(errno) lxc-start testbox 20190910192712.400 INFO seccomp - seccomp.c:parse_config_v2:970 - Merging compat seccomp contexts into main context lxc-start testbox 20190910192712.400 TRACE seccomp - seccomp.c:parse_config_v2:980 - Merged first compat seccomp context into main context lxc-start testbox 20190910192712.400 TRACE seccomp - seccomp.c:parse_config_v2:996 - Merged second compat seccomp context into main context lxc-start testbox 20190910192712.400 TRACE start - start.c:lxc_init:784 - Read seccomp policy lxc-start testbox 20190910192712.400 TRACE start - start.c:lxc_serve_state_clients:466 - Set container state to STARTING lxc-start testbox 20190910192712.400 TRACE start - start.c:lxc_serve_state_clients:469 - No state clients registered lxc-start testbox 20190910192712.401 TRACE start - start.c:lxc_init:792 - Set container state to "STARTING" lxc-start testbox 20190910192712.401 TRACE start - start.c:lxc_init:855 - Set environment variables lxc-start testbox 20190910192712.402 TRACE start - start.c:lxc_init:862 - Ran pre-start hooks lxc-start testbox 20190910192712.402 TRACE start - start.c:setup_signal_fd:359 - Created signal file descriptor 7 lxc-start testbox 20190910192712.402 TRACE start - start.c:lxc_init:873 - Set up signal fd lxc-start testbox 20190910192712.412 DEBUG terminal - terminal.c:lxc_terminal_peer_default:707 - No such device - The process does not have a controlling terminal lxc-start testbox 20190910192712.412 TRACE start - start.c:lxc_init:881 - Created console lxc-start testbox 20190910192712.412 DEBUG conf - conf.c:chown_mapped_root:3166 - trying to chown "/dev/pts/2" to 1000 lxc-start testbox 20190910192712.547 TRACE terminal - terminal.c:lxc_terminal_map_ids:1225 - Chowned terminal "/dev/pts/2" lxc-start testbox 20190910192712.547 TRACE start - start.c:lxc_init:888 - Chowned console lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1031 - basecginfo is: lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1032 - 12:pids:/user.slice/user-1000.slice/session-4.scope 11:devices:/user.slice 10:net_cls,net_prio:/ 9:perf_event:/ 8:cpu,cpuacct:/user.slice 7:rdma:/ 6:cpuset:/ 5:hugetlb:/ 4:memory:/user.slice/user-1000.slice/session-4.scope 3:blkio:/user.slice 2:freezer:/user/ubuntu/0 1:name=systemd:/user.slice/user-1000.slice/session-4.scope 0::/user.slice/user-1000.slice/session-4.scope lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 0: pids lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 1: devices lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 2: net_cls lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 3: net_prio lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 4: perf_event lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 5: cpu lxc-start testbox 20190910192712.549 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 6: cpuacct lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 7: rdma lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 8: cpuset lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 9: hugetlb lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 10: memory lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 11: blkio lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 12: freezer lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1035 - kernel subsystem 13: cgroup2 lxc-start testbox 20190910192712.550 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_basecg_debuginfo:1038 - named subsystem 0: name=systemd lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:cg_hybrid_init:2459 - Writable cgroup hierarchies: lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1012 - Hierarchies: lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1017 - 0: base_cgroup: /user.slice/user-1000.slice/session-4.scope lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1018 - mountpoint: /sys/fs/cgroup/systemd lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1019 - controllers: lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1021 - 0: name=systemd lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1017 - 1: base_cgroup: /user/ubuntu/0 lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1018 - mountpoint: /sys/fs/cgroup/freezer lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1019 - controllers: lxc-start testbox 20190910192712.553 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1021 - 0: freezer lxc-start testbox 20190910192712.554 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1017 - 2: base_cgroup: /user.slice/user-1000.slice/session-4.scope lxc-start testbox 20190910192712.554 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1018 - mountpoint: /sys/fs/cgroup/memory lxc-start testbox 20190910192712.554 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1019 - controllers: lxc-start testbox 20190910192712.554 TRACE cgfsng - cgroups/cgfsng.c:lxc_cgfsng_print_hierarchies:1021 - 0: memory lxc-start testbox 20190910192712.554 TRACE cgroup - cgroups/cgroup.c:cgroup_init:56 - Initialized cgroup driver cgfsng lxc-start testbox 20190910192712.554 TRACE cgroup - cgroups/cgroup.c:cgroup_init:61 - Running with hybrid cgroup layout lxc-start testbox 20190910192712.554 TRACE start - start.c:lxc_init:895 - Initialized cgroup driver lxc-start testbox 20190910192712.554 INFO start - start.c:lxc_init:897 - Container "testbox" is initialized lxc-start testbox 20190910192712.561 TRACE start - start.c:lxc_spawn:1684 - Cloned child process 8596 lxc-start testbox 20190910192712.561 INFO start - start.c:lxc_spawn:1688 - Cloned CLONE_NEWUSER lxc-start testbox 20190910192712.561 INFO start - start.c:lxc_spawn:1688 - Cloned CLONE_NEWNS lxc-start testbox 20190910192712.561 INFO start - start.c:lxc_spawn:1688 - Cloned CLONE_NEWPID lxc-start testbox 20190910192712.561 INFO start - start.c:lxc_spawn:1688 - Cloned CLONE_NEWUTS lxc-start testbox 20190910192712.561 INFO start - start.c:lxc_spawn:1688 - Cloned CLONE_NEWIPC lxc-start testbox 20190910192712.561 DEBUG start - start.c:lxc_try_preserve_namespaces:196 - Preserved user namespace via fd 14 lxc-start testbox 20190910192712.561 DEBUG start - start.c:lxc_try_preserve_namespaces:196 - Preserved mnt namespace via fd 15 lxc-start testbox 20190910192712.562 DEBUG start - start.c:lxc_try_preserve_namespaces:196 - Preserved pid namespace via fd 16 lxc-start testbox 20190910192712.562 DEBUG start - start.c:lxc_try_preserve_namespaces:196 - Preserved uts namespace via fd 17 lxc-start testbox 20190910192712.562 DEBUG start - start.c:lxc_try_preserve_namespaces:196 - Preserved ipc namespace via fd 18 lxc-start testbox 20190910192712.562 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newuidmap" does have the setuid bit set lxc-start testbox 20190910192712.562 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newgidmap" does have the setuid bit set lxc-start testbox 20190910192712.562 TRACE caps - caps.c:lxc_ambient_caps_up:192 - Raised = cap_chown,cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_linux_immutable,cap_net_bind_service,cap_net_broadcast,cap_net_admin,cap_net_raw,cap_ipc_lock,cap_ipc_owner,cap_sys_module,cap_sys_rawio,cap_sys_chroot,cap_sys_ptrace,cap_sys_pacct,cap_sys_admin,cap_sys_boot,cap_sys_nice,cap_sys_resource,cap_sys_time,cap_sys_tty_config,cap_mknod,cap_lease,cap_audit_write,cap_audit_control,cap_setfcap,cap_mac_override,cap_mac_admin,cap_syslog,cap_wake_alarm,cap_block_suspend,cap_audit_read+eip in inheritable and ambient capability set lxc-start testbox 20190910192712.563 DEBUG conf - conf.c:lxc_map_ids:2928 - Functional newuidmap and newgidmap binary found lxc-start testbox 20190910192712.595 TRACE conf - conf.c:lxc_map_ids:3002 - newuidmap wrote mapping "newuidmap 8596 0 100000 65536" lxc-start testbox 20190910192712.626 TRACE conf - conf.c:lxc_map_ids:3002 - newgidmap wrote mapping "newgidmap 8596 0 100000 65536" lxc-start testbox 20190910192712.632 INFO start - start.c:do_start:1136 - Unshared CLONE_NEWNET lxc-start testbox 20190910192712.633 INFO cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2237 - Limits for the legacy cgroup hierarchies have been setup lxc-start testbox 20190910192712.635 TRACE conf - conf.c:get_minimal_idmap:4265 - Allocated minimal idmapping lxc-start testbox 20190910192712.637 TRACE conf - conf.c:userns_exec_1:4345 - Establishing uid mapping for "8601" in new user namespace: nsuid 0 - hostid 100000 - range 65536 lxc-start testbox 20190910192712.637 TRACE conf - conf.c:userns_exec_1:4345 - Establishing uid mapping for "8601" in new user namespace: nsuid 65536 - hostid 1000 - range 1 lxc-start testbox 20190910192712.637 TRACE conf - conf.c:userns_exec_1:4345 - Establishing gid mapping for "8601" in new user namespace: nsuid 0 - hostid 100000 - range 65536 lxc-start testbox 20190910192712.637 TRACE conf - conf.c:userns_exec_1:4345 - Establishing gid mapping for "8601" in new user namespace: nsuid 65536 - hostid 1000 - range 1 lxc-start testbox 20190910192712.638 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newuidmap" does have the setuid bit set lxc-start testbox 20190910192712.638 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newgidmap" does have the setuid bit set lxc-start testbox 20190910192712.638 DEBUG conf - conf.c:lxc_map_ids:2928 - Functional newuidmap and newgidmap binary found lxc-start testbox 20190910192712.670 TRACE conf - conf.c:lxc_map_ids:3002 - newuidmap wrote mapping "newuidmap 8601 0 100000 65536 65536 1000 1" lxc-start testbox 20190910192712.702 TRACE conf - conf.c:lxc_map_ids:3002 - newgidmap wrote mapping "newgidmap 8601 0 100000 65536 65536 1000 1" lxc-start testbox 20190910192712.703 TRACE conf - conf.c:run_userns_fn:4091 - Calling function "chown_cgroup_wrapper" lxc-start testbox 20190910192712.709 DEBUG start - start.c:lxc_spawn:1742 - Preserved net namespace via fd 10 lxc-start testbox 20190910192712.709 WARN start - start.c:lxc_spawn:1746 - Operation not permitted - Failed to allocate new network namespace id lxc-start testbox 20190910192712.713 INFO network - network.c:lxc_create_network_unpriv_exec:2150 - Execing lxc-user-nic create /home/ubuntu/lxc testbox 8596 veth lxcbr0 (null) lxc-start testbox 20190910192712.134 TRACE network - network.c:lxc_create_network_unpriv_exec:2181 - Received output "eth0:58:vethC0OBRR:59" from lxc-user-nic lxc-start testbox 20190910192712.134 TRACE network - network.c:lxc_network_send_veth_names_to_child:3077 - Sent network device name "eth0" to child lxc-start testbox 20190910192712.134 TRACE network - network.c:lxc_network_recv_veth_names_from_parent:3102 - Received network device name "eth0" from parent lxc-start testbox 20190910192712.134 NOTICE utils - utils.c:lxc_switch_uid_gid:1378 - Switched to gid 0 lxc-start testbox 20190910192712.134 NOTICE utils - utils.c:lxc_switch_uid_gid:1387 - Switched to uid 0 lxc-start testbox 20190910192712.134 NOTICE utils - utils.c:lxc_setgroups:1400 - Dropped additional groups lxc-start testbox 20190910192712.134 INFO start - start.c:do_start:1242 - Unshared CLONE_NEWCGROUP lxc-start testbox 20190910192712.135 TRACE conf - conf.c:remount_all_slave:3349 - Remounted all mount table entries as MS_SLAVE lxc-start testbox 20190910192712.135 DEBUG storage - storage/storage.c:get_storage_by_name:231 - Detected rootfs type "dir" lxc-start testbox 20190910192712.135 TRACE dir - storage/dir.c:dir_mount:203 - Mounted "/home/ubuntu/lxc/testbox/rootfs" on "/usr/lib/x86_64-linux-gnu/lxc" lxc-start testbox 20190910192712.135 DEBUG conf - conf.c:lxc_mount_rootfs:1332 - Mounted rootfs "/home/ubuntu/lxc/testbox/rootfs" onto "/usr/lib/x86_64-linux-gnu/lxc" with options "(null)" lxc-start testbox 20190910192712.135 INFO conf - conf.c:setup_utsname:791 - Set hostname to "testbox" lxc-start testbox 20190910192712.136 DEBUG network - network.c:setup_hw_addr:2767 - Mac address "00:16:3e:0b:60:a9" on "eth0" has been setup lxc-start testbox 20190910192712.138 DEBUG network - network.c:lxc_setup_netdev_in_child_namespaces:3032 - Network device "eth0" has been setup lxc-start testbox 20190910192712.138 INFO network - network.c:lxc_setup_network_in_child_namespaces:3053 - network has been setup lxc-start testbox 20190910192712.138 INFO conf - conf.c:mount_autodev:1118 - Preparing "/dev" lxc-start testbox 20190910192712.138 TRACE conf - conf.c:mount_autodev:1142 - Mounted tmpfs on "/usr/lib/x86_64-linux-gnu/lxc/dev" lxc-start testbox 20190910192712.138 INFO conf - conf.c:mount_autodev:1165 - Prepared "/dev" lxc-start testbox 20190910192712.139 INFO conf - conf.c:run_script_argv:356 - Executing script "/usr/share/lxcfs/lxc.mount.hook" for container "testbox", config section "lxc" lxc-start testbox 20190910192712.168 INFO conf - conf.c:lxc_fill_autodev:1209 - Populating "/dev" lxc-start testbox 20190910192712.168 DEBUG conf - conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/full" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/full" lxc-start testbox 20190910192712.168 DEBUG conf - conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/null" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/null" lxc-start testbox 20190910192712.168 DEBUG conf - conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/random" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/random" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/tty" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/tty" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/urandom" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/urandom" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:lxc_fill_autodev:1282 - Bind mounted host device node "/dev/zero" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/zero" lxc-start testbox 20190910192712.169 INFO conf - conf.c:lxc_fill_autodev:1286 - Populated "/dev" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2027 - Remounting "/sys/fs/fuse/connections" on "/usr/lib/x86_64-linux-gnu/lxc/sys/fs/fuse/connections" to respect bind or remount options lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2048 - Flags for "/sys/fs/fuse/connections" were 4096, required extra flags are 0 lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2058 - Mountflags already were 4096, skipping remount lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "/sys/fs/fuse/connections" on "/usr/lib/x86_64-linux-gnu/lxc/sys/fs/fuse/connections" with filesystem type "none" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2027 - Remounting "/sys/kernel/debug" on "/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/debug" to respect bind or remount options lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2048 - Flags for "/sys/kernel/debug" were 4096, required extra flags are 0 lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2058 - Mountflags already were 4096, skipping remount lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "/sys/kernel/debug" on "/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/debug" with filesystem type "none" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2027 - Remounting "/sys/kernel/security" on "/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/security" to respect bind or remount options lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2048 - Flags for "/sys/kernel/security" were 4110, required extra flags are 14 lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "/sys/kernel/security" on "/usr/lib/x86_64-linux-gnu/lxc/sys/kernel/security" with filesystem type "none" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2027 - Remounting "/sys/fs/pstore" on "/usr/lib/x86_64-linux-gnu/lxc/sys/fs/pstore" to respect bind or remount options lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2048 - Flags for "/sys/fs/pstore" were 4110, required extra flags are 14 lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "/sys/fs/pstore" on "/usr/lib/x86_64-linux-gnu/lxc/sys/fs/pstore" with filesystem type "none" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "mqueue" on "/usr/lib/x86_64-linux-gnu/lxc/dev/mqueue" with filesystem type "mqueue" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2027 - Remounting "/sys/firmware/efi/efivars" on "/usr/lib/x86_64-linux-gnu/lxc/sys/firmware/efi/efivars" to respect bind or remount options lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2048 - Flags for "/sys/firmware/efi/efivars" were 4110, required extra flags are 14 lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "/sys/firmware/efi/efivars" on "/usr/lib/x86_64-linux-gnu/lxc/sys/firmware/efi/efivars" with filesystem type "none" lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2027 - Remounting "/proc/sys/fs/binfmt_misc" on "/usr/lib/x86_64-linux-gnu/lxc/proc/sys/fs/binfmt_misc" to respect bind or remount options lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2048 - Flags for "/proc/sys/fs/binfmt_misc" were 4096, required extra flags are 0 lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2058 - Mountflags already were 4096, skipping remount lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:mount_entry:2102 - Mounted "/proc/sys/fs/binfmt_misc" on "/usr/lib/x86_64-linux-gnu/lxc/proc/sys/fs/binfmt_misc" with filesystem type "none" lxc-start testbox 20190910192712.169 INFO conf - conf.c:mount_file_entries:2333 - Finished setting up mounts lxc-start testbox 20190910192712.169 DEBUG conf - conf.c:lxc_setup_dev_console:1771 - Mounted pts device "/dev/pts/2" onto "/usr/lib/x86_64-linux-gnu/lxc/dev/console" lxc-start testbox 20190910192712.169 INFO utils - utils.c:lxc_mount_proc_if_needed:1231 - I am 1, /proc/self points to "1" lxc-start testbox 20190910192712.170 TRACE conf - conf.c:lxc_pivot_root:1540 - pivot_root("/usr/lib/x86_64-linux-gnu/lxc") successful lxc-start testbox 20190910192712.170 WARN conf - conf.c:lxc_setup_devpts:1616 - Invalid argument - Failed to unmount old devpts instance lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_devpts:1653 - Mount new devpts instance with options "gid=5,newinstance,ptmxmode=0666,mode=0620,max=1024" lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_devpts:1672 - Created dummy "/dev/ptmx" file as bind mount target lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_devpts:1677 - Bind mounted "/dev/pts/ptmx" to "/dev/ptmx" lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/0" with master fd 11 and slave fd 14 lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/1" with master fd 15 and slave fd 16 lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/2" with master fd 17 and slave fd 18 lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_allocate_ttys:989 - Created tty "/dev/pts/3" with master fd 19 and slave fd 20 lxc-start testbox 20190910192712.170 INFO conf - conf.c:lxc_allocate_ttys:1005 - Finished creating 4 tty devices lxc-start testbox 20190910192712.170 TRACE conf - conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/0" with master fd 11 and slave fd 14 to parent lxc-start testbox 20190910192712.170 TRACE conf - conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/1" with master fd 15 and slave fd 16 to parent lxc-start testbox 20190910192712.170 TRACE conf - conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/2" with master fd 17 and slave fd 18 to parent lxc-start testbox 20190910192712.170 TRACE conf - conf.c:lxc_send_ttys_to_parent:1057 - Sent tty "/dev/pts/3" with master fd 19 and slave fd 20 to parent lxc-start testbox 20190910192712.170 TRACE conf - conf.c:lxc_send_ttys_to_parent:1063 - Sent 4 ttys to parent lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/0" onto "/dev/tty1" lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/1" onto "/dev/tty2" lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/2" onto "/dev/tty3" lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:lxc_setup_ttys:940 - Bind mounted "/dev/pts/3" onto "/dev/tty4" lxc-start testbox 20190910192712.170 INFO conf - conf.c:lxc_setup_ttys:949 - Finished setting up 4 /dev/tty<N> device(s) lxc-start testbox 20190910192712.170 INFO conf - conf.c:setup_personality:1716 - Set personality to "0x0" lxc-start testbox 20190910192712.170 DEBUG conf - conf.c:setup_caps:2506 - Capabilities have been setup lxc-start testbox 20190910192712.170 NOTICE conf - conf.c:lxc_setup:3692 - The container "testbox" is set up lxc-start testbox 20190910192712.170 INFO lsm - lsm/lsm.c:lsm_process_label_set_at:178 - Set AppArmor label to "lxc-container-default-cgns" lxc-start testbox 20190910192712.170 INFO apparmor - lsm/apparmor.c:apparmor_process_label_set:249 - Changed apparmor profile to lxc-container-default-cgns # # pseudo filter code start # # filter for arch x86_64 (3221225534) if ($arch == 3221225534) # filter for syscall "finit_module" (313) [priority: 65535] if ($syscall == 313) action ERRNO(1); # filter for syscall "open_by_handle_at" (304) [priority: 65535] if ($syscall == 304) action ERRNO(1); # filter for syscall "kexec_load" (246) [priority: 65535] if ($syscall == 246) action ERRNO(1); # filter for syscall "delete_module" (176) [priority: 65535] if ($syscall == 176) action ERRNO(1); # filter for syscall "init_module" (175) [priority: 65535] if ($syscall == 175) action ERRNO(1); # filter for syscall "umount2" (166) [priority: 65533] if ($syscall == 166) if ($a1.hi32 & 0x00000000 == 0) if ($a1.lo32 & 0x00000001 == 1) action ERRNO(13); # default action action ALLOW; # filter for arch x86 (1073741827) if ($arch == 1073741827) # filter for syscall "finit_module" (350) [priority: 65535] if ($syscall == 350) action ERRNO(1); # filter for syscall "open_by_handle_at" (342) [priority: 65535] if ($syscall == 342) action ERRNO(1); # filter for syscall "kexec_load" (283) [priority: 65535] if ($syscall == 283) action ERRNO(1); # filter for syscall "delete_module" (129) [priority: 65535] if ($syscall == 129) action ERRNO(1); # filter for syscall "init_module" (128) [priority: 65535] if ($syscall == 128) action ERRNO(1); # filter for syscall "umount2" (52) [priority: 65534] if ($syscall == 52) if ($a1 & 0x00000001 == 1) action ERRNO(13); # default action action ALLOW; # filter for arch x32 (3221225534) if ($arch == 3221225534) # filter for syscall "kexec_load" (1073742352) [priority: 65535] if ($syscall == 1073742352) action ERRNO(1); # filter for syscall "finit_module" (1073742137) [priority: 65535] if ($syscall == 1073742137) action ERRNO(1); # filter for syscall "open_by_handle_at" (1073742128) [priority: 65535] if ($syscall == 1073742128) action ERRNO(1); # filter for syscall "delete_module" (1073742000) [priority: 65535] if ($syscall == 1073742000) action ERRNO(1); # filter for syscall "init_module" (1073741999) [priority: 65535] if ($syscall == 1073741999) action ERRNO(1); # filter for syscall "umount2" (1073741990) [priority: 65534] if ($syscall == 1073741990) if ($a1 & 0x00000001 == 1) action ERRNO(13); # default action action ALLOW; # invalid architecture action action KILL; # # pseudo filter code end # lxc-start testbox 20190910192712.171 WARN cgfsng - cgroups/cgfsng.c:get_hierarchy:204 - There is no useable devices controller lxc-start testbox 20190910192712.171 ERROR cgfsng - cgroups/cgfsng.c:cg_legacy_set_data:2191 - Failed to setup limits for the "devices" controller. The controller seems to be unused by "cgfsng" cgroup driver or not enabled on the cgroup hierarchy lxc-start testbox 20190910192712.171 WARN cgfsng - cgroups/cgfsng.c:__cg_legacy_setup_limits:2228 - Failed to set "devices.allow" to "c 10:57 rwm" lxc-start testbox 20190910192712.171 ERROR start - start.c:lxc_spawn:1802 - Failed to setup legacy device cgroup controller limits lxc-start testbox 20190910192712.171 DEBUG network - network.c:lxc_delete_network:3180 - Deleted network devices lxc-start testbox 20190910192712.171 TRACE start - start.c:lxc_serve_state_socket_pair:536 - Sent container state "ABORTING" to 5 lxc-start testbox 20190910192712.171 TRACE start - start.c:lxc_serve_state_clients:466 - Set container state to ABORTING lxc-start testbox 20190910192712.171 TRACE start - start.c:lxc_serve_state_clients:469 - No state clients registered lxc-start testbox 20190910192712.171 DEBUG lxccontainer - lxccontainer.c:wait_on_daemonized_start:830 - First child 8588 exited lxc-start testbox 20190910192712.171 ERROR lxccontainer - lxccontainer.c:wait_on_daemonized_start:842 - Received container state "ABORTING" instead of "RUNNING" lxc-start testbox 20190910192712.171 ERROR lxc_start - tools/lxc_start.c:main:330 - The container failed to start lxc-start testbox 20190910192712.171 ERROR lxc_start - tools/lxc_start.c:main:333 - To get more details, run the container in foreground mode lxc-start testbox 20190910192712.171 ERROR lxc_start - tools/lxc_start.c:main:336 - Additional information can be obtained by setting the --logfile and --logpriority options lxc-start testbox 20190910192712.171 ERROR start - start.c:__lxc_start:1939 - Failed to spawn container "testbox" lxc-start testbox 20190910192712.171 TRACE start - start.c:lxc_serve_state_clients:466 - Set container state to STOPPING lxc-start testbox 20190910192712.171 TRACE start - start.c:lxc_serve_state_clients:469 - No state clients registered lxc-start testbox 20190910192712.171 TRACE conf - conf.c:get_minimal_idmap:4265 - Allocated minimal idmapping lxc-start testbox 20190910192712.171 TRACE conf - conf.c:userns_exec_1:4345 - Establishing uid mapping for "8669" in new user namespace: nsuid 0 - hostid 100000 - range 65536 lxc-start testbox 20190910192712.171 TRACE conf - conf.c:userns_exec_1:4345 - Establishing uid mapping for "8669" in new user namespace: nsuid 65536 - hostid 1000 - range 1 lxc-start testbox 20190910192712.171 TRACE conf - conf.c:userns_exec_1:4345 - Establishing gid mapping for "8669" in new user namespace: nsuid 0 - hostid 100000 - range 65536 lxc-start testbox 20190910192712.171 TRACE conf - conf.c:userns_exec_1:4345 - Establishing gid mapping for "8669" in new user namespace: nsuid 65536 - hostid 1000 - range 1 lxc-start testbox 20190910192712.171 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newuidmap" does have the setuid bit set lxc-start testbox 20190910192712.171 DEBUG conf - conf.c:idmaptool_on_path_and_privileged:2836 - The binary "/usr/bin/newgidmap" does have the setuid bit set lxc-start testbox 20190910192712.171 DEBUG conf - conf.c:lxc_map_ids:2928 - Functional newuidmap and newgidmap binary found lxc-start testbox 20190910192712.173 TRACE conf - conf.c:lxc_map_ids:3002 - newuidmap wrote mapping "newuidmap 8669 0 100000 65536 65536 1000 1" lxc-start testbox 20190910192712.175 TRACE conf - conf.c:lxc_map_ids:3002 - newgidmap wrote mapping "newgidmap 8669 0 100000 65536 65536 1000 1" lxc-start testbox 20190910192712.175 TRACE conf - conf.c:run_userns_fn:4091 - Calling function "cgroup_rmdir_wrapper" lxc-start testbox 20190910192712.176 TRACE start - start.c:lxc_fini:1001 - Closed command socket lxc-start testbox 20190910192712.176 TRACE start - start.c:lxc_fini:1012 - Set container state to "STOPPED" lxc-start testbox 20190910192712.176 INFO conf - conf.c:run_script_argv:356 - Executing script "/usr/share/lxcfs/lxc.reboot.hook" for container "testbox", config section "lxc" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1843490/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp