Lxc exec results in "Error: Failed to retrieve PID of executing child process"

Hello,
I’ve installed LXD using snap on a fresh OpenSUSE 15.3 box, and created a new container, however, when I attempt to connect to it using lxc exec, I receive the error message:
hydra:~ # lxc exec control bash
Error: Failed to retrieve PID of executing child process

FWIW lxc console does connect, but without being able to set the root password it’s pretty unusable :slight_smile:

Any thoughts?

My LXC and LXD versions are both 4.14:
hydra:~ # lxc version
Client version: 4.14
Server version: 4.14
hydra:~ # lxd version
4.14

Here’s lxd running in debug/verbose mode while this is happening:

Can you show a full lxc info output?
Is that using the native OpenSUSE package?

I remember this error happening in some combination of LXD, LXC and kernel, it’s quite possible that some specific version of OpenSUSE has things badly aligned in that regard.

It is using the snap package, as I followed the guide from Linux Containers - LXD - Getting started - command line. Alhough I can try the straight native OpenSUSE package as well. The whole setup is a fresh server install of OpenSUSE 15.3

hydra:~ # lxc info
config:
core.https_address: ‘[::]:8443’
core.trust_password: true
api_extensions:

  • storage_zfs_remove_snapshots
  • container_host_shutdown_timeout
  • container_stop_priority
  • container_syscall_filtering
  • auth_pki
  • container_last_used_at
  • etag
  • patch
  • usb_devices
  • https_allowed_credentials
  • image_compression_algorithm
  • directory_manipulation
  • container_cpu_time
  • storage_zfs_use_refquota
  • storage_lvm_mount_options
  • network
  • profile_usedby
  • container_push
  • container_exec_recording
  • certificate_update
  • container_exec_signal_handling
  • gpu_devices
  • container_image_properties
  • migration_progress
  • id_map
  • network_firewall_filtering
  • network_routes
  • storage
  • file_delete
  • file_append
  • network_dhcp_expiry
  • storage_lvm_vg_rename
  • storage_lvm_thinpool_rename
  • network_vlan
  • image_create_aliases
  • container_stateless_copy
  • container_only_migration
  • storage_zfs_clone_copy
  • unix_device_rename
  • storage_lvm_use_thinpool
  • storage_rsync_bwlimit
  • network_vxlan_interface
  • storage_btrfs_mount_options
  • entity_description
  • image_force_refresh
  • storage_lvm_lv_resizing
  • id_map_base
  • file_symlinks
  • container_push_target
  • network_vlan_physical
  • storage_images_delete
  • container_edit_metadata
  • container_snapshot_stateful_migration
  • storage_driver_ceph
  • storage_ceph_user_name
  • resource_limits
  • storage_volatile_initial_source
  • storage_ceph_force_osd_reuse
  • storage_block_filesystem_btrfs
  • resources
  • kernel_limits
  • storage_api_volume_rename
  • macaroon_authentication
  • network_sriov
  • console
  • restrict_devlxd
  • migration_pre_copy
  • infiniband
  • maas_network
  • devlxd_events
  • proxy
  • network_dhcp_gateway
  • file_get_symlink
  • network_leases
  • unix_device_hotplug
  • storage_api_local_volume_handling
  • operation_description
  • clustering
  • event_lifecycle
  • storage_api_remote_volume_handling
  • nvidia_runtime
  • container_mount_propagation
  • container_backup
  • devlxd_images
  • container_local_cross_pool_handling
  • proxy_unix
  • proxy_udp
  • clustering_join
  • proxy_tcp_udp_multi_port_handling
  • network_state
  • proxy_unix_dac_properties
  • container_protection_delete
  • unix_priv_drop
  • pprof_http
  • proxy_haproxy_protocol
  • network_hwaddr
  • proxy_nat
  • network_nat_order
  • container_full
  • candid_authentication
  • backup_compression
  • candid_config
  • nvidia_runtime_config
  • storage_api_volume_snapshots
  • storage_unmapped
  • projects
  • candid_config_key
  • network_vxlan_ttl
  • container_incremental_copy
  • usb_optional_vendorid
  • snapshot_scheduling
  • snapshot_schedule_aliases
  • container_copy_project
  • clustering_server_address
  • clustering_image_replication
  • container_protection_shift
  • snapshot_expiry
  • container_backup_override_pool
  • snapshot_expiry_creation
  • network_leases_location
  • resources_cpu_socket
  • resources_gpu
  • resources_numa
  • kernel_features
  • id_map_current
  • event_location
  • storage_api_remote_volume_snapshots
  • network_nat_address
  • container_nic_routes
  • rbac
  • cluster_internal_copy
  • seccomp_notify
  • lxc_features
  • container_nic_ipvlan
  • network_vlan_sriov
  • storage_cephfs
  • container_nic_ipfilter
  • resources_v2
  • container_exec_user_group_cwd
  • container_syscall_intercept
  • container_disk_shift
  • storage_shifted
  • resources_infiniband
  • daemon_storage
  • instances
  • image_types
  • resources_disk_sata
  • clustering_roles
  • images_expiry
  • resources_network_firmware
  • backup_compression_algorithm
  • ceph_data_pool_name
  • container_syscall_intercept_mount
  • compression_squashfs
  • container_raw_mount
  • container_nic_routed
  • container_syscall_intercept_mount_fuse
  • container_disk_ceph
  • virtual-machines
  • image_profiles
  • clustering_architecture
  • resources_disk_id
  • storage_lvm_stripes
  • vm_boot_priority
  • unix_hotplug_devices
  • api_filtering
  • instance_nic_network
  • clustering_sizing
  • firewall_driver
  • projects_limits
  • container_syscall_intercept_hugetlbfs
  • limits_hugepages
  • container_nic_routed_gateway
  • projects_restrictions
  • custom_volume_snapshot_expiry
  • volume_snapshot_scheduling
  • trust_ca_certificates
  • snapshot_disk_usage
  • clustering_edit_roles
  • container_nic_routed_host_address
  • container_nic_ipvlan_gateway
  • resources_usb_pci
  • resources_cpu_threads_numa
  • resources_cpu_core_die
  • api_os
  • container_nic_routed_host_table
  • container_nic_ipvlan_host_table
  • container_nic_ipvlan_mode
  • resources_system
  • images_push_relay
  • network_dns_search
  • container_nic_routed_limits
  • instance_nic_bridged_vlan
  • network_state_bond_bridge
  • usedby_consistency
  • custom_block_volumes
  • clustering_failure_domains
  • resources_gpu_mdev
  • console_vga_type
  • projects_limits_disk
  • network_type_macvlan
  • network_type_sriov
  • container_syscall_intercept_bpf_devices
  • network_type_ovn
  • projects_networks
  • projects_networks_restricted_uplinks
  • custom_volume_backup
  • backup_override_name
  • storage_rsync_compression
  • network_type_physical
  • network_ovn_external_subnets
  • network_ovn_nat
  • network_ovn_external_routes_remove
  • tpm_device_type
  • storage_zfs_clone_copy_rebase
  • gpu_mdev
  • resources_pci_iommu
  • resources_network_usb
  • resources_disk_address
  • network_physical_ovn_ingress_mode
  • network_ovn_dhcp
  • network_physical_routes_anycast
  • projects_limits_instances
  • network_state_vlan
  • instance_nic_bridged_port_isolation
  • instance_bulk_state_change
  • network_gvrp
  • instance_pool_move
  • gpu_sriov
  • pci_device_type
  • storage_volume_state
  • network_acl
  • migration_stateful
  • disk_state_quota
  • storage_ceph_features
  • projects_compression
  • projects_images_remote_cache_expiry
  • certificate_project
  • network_ovn_acl
  • projects_images_auto_update
  • projects_restricted_cluster_target
  • images_default_architecture
  • network_ovn_acl_defaults
  • gpu_mig
  • project_usage
  • network_bridge_acl
  • warnings
  • projects_restricted_backups_and_snapshots
  • clustering_join_token
  • clustering_description
    api_status: stable
    api_version: “1.0”
    auth: trusted
    public: false
    auth_methods:
  • tls
    environment:
    addresses:
    • 192.168.24.133:8443
    • 172.16.0.1:8443
      architectures:
    • x86_64
    • i686
      certificate: |
      -----BEGIN CERTIFICATE-----
      REDACTED
      -----END CERTIFICATE-----
      certificate_fingerprint: redacted
      driver: qemu | lxc
      driver_version: 5.2.0 | 4.0.9
      firewall: nftables
      kernel: Linux
      kernel_architecture: x86_64
      kernel_features:
      netnsid_getifaddrs: “true”
      seccomp_listener: “true”
      seccomp_listener_continue: “false”
      shiftfs: “false”
      uevent_injection: “true”
      unpriv_fscaps: “true”
      kernel_version: 5.3.18-57-default
      lxc_features:
      cgroup2: “true”
      devpts_fd: “true”
      mount_injection_file: “true”
      network_gateway_device_route: “true”
      network_ipvlan: “true”
      network_l2proxy: “true”
      network_phys_macvlan_mtu: “true”
      network_veth_router: “true”
      pidfd: “true”
      seccomp_allow_deny_syntax: “true”
      seccomp_notify: “true”
      seccomp_proxy_send_notify_fd: “true”
      os_name: openSUSE Leap
      os_version: “15.3”
      project: default
      server: lxd
      server_clustered: false
      server_name: hydra
      server_pid: 15686
      server_version: “4.14”
      storage: btrfs
      storage_version: 4.15.1

Just tried on a separate box with the package available in the repos, looks very much to be in the same state.

@brauner that’s our stable snap + a 5.3.18 kernel failing with what’s normally associated to a pidfd related error. Any ideas?

For one of your containers, can you do:

  • lxc stop NAME
  • lxc config set NAME raw.lxc lxc.log.level=trace
  • lxc start NAME
  • lxc exec NAME bash
  • lxc info --show-log NAME
hydra:~ # lxc stop control
hydra:~ # lxc config set control raw.lxc lxc.log.level=trace
hydra:~ # lxc start control
hydra:~ # lxc exec control bash
Error: Failed to retrieve PID of executing child process
hydra:~ # lxc info --show-log control
Name: control
Location: none
Remote: unix://
Architecture: x86_64
Created: 2021/06/07 19:55 UTC
Status: Running
Type: container
Profiles: default
Pid: 17623
Ips:
  eth0: inet6   fe80::216:3eff:fe97:dca9        vethe504cc86
  lo:   inet    127.0.0.1
  lo:   inet6   ::1
Resources:
  Processes: 11
  CPU usage:
    CPU usage (in seconds): 4
  Memory usage:
    Memory (current): 37.89MB
    Memory (peak): 42.15MB
  Network usage:
    eth0:
      Bytes received: 220B
      Bytes sent: 1.27kB
      Packets received: 2
      Packets sent: 9
    lo:
      Bytes received: 0B
      Bytes sent: 0B
      Packets received: 0
      Packets sent: 0

Log:

lxc control 20210607213036.457 TRACE    commands - commands.c:lxc_cmd:511 - Connection refused - Command "get_state" failed to connect command socket
lxc control 20210607213036.457 TRACE    start - start.c:lxc_init_handler:712 - Created anonymous pair {3,7} of unix sockets
lxc control 20210607213036.457 TRACE    commands - commands.c:lxc_server_init:2063 - Created abstract unix socket "/var/snap/lxd/common/lxd/containers/control/command"
lxc control 20210607213036.457 TRACE    start - start.c:lxc_init_handler:727 - Unix domain socket 9 for command server is ready
lxc control 20210607213036.459 INFO     lxccontainer - lxccontainer.c:do_lxcapi_start:988 - Set process title to [lxc monitor] /var/snap/lxd/common/lxd/containers control
lxc control 20210607213036.459 INFO     start - start.c:lxc_check_inherited:296 - Closed inherited fd 4
lxc control 20210607213036.459 INFO     start - start.c:lxc_check_inherited:296 - Closed inherited fd 5
lxc control 20210607213036.459 INFO     start - start.c:lxc_check_inherited:296 - Closed inherited fd 6
lxc control 20210607213036.459 INFO     start - start.c:lxc_check_inherited:296 - Closed inherited fd 16
lxc control 20210607213036.459 TRACE    start - start.c:lxc_start:2186 - Doing lxc_start
lxc control 20210607213036.459 INFO     lsm - lsm/lsm.c:lsm_init_static:40 - Initialized LSM security driver AppArmor
lxc control 20210607213036.460 TRACE    start - start.c:lxc_init:750 - Initialized LSM
lxc control 20210607213036.460 TRACE    start - start.c:lxc_serve_state_clients:448 - Set container state to STARTING
lxc control 20210607213036.460 TRACE    start - start.c:lxc_serve_state_clients:451 - No state clients registered
lxc control 20210607213036.460 TRACE    start - start.c:lxc_init:756 - Set container state to "STARTING"
lxc control 20210607213036.460 TRACE    start - start.c:lxc_init:812 - Set environment variables
lxc control 20210607213036.460 INFO     conf - conf.c:run_script_argv:335 - Executing script "/proc/15686/exe callhook /var/snap/lxd/common/lxd "default" "control" start" for container "control"
lxc control 20210607213036.460 TRACE    conf - conf.c:run_script_argv:378 - Set environment variable: LXC_HOOK_TYPE=pre-start
lxc control 20210607213036.460 TRACE    conf - conf.c:run_script_argv:383 - Set environment variable: LXC_HOOK_SECTION=lxc
lxc control 20210607213036.460 DEBUG    lxccontainer - lxccontainer.c:wait_on_daemonized_start:849 - First child 17610 exited
lxc control 20210607213036.642 TRACE    start - start.c:lxc_init:817 - Ran pre-start hooks
lxc control 20210607213036.642 TRACE    start - start.c:setup_signal_fd:341 - Created signal file descriptor 5
lxc control 20210607213036.642 TRACE    start - start.c:lxc_init:826 - Set up signal fd
lxc control 20210607213036.643 TRACE    conf - conf.c:userns_exec_mapped_root:4839 - Chowned 10((null)) to uid 1000000 and 1000000
lxc control 20210607213036.643 TRACE    terminal - terminal.c:lxc_terminal_map_ids:860 - Chowned terminal 10((null))
lxc control 20210607213036.643 DEBUG    terminal - terminal.c:lxc_terminal_peer_default:665 - No such device - The process does not have a controlling terminal
lxc control 20210607213036.643 DEBUG    terminal - terminal.c:lxc_terminal_create_log_file:837 - Using "/var/snap/lxd/common/lxd/logs/control/console.log" as terminal log file
lxc control 20210607213036.643 TRACE    terminal - terminal.c:lxc_terminal_create_ringbuf:818 - Allocated 131072 byte terminal ringbuffer
lxc control 20210607213036.643 TRACE    start - start.c:lxc_init:834 - Created console
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at freezer and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the freezer controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at pids and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the pids controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at memory and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the memory controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at cpu,cpuacct and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the cpu controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the cpuacct controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at hugetlb and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the hugetlb controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at devices and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the devices controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at blkio and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the blkio controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at net_cls,net_prio and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the net_cls controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the net_prio controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at rdma and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the rdma controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at perf_event and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the perf_event controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at cpuset and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the cpuset controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at systemd and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:449 - The hierarchy contains the name=systemd controller
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:__initialize_cgroups:3158 - No controllers are enabled for delegation in the unified hierarchy
lxc control 20210607213036.643 TRACE    cgfsng - cgroups/cgfsng.c:cgroup_hierarchy_add:447 - Adding cgroup hierarchy mounted at unified and base cgroup (null)
lxc control 20210607213036.643 TRACE    cgroup - cgroups/cgroup.c:cgroup_init:42 - Initialized cgroup driver cgfsng
lxc control 20210607213036.644 TRACE    cgroup - cgroups/cgroup.c:cgroup_init:47 - Hybrid cgroup layout
lxc control 20210607213036.644 TRACE    start - start.c:lxc_init:841 - Initialized cgroup driver
lxc control 20210607213036.644 DEBUG    seccomp - seccomp.c:parse_config_v2:656 - Host native arch is [3221225534]
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:get_new_ctx:470 - Added arch 2 to main seccomp context
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:get_new_ctx:478 - Removed native arch from main seccomp context
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:get_new_ctx:470 - Added arch 3 to main seccomp context
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:get_new_ctx:478 - Removed native arch from main seccomp context
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:get_new_ctx:483 - Arch 4 already present in main seccomp context
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "[all]"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "reject_force_umount  # comment this to allow umount -f;  not recommended"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:524 - Set seccomp rule to reject force umounts
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "[all]"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "kexec_load errno 38"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding native rule for syscall[246:kexec_load] action[327718:errno] arch[0]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[246:kexec_load] action[327718:errno] arch[1073741827]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[246:kexec_load] action[327718:errno] arch[1073741886]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "open_by_handle_at errno 38"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding native rule for syscall[304:open_by_handle_at] action[327718:errno] arch[0]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[304:open_by_handle_at] action[327718:errno] arch[1073741827]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[304:open_by_handle_at] action[327718:errno] arch[1073741886]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "init_module errno 38"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding native rule for syscall[175:init_module] action[327718:errno] arch[0]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[175:init_module] action[327718:errno] arch[1073741827]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[175:init_module] action[327718:errno] arch[1073741886]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "finit_module errno 38"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding native rule for syscall[313:finit_module] action[327718:errno] arch[0]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[313:finit_module] action[327718:errno] arch[1073741827]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[313:finit_module] action[327718:errno] arch[1073741886]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:807 - Processing "delete_module errno 38"
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding native rule for syscall[176:delete_module] action[327718:errno] arch[0]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[176:delete_module] action[327718:errno] arch[1073741827]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:do_resolve_add_rule:566 - Adding compat rule for syscall[176:delete_module] action[327718:errno] arch[1073741886]
lxc control 20210607213036.644 INFO     seccomp - seccomp.c:parse_config_v2:1017 - Merging compat seccomp contexts into main context
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:parse_config_v2:1027 - Merged first compat seccomp context into main context
lxc control 20210607213036.644 TRACE    seccomp - seccomp.c:parse_config_v2:1043 - Merged second compat seccomp context into main context
lxc control 20210607213036.644 TRACE    start - start.c:lxc_init:846 - Read seccomp policy
lxc control 20210607213036.644 TRACE    start - start.c:lxc_init:853 - Initialized LSM
lxc control 20210607213036.644 INFO     start - start.c:lxc_init:855 - Container "control" is initialized
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 13(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 14(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 15(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 16(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 17(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 18(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 19(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 20(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 21(lxc.monitor.control) cgroup
lxc control 20210607213036.644 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 22(lxc.monitor.control) cgroup
lxc control 20210607213036.661 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 23(lxc.monitor.control) cgroup
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cpuset1_cpus_initialize:656 - No isolated or offline cpus present in cpuset
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cpuset1_initialize:712 - Initialized cpuset in the legacy hierarchy
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 24(lxc.monitor.control) cgroup
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 25(lxc.monitor.control) cgroup
lxc control 20210607213036.662 INFO     cgfsng - cgroups/cgfsng.c:cgfsng_monitor_create:1070 - The monitor process uses "lxc.monitor.control" as cgroup
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 26
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 26
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 27
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 27
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 28
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 28
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 29
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 29
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 30
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 30
lxc control 20210607213036.662 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 31
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 31
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 32
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 32
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 33
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 33
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 34
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 34
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 35
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 35
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 36
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 36
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 37
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 37
lxc control 20210607213036.663 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1220 - Moved monitor into cgroup 38
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_monitor_enter:1229 - Moved transient process into cgroup 38
lxc control 20210607213036.664 DEBUG    storage - storage/storage.c:get_storage_by_name:211 - Detected rootfs type "dir"
lxc control 20210607213036.664 TRACE    conf - conf.c:lxc_rootfs_init:565 - Not pinning because container runs in user namespace
lxc control 20210607213036.664 DEBUG    storage - storage/storage.c:get_storage_by_name:211 - Detected rootfs type "dir"
lxc control 20210607213036.664 TRACE    sync - sync.c:lxc_sync_init:141 - Initialized synchronization infrastructure
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 13(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 14(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 15(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 16(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 17(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 18(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 19(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 20(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 21(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 22(lxc.payload.control) cgroup
lxc control 20210607213036.664 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 23(lxc.payload.control) cgroup
lxc control 20210607213036.665 TRACE    cgfsng - cgroups/cgfsng.c:cpuset1_cpus_initialize:656 - No isolated or offline cpus present in cpuset
lxc control 20210607213036.665 TRACE    cgfsng - cgroups/cgfsng.c:cpuset1_initialize:712 - Initialized cpuset in the legacy hierarchy
lxc control 20210607213036.665 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 24(lxc.payload.control) cgroup
lxc control 20210607213036.665 TRACE    cgfsng - cgroups/cgfsng.c:__cgroup_tree_create:751 - Created 25(lxc.payload.control) cgroup
lxc control 20210607213036.665 INFO     cgfsng - cgroups/cgfsng.c:cgfsng_payload_create:1179 - The container process uses "lxc.payload.control" as inner and "lxc.payload.control" as limit cgroup
lxc control 20210607213036.665 TRACE    start - start.c:lxc_spawn:1690 - Argument list too long - Failed to spawn container directly into target cgroup
lxc control 20210607213036.666 TRACE    start - start.c:lxc_spawn:1741 - Cloned child process 17623
lxc control 20210607213036.666 ERROR    utils - utils.c:lxc_can_use_pidfd:1793 - Invalid argument - Kernel does not support waiting on processes through pidfds
lxc control 20210607213036.666 INFO     start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWUSER
lxc control 20210607213036.666 INFO     start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWNS
lxc control 20210607213036.666 INFO     start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWPID
lxc control 20210607213036.666 INFO     start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWUTS
lxc control 20210607213036.666 INFO     start - start.c:lxc_spawn:1757 - Cloned CLONE_NEWIPC
lxc control 20210607213036.666 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved user namespace via fd 44 and stashed path as user:/proc/17611/fd/44
lxc control 20210607213036.666 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved mnt namespace via fd 45 and stashed path as mnt:/proc/17611/fd/45
lxc control 20210607213036.666 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved pid namespace via fd 46 and stashed path as pid:/proc/17611/fd/46
lxc control 20210607213036.666 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved uts namespace via fd 47 and stashed path as uts:/proc/17611/fd/47
lxc control 20210607213036.666 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved ipc namespace via fd 48 and stashed path as ipc:/proc/17611/fd/48
lxc control 20210607213036.666 WARN     conf - conf.c:lxc_map_ids:3007 - newuidmap binary is missing
lxc control 20210607213036.666 WARN     conf - conf.c:lxc_map_ids:3013 - newgidmap binary is missing
lxc control 20210607213036.666 DEBUG    conf - conf.c:lxc_map_ids:3027 - No newuidmap and newgidmap binary found. Trying to write directly with euid 0
lxc control 20210607213036.666 TRACE    conf - conf.c:lxc_map_ids:3093 - Wrote mapping "0 1000000 1000000000
"
lxc control 20210607213036.666 TRACE    conf - conf.c:lxc_map_ids:3093 - Wrote mapping "0 1000000 1000000000
"
lxc control 20210607213036.666 TRACE    sync - sync.c:lxc_sync_wake_child:124 - Child waking parent with sequence startup
lxc control 20210607213036.666 TRACE    sync - sync.c:lxc_sync_wait_child:118 - Child waiting for parent with sequence configure
lxc control 20210607213036.666 TRACE    sync - sync.c:lxc_sync_wait_parent:112 - Parent waiting for child with sequence startup
lxc control 20210607213036.668 INFO     start - start.c:do_start:1085 - Unshared CLONE_NEWNET
lxc control 20210607213036.668 TRACE    sync - sync.c:lxc_sync_barrier_parent:93 - Child waking parent with sequence configure and waiting for sequence post-configure
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/freezer/lxc.payload.control cgroup via 30
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/pids/lxc.payload.control cgroup via 31
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/memory/lxc.payload.control cgroup via 32
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/cpu,cpuacct/lxc.payload.control cgroup via 33
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/hugetlb/lxc.payload.control cgroup via 34
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/devices/lxc.payload.control cgroup via 35
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/blkio/lxc.payload.control cgroup via 36
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/net_cls,net_prio/lxc.payload.control cgroup via 37
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/rdma/lxc.payload.control cgroup via 39
lxc control 20210607213036.668 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/perf_event/lxc.payload.control cgroup via 40
lxc control 20210607213036.669 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/cpuset/lxc.payload.control cgroup via 41
lxc control 20210607213036.669 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/systemd/lxc.payload.control cgroup via 42
lxc control 20210607213036.669 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_payload_enter:1279 - Moved container into /sys/fs/cgroup/unified/lxc.payload.control cgroup via 43
lxc control 20210607213036.669 TRACE    conf - conf.c:get_minimal_idmap:4365 - Allocated minimal idmapping for ns uid 0 and ns gid 0
lxc control 20210607213036.669 TRACE    conf - conf.c:userns_exec_1:4430 - Establishing uid mapping for "17624" in new user namespace: nsuid 1000000000 - hostid 0 - range 1
lxc control 20210607213036.669 TRACE    conf - conf.c:userns_exec_1:4430 - Establishing uid mapping for "17624" in new user namespace: nsuid 0 - hostid 1000000 - range 1000000000
lxc control 20210607213036.669 TRACE    conf - conf.c:userns_exec_1:4430 - Establishing gid mapping for "17624" in new user namespace: nsuid 1000000000 - hostid 0 - range 1
lxc control 20210607213036.669 TRACE    conf - conf.c:userns_exec_1:4430 - Establishing gid mapping for "17624" in new user namespace: nsuid 0 - hostid 1000000 - range 1000000000
lxc control 20210607213036.669 WARN     conf - conf.c:lxc_map_ids:3007 - newuidmap binary is missing
lxc control 20210607213036.669 WARN     conf - conf.c:lxc_map_ids:3013 - newgidmap binary is missing
lxc control 20210607213036.669 DEBUG    conf - conf.c:lxc_map_ids:3027 - No newuidmap and newgidmap binary found. Trying to write directly with euid 0
lxc control 20210607213036.669 TRACE    conf - conf.c:lxc_map_ids:3093 - Wrote mapping "1000000000 0 1
0 1000000 1000000000
"
lxc control 20210607213036.669 TRACE    conf - conf.c:lxc_map_ids:3093 - Wrote mapping "1000000000 0 1
0 1000000 1000000000
"
lxc control 20210607213036.669 TRACE    conf - conf.c:run_userns_fn:4208 - Calling function "chown_cgroup_wrapper"
lxc control 20210607213036.669 NOTICE   utils - utils.c:lxc_drop_groups:1345 - Dropped supplimentary groups
lxc control 20210607213036.670 WARN     cgfsng - cgroups/cgfsng.c:fchowmodat:1296 - No such file or directory - Failed to fchownat(43, memory.oom.group, 1000000000, 0, AT_EMPTY_PATH | AT_SYMLINK_NOFOLLOW )
lxc control 20210607213036.670 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved net namespace via fd 4 and stashed path as net:/proc/17611/fd/4
lxc control 20210607213036.670 TRACE    start - start.c:lxc_spawn:1838 - Allocated new network namespace id
lxc control 20210607213036.671 DEBUG    network - network.c:netdev_configure_server_phys:1221 - Instantiated phys "vethab606520" with ifindex "7"
lxc control 20210607213036.676 TRACE    network - network.c:create_transient_name:3492 - Created transient name physm8R3sa for network device
lxc control 20210607213036.715 DEBUG    network - network.c:lxc_network_move_created_netdev_priv:3538 - Moved network device "vethab606520" with ifindex 7 to network namespace of 17623 and renamed to physm8R3sa
lxc control 20210607213036.715 TRACE    network - network.c:lxc_network_send_to_child:4066 - Sent network device name "physm8R3sa" to child
lxc control 20210607213036.715 TRACE    sync - sync.c:lxc_sync_barrier_child:100 - Parent waking child with sequence post-configure and waiting with sequence cgroup
lxc control 20210607213036.715 TRACE    network - network.c:lxc_network_recv_from_parent:4093 - Received network device name "physm8R3sa" from parent
lxc control 20210607213036.715 NOTICE   utils - utils.c:lxc_drop_groups:1345 - Dropped supplimentary groups
lxc control 20210607213036.715 NOTICE   utils - utils.c:lxc_switch_uid_gid:1321 - Switched to gid 0
lxc control 20210607213036.715 NOTICE   utils - utils.c:lxc_switch_uid_gid:1330 - Switched to uid 0
lxc control 20210607213036.715 TRACE    sync - sync.c:lxc_sync_barrier_parent:93 - Child waking parent with sequence cgroup and waiting for sequence cgroup-unshare
lxc control 20210607213036.715 TRACE    sync - sync.c:lxc_sync_barrier_child:100 - Parent waking child with sequence cgroup-unshare and waiting with sequence cgroup-limits
lxc control 20210607213036.715 INFO     start - start.c:do_start:1196 - Unshared CLONE_NEWCGROUP
lxc control 20210607213036.715 TRACE    conf - conf.c:turn_into_dependent_mounts:3344 - Turned all mount table entries into dependent mount
lxc control 20210607213036.715 TRACE    dir - storage/dir.c:dir_mount:193 - Mounted "/var/snap/lxd/common/lxd/containers/control/rootfs" onto "/var/snap/lxd/common/lxc/"
lxc control 20210607213036.715 DEBUG    conf - conf.c:lxc_mount_rootfs:1396 - Mounted rootfs "/var/snap/lxd/common/lxd/containers/control/rootfs" onto "/var/snap/lxd/common/lxc/" with options "(null)"
lxc control 20210607213036.715 INFO     conf - conf.c:setup_utsname:846 - Set hostname to "control"
lxc control 20210607213036.731 TRACE    network - network.c:__netdev_configure_container_common:1283 - Renamed network device from "physm8R3sa" to "eth0"
lxc control 20210607213036.731 DEBUG    network - network.c:lxc_network_setup_in_child_namespaces_common:3964 - Network device "eth0" has been setup
lxc control 20210607213036.731 INFO     network - network.c:lxc_setup_network_in_child_namespaces:4022 - Finished setting up network devices with caller assigned names
lxc control 20210607213036.731 TRACE    network - network.c:lxc_network_send_name_and_ifindex_to_parent:4126 - Sent network device names and ifindices to parent
lxc control 20210607213036.731 INFO     conf - conf.c:mount_autodev:1182 - Preparing "/dev"
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_autodev:1212 - Using mount options: size=500000,mode=755
lxc control 20210607213036.731 INFO     conf - conf.c:mount_autodev:1242 - Prepared "/dev"
lxc control 20210607213036.731 DEBUG    conf - conf.c:lxc_mount_auto_mounts:725 - Invalid argument - Tried to ensure procfs is unmounted
lxc control 20210607213036.731 DEBUG    conf - conf.c:lxc_mount_auto_mounts:740 - Invalid argument - Tried to ensure sysfs is unmounted
lxc control 20210607213036.731 TRACE    conf - conf.c:lxc_mount_auto_mounts:787 - Mounted automount "proc" on "/var/snap/lxd/common/lxc//proc" with flags 14
lxc control 20210607213036.731 TRACE    conf - conf.c:lxc_mount_auto_mounts:787 - Mounted automount "sysfs" on "/var/snap/lxd/common/lxc//sys" with flags 0
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/dev/fuse" on "/var/snap/lxd/common/lxc//dev/fuse" to respect bind or remount options
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/dev/fuse" were 10, required extra flags are 10
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/dev/fuse" on "/var/snap/lxd/common/lxc//dev/fuse" with filesystem type "none"
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/dev/net/tun" on "/var/snap/lxd/common/lxc//dev/net/tun" to respect bind or remount options
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/dev/net/tun" were 10, required extra flags are 10
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/dev/net/tun" on "/var/snap/lxd/common/lxc//dev/net/tun" with filesystem type "none"
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/proc/sys/fs/binfmt_misc" on "/var/snap/lxd/common/lxc//proc/sys/fs/binfmt_misc" to respect bind or remount options
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/proc/sys/fs/binfmt_misc" were 4110, required extra flags are 14
lxc control 20210607213036.731 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/proc/sys/fs/binfmt_misc" on "/var/snap/lxd/common/lxc//proc/sys/fs/binfmt_misc" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/sys/fs/fuse/connections" on "/var/snap/lxd/common/lxc//sys/fs/fuse/connections" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/sys/fs/fuse/connections" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/sys/fs/fuse/connections" on "/var/snap/lxd/common/lxc//sys/fs/fuse/connections" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/sys/fs/pstore" on "/var/snap/lxd/common/lxc//sys/fs/pstore" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/sys/fs/pstore" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/sys/fs/pstore" on "/var/snap/lxd/common/lxc//sys/fs/pstore" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/sys/kernel/config" on "/var/snap/lxd/common/lxc//sys/kernel/config" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/sys/kernel/config" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/sys/kernel/config" on "/var/snap/lxd/common/lxc//sys/kernel/config" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/sys/kernel/debug" on "/var/snap/lxd/common/lxc//sys/kernel/debug" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/sys/kernel/debug" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/sys/kernel/debug" on "/var/snap/lxd/common/lxc//sys/kernel/debug" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/sys/kernel/security" on "/var/snap/lxd/common/lxc//sys/kernel/security" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/sys/kernel/security" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/sys/kernel/security" on "/var/snap/lxd/common/lxc//sys/kernel/security" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/sys/kernel/tracing" on "/var/snap/lxd/common/lxc//sys/kernel/tracing" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/sys/kernel/tracing" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/sys/kernel/tracing" on "/var/snap/lxd/common/lxc//sys/kernel/tracing" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/dev/mqueue" on "/var/snap/lxd/common/lxc//dev/mqueue" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/dev/mqueue" were 4110, required extra flags are 14
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/dev/mqueue" on "/var/snap/lxd/common/lxc//dev/mqueue" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/var/snap/lxd/common/lxd/devlxd" on "/var/snap/lxd/common/lxc//dev/lxd" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/var/snap/lxd/common/lxd/devlxd" were 4096, required extra flags are 0
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2144 - Mountflags already were 4096, skipping remount
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/var/snap/lxd/common/lxd/devlxd" on "/var/snap/lxd/common/lxc//dev/lxd" with filesystem type "none"
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2117 - Remounting "/var/snap/lxd/common/lxd/shmounts/control" on "/var/snap/lxd/common/lxc//dev/.lxd-mounts" to respect bind or remount options
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2136 - Flags for "/var/snap/lxd/common/lxd/shmounts/control" were 4096, required extra flags are 0
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2144 - Mountflags already were 4096, skipping remount
lxc control 20210607213036.732 DEBUG    conf - conf.c:mount_entry:2180 - Mounted "/var/snap/lxd/common/lxd/shmounts/control" on "/var/snap/lxd/common/lxc//dev/.lxd-mounts" with filesystem type "none"
lxc control 20210607213036.732 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_mount:1652 - Mixed cgroup mounts requested
lxc control 20210607213036.732 TRACE    cgfsng - cgroups/cgfsng.c:cgfsng_mount:1689 - Mounting cgroups not requested or needed
lxc control 20210607213036.732 INFO     conf - conf.c:run_script_argv:335 - Executing script "/snap/lxd/current/lxcfs/lxc.mount.hook" for container "control"
lxc control 20210607213036.732 TRACE    conf - conf.c:run_script_argv:378 - Set environment variable: LXC_HOOK_TYPE=mount
lxc control 20210607213036.732 TRACE    conf - conf.c:run_script_argv:383 - Set environment variable: LXC_HOOK_SECTION=lxc
lxc control 20210607213036.787 INFO     conf - conf.c:lxc_fill_autodev:1279 - Populating "/dev"
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_fill_autodev:1356 - Bind mounted host device node "/dev/full" to "/var/snap/lxd/common/lxc//dev/full"
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_fill_autodev:1356 - Bind mounted host device node "/dev/null" to "/var/snap/lxd/common/lxc//dev/null"
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_fill_autodev:1356 - Bind mounted host device node "/dev/random" to "/var/snap/lxd/common/lxc//dev/random"
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_fill_autodev:1356 - Bind mounted host device node "/dev/tty" to "/var/snap/lxd/common/lxc//dev/tty"
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_fill_autodev:1356 - Bind mounted host device node "/dev/urandom" to "/var/snap/lxd/common/lxc//dev/urandom"
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_fill_autodev:1356 - Bind mounted host device node "/dev/zero" to "/var/snap/lxd/common/lxc//dev/zero"
lxc control 20210607213036.787 INFO     conf - conf.c:lxc_fill_autodev:1363 - Populated "/dev"
lxc control 20210607213036.787 INFO     conf - conf.c:lxc_transient_proc:3196 - Caller's PID is 1; /proc/self points to 1
lxc control 20210607213036.787 TRACE    conf - conf.c:lxc_transient_proc:3204 - Correct procfs instance mounted
lxc control 20210607213036.787 DEBUG    conf - conf.c:lxc_setup_dev_console:1836 - Mounted pty device 10(/dev/pts/0) onto "/dev/console"
lxc control 20210607213036.788 TRACE    conf - conf.c:lxc_pivot_root:1564 - Changed into new rootfs "/var/snap/lxd/common/lxc/"
lxc control 20210607213036.788 DEBUG    conf - conf.c:lxc_setup_devpts_child:1679 - Mount new devpts instance with options "gid=5,newinstance,ptmxmode=0666,mode=0620,max=1024"
lxc control 20210607213036.788 TRACE    conf - conf.c:lxc_setup_devpts_child:1692 - Sent devpts file descriptor 10 to parent
lxc control 20210607213036.788 DEBUG    conf - conf.c:lxc_setup_devpts_child:1707 - Created dummy "/dev/ptmx" file as bind mount target
lxc control 20210607213036.788 DEBUG    conf - conf.c:lxc_setup_devpts_child:1712 - Bind mounted "/dev/pts/ptmx" to "/dev/ptmx"
lxc control 20210607213036.788 INFO     conf - conf.c:lxc_setup_ttys:1025 - Finished setting up 0 /dev/tty<N> device(s)
lxc control 20210607213036.788 INFO     conf - conf.c:setup_personality:1742 - Set personality to "0lx0"
lxc control 20210607213036.788 DEBUG    conf - conf.c:setup_caps:2638 - Capabilities have been setup
lxc control 20210607213036.788 NOTICE   conf - conf.c:lxc_setup:3756 - The container "control" is set up
lxc control 20210607213036.788 TRACE    apparmor - lsm/apparmor.c:__apparmor_process_label_open:405 - On-exec not supported with AppArmor
lxc control 20210607213036.788 TRACE    apparmor - lsm/apparmor.c:apparmor_process_label_set_at:1173 - Changing AppArmor profile on exec not supported
lxc control 20210607213036.788 INFO     apparmor - lsm/apparmor.c:apparmor_process_label_set_at:1186 - Set AppArmor label to "lxd-control_</var/snap/lxd/common/lxd>//&:lxd-control_<var-snap-lxd-common-lxd>:"
lxc control 20210607213036.788 INFO     apparmor - lsm/apparmor.c:apparmor_process_label_set:1231 - Changed AppArmor profile to lxd-control_</var/snap/lxd/common/lxd>//&:lxd-control_<var-snap-lxd-common-lxd>:
#
# pseudo filter code start
#
# filter for arch x86_64 (3221225534)
if ($arch == 3221225534)
  # filter for syscall "finit_module" (313) [priority: 65535]
  if ($syscall == 313)
    action ERRNO(38);
  # filter for syscall "open_by_handle_at" (304) [priority: 65535]
  if ($syscall == 304)
    action ERRNO(38);
  # filter for syscall "kexec_load" (246) [priority: 65535]
  if ($syscall == 246)
    action ERRNO(38);
  # filter for syscall "delete_module" (176) [priority: 65535]
  if ($syscall == 176)
    action ERRNO(38);
  # filter for syscall "init_module" (175) [priority: 65535]
  if ($syscall == 175)
    action ERRNO(38);
  # filter for syscall "umount2" (166) [priority: 65533]
  if ($syscall == 166)
    if ($a1.hi32 & 0x00000000 == 0)
      if ($a1.lo32 & 0x00000001 == 1)
        action ERRNO(13);
  # default action
  action ALLOW;
# filter for arch x86 (1073741827)
if ($arch == 1073741827)
  # filter for syscall "finit_module" (350) [priority: 65535]
  if ($syscall == 350)
    action ERRNO(38);
  # filter for syscall "open_by_handle_at" (342) [priority: 65535]
  if ($syscall == 342)
    action ERRNO(38);
  # filter for syscall "kexec_load" (283) [priority: 65535]
  if ($syscall == 283)
    action ERRNO(38);
  # filter for syscall "delete_module" (129) [priority: 65535]
  if ($syscall == 129)
    action ERRNO(38);
  # filter for syscall "init_module" (128) [priority: 65535]
  if ($syscall == 128)
    action ERRNO(38);
  # filter for syscall "umount2" (52) [priority: 65534]
  if ($syscall == 52)
    if ($a1 & 0x00000001 == 1)
      action ERRNO(13);
  # default action
  action ALLOW;
# filter for arch x32 (3221225534)
if ($arch == 3221225534)
  # filter for syscall "kexec_load" (1073742352) [priority: 65535]
  if ($syscall == 1073742352)
    action ERRNO(38);
  # filter for syscall "finit_module" (1073742137) [priority: 65535]
  if ($syscall == 1073742137)
    action ERRNO(38);
  # filter for syscall "open_by_handle_at" (1073742128) [priority: 65535]
  if ($syscall == 1073742128)
    action ERRNO(38);
  # filter for syscall "delete_module" (1073742000) [priority: 65535]
  if ($syscall == 1073742000)
    action ERRNO(38);
  # filter for syscall "init_module" (1073741999) [priority: 65535]
  if ($syscall == 1073741999)
    action ERRNO(38);
  # filter for syscall "umount2" (1073741990) [priority: 65534]
  if ($syscall == 1073741990)
    if ($a1 & 0x00000001 == 1)
      action ERRNO(13);
  # default action
  action ALLOW;
# invalid architecture action
action KILL;
#
# pseudo filter code end
#
lxc control 20210607213036.790 TRACE    sync - sync.c:lxc_sync_barrier_parent:93 - Child waking parent with sequence cgroup-limits and waiting for sequence ready-start
lxc control 20210607213036.790 TRACE    start - start.c:lxc_spawn:1887 - Set up legacy device cgroup controller limits
lxc control 20210607213036.790 TRACE    start - start.c:lxc_spawn:1893 - Set up cgroup2 device controller limits
lxc control 20210607213036.790 DEBUG    start - start.c:lxc_try_preserve_namespace:140 - Preserved cgroup namespace via fd 26 and stashed path as cgroup:/proc/17611/fd/26
lxc control 20210607213036.790 TRACE    start - start.c:lxc_spawn:1907 - Finished setting up cgroups
lxc control 20210607213036.790 TRACE    sync - sync.c:lxc_sync_barrier_child:100 - Parent waking child with sequence ready-start and waiting with sequence restart
lxc control 20210607213036.790 NOTICE   start - start.c:start:2159 - Exec'ing "/sbin/init"
lxc control 20210607213036.790 TRACE    conf - conf.c:lxc_setup_devpts_parent:1624 - Received devpts file descriptor 12 from child
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:243 - index: 0
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:244 - ifindex: 7
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:300 - type: phys
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:304 - host side ifindex for phys device: 7
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:319 - flags: up
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:322 - link: vethab606520
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:326 - l2proxy: false
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:329 - name: eth0
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:344 - ipv4 gateway auto: false
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:347 - ipv4 gateway dev: false
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:363 - ipv6 gateway auto: false
lxc control 20210607213036.790 TRACE    confile_utils - confile_utils.c:lxc_log_configured_netdevs:366 - ipv6 gateway dev: false
lxc control 20210607213036.790 NOTICE   start - start.c:post_start:2170 - Started "/sbin/init" with pid "17623"
lxc control 20210607213036.790 TRACE    start - start.c:lxc_serve_state_socket_pair:513 - Sent container state "RUNNING" to 7
lxc control 20210607213036.790 TRACE    start - start.c:lxc_serve_state_clients:448 - Set container state to RUNNING
lxc control 20210607213036.790 TRACE    start - start.c:lxc_serve_state_clients:451 - No state clients registered
lxc control 20210607213036.790 TRACE    start - start.c:lxc_poll:602 - Mainloop is ready
lxc control 20210607213036.790 NOTICE   start - start.c:signal_handler:415 - Received 17 from pid 17624 instead of container init 17623
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213036.791 TRACE    lxccontainer - lxccontainer.c:wait_on_daemonized_start:873 - Container is in "RUNNING" state
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213036.791 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213036.793 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213036.793 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213036.793 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213041.859 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213041.859 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213041.859 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213041.859 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213041.859 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213041.859 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213041.865 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213041.865 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_init_pid; cleaning up client fd 27
lxc control 20210607213041.865 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_init_pid"
lxc control 20210607213041.873 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213041.873 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_devpts_fd; cleaning up client fd 27
lxc control 20210607213041.873 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_devpts_fd"
lxc control 20210607213048.523 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.524 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.524 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.591 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.591 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.592 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.593 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.593 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_init_pid; cleaning up client fd 27
lxc control 20210607213048.593 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_init_pid"
lxc control 20210607213048.595 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.595 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.595 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.596 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.597 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.597 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.598 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.598 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.598 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.600 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.600 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.600 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.601 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.601 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.602 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.603 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.603 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.603 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.604 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.605 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.605 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.606 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.606 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.606 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.607 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.608 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.608 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.609 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.609 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.610 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.611 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.612 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.612 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.613 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.613 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.613 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.615 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.615 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_init_pid; cleaning up client fd 27
lxc control 20210607213048.615 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_init_pid"
lxc control 20210607213048.620 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.621 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_init_pid; cleaning up client fd 27
lxc control 20210607213048.621 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_init_pid"
lxc control 20210607213048.623 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.623 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.624 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.625 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.625 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.626 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"
lxc control 20210607213048.628 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.628 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_state; cleaning up client fd 27
lxc control 20210607213048.628 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_state"
lxc control 20210607213048.631 TRACE    commands - commands.c:lxc_cmd_accept:2036 - Accepted new client as fd 27 on command server fd 9
lxc control 20210607213048.632 TRACE    commands - commands.c:lxc_cmd_handler:2000 - Processed command get_limit_cgroup_fd; cleaning up client fd 27
lxc control 20210607213048.632 TRACE    commands - commands.c:lxc_cmd_fd_cleanup:1943 - Closing client fd 27 for command "get_limit_cgroup_fd"

Assigning to @brauner to investigate
@cyphar FYI

Can you paste the contents of

forkexec.log

located in the container’s log directory, please?

took some searching to find the path in /var/snap/lxd/common/lxd/logs/<container> :slight_smile:
forkexec.log contains a single line:
Aborting attach to prevent leaking file descriptors into container

Ah, that’s interesting.
@brauner

Yeah, and my theory had been that this is due to the fact of close_range() not being available and lxd falling back to close_inherited() and that there’s a bug in there. But there isn’t it seems.
At least I can reproduce the error on Ubuntu with a 5.3 kernel installed, LXD 4.14 and LXC 4.0.9. I’ve installed OpenSUSE Leap 5.3 now but I can’t seem to find snapd to install. Need to figure that out.

This is what I did:

7  2021-06-07 10:55:20 zypper ar --refresh https://download.opensuse.org/repositories/system:/snappy/openSUSE_Leap_15.3 snappy
8  2021-06-07 10:55:30 zypper --gpg-auto-import-keys ref
9  2021-06-07 10:56:06 zypper dup --from snappy
10  2021-06-07 10:56:18 zypper in snapd
11  2021-06-07 10:56:42 systemctl enable --now snapd
12  2021-06-07 10:56:57 reboot
13  2021-06-07 11:20:39 snap install lxd

FWIW the same message is in the separate openSUSE 15.3 box with lxd installed from the default repos:

surveyor:/var/log/lxd/opensuse # cat forkexec.log
Aborting attach to prevent leaking file descriptors into container

Hm, confused now

leap2:~ # uname -a
Linux leap2 5.3.18-lp152.78-default #1 SMP Tue Jun 1 14:53:21 UTC 2021 (556d823) x86_64 x86_64 x86_64 GNU/Linux
leap2:~ # lxc list
+------+-------+------+------+------+-----------+
| NAME | STATE | IPV4 | IPV6 | TYPE | SNAPSHOTS |
+------+-------+------+------+------+-----------+
leap2:~ # lxc ^C
leap2:~ # lxc launch images:alpine/edge alp1
Creating alp1
Starting alp1
leap2:~ # lxc shell alp1
alp1:~#
  driver: qemu | lxc
  driver_version: 5.2.0 | 4.0.9
  firewall: nftables
  kernel: Linux
  kernel_architecture: x86_64
  kernel_features:
    netnsid_getifaddrs: "true"
    seccomp_listener: "true"
    seccomp_listener_continue: "false"
    shiftfs: "false"
    uevent_injection: "true"
    unpriv_fscaps: "true"
  kernel_version: 5.3.18-lp152.78-default
  lxc_features:
    cgroup2: "true"
    devpts_fd: "true"
    idmapped_mounts_v2: "false"
    mount_injection_file: "true"
    network_gateway_device_route: "true"
    network_ipvlan: "true"
    network_l2proxy: "true"
    network_phys_macvlan_mtu: "true"
    network_veth_router: "true"
    pidfd: "true"
    seccomp_allow_deny_syntax: "true"
    seccomp_notify: "true"
    seccomp_proxy_send_notify_fd: "true"
  os_name: openSUSE Leap
  os_version: "15.3"
  project: default
  server: lxd
  server_clustered: false
  server_name: leap2
  server_pid: 4316
  server_version: "4.15"
  storage: btrfs
  storage_version: 4.15.1

Does an upgrade to 4.15 fix the issue for you?

lxd has been updated to 4.15.

I did notice that your particular kernel is a different build than the default from the current leap download page, however.

hydra:~ # uname -a
Linux hydra 5.3.18-57-default #1 SMP Wed Apr 28 10:54:41 UTC 2021 (ba3c2e9) x86_64 x86_64 x86_64 GNU/Linux
hydra:~ # lxc launch images:alpine/edge alp1
Creating alp1
Starting alp1
hydra:~ # lxc shell alp1
Error: Failed to retrieve PID of executing child process
hydra:~ # lxc info | egrep ‘version|^\s*os’
api_version: “1.0”
driver_version: 4.0.9 | 5.2.0
kernel_version: 5.3.18-57-default
os_name: openSUSE Leap
os_version: “15.3”
server_version: “4.15”
storage_version: 4.15.1

I confirm there is a problem on Leap 15.3

[admin@naunas] ~   
❯ lxc exec atlas -- /bin/bash  
Error: Failed to retrieve PID of executing child process

[admin@naunas] ~  
❯ uname -a
Linux naunas 5.3.18-57-default #1 SMP Wed Apr 28 10:54:41 UTC 2021 (ba3c2e9) x86_64 x86_64 x86_64 GNU/Linux

[admin@naunas] ~  
❯ rpm -qa | grep lxd
lxd-4.15-lp153.88.1.x86_64
lxd-bash-completion-4.15-lp153.88.1.noarch

[admin@naunas] ~  
❯ lxc info --show-log atlas
Name: atlas
Location: none
Remote: unix://
Architecture: x86_64
Created: 2020/12/13 06:58 UTC
Status: Running
Type: container
Profiles: default
Pid: 5056
Ips:
  lo:   inet    127.0.0.1
  lo:   inet6   ::1
Resources:
  Processes: 18
  CPU usage:
    CPU usage (in seconds): 34
  Memory usage:
    Memory (current): 71.42MB
    Memory (peak): 249.84MB
  Network usage:
    eth0:
      Bytes received: 1.26kB
      Bytes sent: 90B
      Packets received: 21
      Packets sent: 1
    lo:
      Bytes received: 152.00kB
      Bytes sent: 152.00kB
      Packets received: 3040
      Packets sent: 3040

Log:

lxc atlas 20210609055540.561 ERROR    utils - utils.c:lxc_can_use_pidfd:1793 - Недопустимый аргумент - Kernel does not support waiting on processes through pidfds
lxc atlas 20210609055540.584 WARN     cgfsng - cgroups/cgfsng.c:fchowmodat:1296 - Нет такого файла или каталога - Failed to fchownat(43, memory.oom.group, 500000001, 0, AT_EMPTY_PATH | AT_SYMLINK_NOFOLLOW )

[admin@naunas] ~  
❯ lxc info
config:
  core.https_address: '[::]:8443'
  core.trust_password: true
api_extensions:
- storage_zfs_remove_snapshots
- container_host_shutdown_timeout
- container_stop_priority
- container_syscall_filtering
- auth_pki
- container_last_used_at
- etag
- patch
- usb_devices
- https_allowed_credentials
- image_compression_algorithm
- directory_manipulation
- container_cpu_time
- storage_zfs_use_refquota
- storage_lvm_mount_options
- network
- profile_usedby
- container_push
- container_exec_recording
- certificate_update
- container_exec_signal_handling
- gpu_devices
- container_image_properties
- migration_progress
- id_map
- network_firewall_filtering
- network_routes
- storage
- file_delete
- file_append
- network_dhcp_expiry
- storage_lvm_vg_rename
- storage_lvm_thinpool_rename
- network_vlan
- image_create_aliases
- container_stateless_copy
- container_only_migration
- storage_zfs_clone_copy
- unix_device_rename
- storage_lvm_use_thinpool
- storage_rsync_bwlimit
- network_vxlan_interface
- storage_btrfs_mount_options
- entity_description
- image_force_refresh
- storage_lvm_lv_resizing
- id_map_base
- file_symlinks
- container_push_target
- network_vlan_physical
- storage_images_delete
- container_edit_metadata
- container_snapshot_stateful_migration
- storage_driver_ceph
- storage_ceph_user_name
- resource_limits
- storage_volatile_initial_source
- storage_ceph_force_osd_reuse
- storage_block_filesystem_btrfs
- resources
- kernel_limits
- storage_api_volume_rename
- macaroon_authentication
- network_sriov
- console
- restrict_devlxd
- migration_pre_copy
- infiniband
- maas_network
- devlxd_events
- proxy
- network_dhcp_gateway
- file_get_symlink
- network_leases
- unix_device_hotplug
- storage_api_local_volume_handling
- operation_description
- clustering
- event_lifecycle
- storage_api_remote_volume_handling
- nvidia_runtime
- container_mount_propagation
- container_backup
- devlxd_images
- container_local_cross_pool_handling
- proxy_unix
- proxy_udp
- clustering_join
- proxy_tcp_udp_multi_port_handling
- network_state
- proxy_unix_dac_properties
- container_protection_delete
- unix_priv_drop
- pprof_http
- proxy_haproxy_protocol
- network_hwaddr
- proxy_nat
- network_nat_order
- container_full
- candid_authentication
- backup_compression
- candid_config
- nvidia_runtime_config
- storage_api_volume_snapshots
- storage_unmapped
- projects
- candid_config_key
- network_vxlan_ttl
- container_incremental_copy
- usb_optional_vendorid
- snapshot_scheduling
- snapshot_schedule_aliases
- container_copy_project
- clustering_server_address
- clustering_image_replication
- container_protection_shift
- snapshot_expiry
- container_backup_override_pool
- snapshot_expiry_creation
- network_leases_location
- resources_cpu_socket
- resources_gpu
- resources_numa
- kernel_features
- id_map_current
- event_location
- storage_api_remote_volume_snapshots
- network_nat_address
- container_nic_routes
- rbac
- cluster_internal_copy
- seccomp_notify
- lxc_features
- container_nic_ipvlan
- network_vlan_sriov
- storage_cephfs
- container_nic_ipfilter
- resources_v2
- container_exec_user_group_cwd
- container_syscall_intercept
- container_disk_shift
- storage_shifted
- resources_infiniband
- daemon_storage
- instances
- image_types
- resources_disk_sata
- clustering_roles
- images_expiry
- resources_network_firmware
- backup_compression_algorithm
- ceph_data_pool_name
- container_syscall_intercept_mount
- compression_squashfs
- container_raw_mount
- container_nic_routed
- container_syscall_intercept_mount_fuse
- container_disk_ceph
- virtual-machines
- image_profiles
- clustering_architecture
- resources_disk_id
- storage_lvm_stripes
- vm_boot_priority
- unix_hotplug_devices
- api_filtering
- instance_nic_network
- clustering_sizing
- firewall_driver
- projects_limits
- container_syscall_intercept_hugetlbfs
- limits_hugepages
- container_nic_routed_gateway
- projects_restrictions
- custom_volume_snapshot_expiry
- volume_snapshot_scheduling
- trust_ca_certificates
- snapshot_disk_usage
- clustering_edit_roles
- container_nic_routed_host_address
- container_nic_ipvlan_gateway
- resources_usb_pci
- resources_cpu_threads_numa
- resources_cpu_core_die
- api_os
- container_nic_routed_host_table
- container_nic_ipvlan_host_table
- container_nic_ipvlan_mode
- resources_system
- images_push_relay
- network_dns_search
- container_nic_routed_limits
- instance_nic_bridged_vlan
- network_state_bond_bridge
- usedby_consistency
- custom_block_volumes
- clustering_failure_domains
- resources_gpu_mdev
- console_vga_type
- projects_limits_disk
- network_type_macvlan
- network_type_sriov
- container_syscall_intercept_bpf_devices
- network_type_ovn
- projects_networks
- projects_networks_restricted_uplinks
- custom_volume_backup
- backup_override_name
- storage_rsync_compression
- network_type_physical
- network_ovn_external_subnets
- network_ovn_nat
- network_ovn_external_routes_remove
- tpm_device_type
- storage_zfs_clone_copy_rebase
- gpu_mdev
- resources_pci_iommu
- resources_network_usb
- resources_disk_address
- network_physical_ovn_ingress_mode
- network_ovn_dhcp
- network_physical_routes_anycast
- projects_limits_instances
- network_state_vlan
- instance_nic_bridged_port_isolation
- instance_bulk_state_change
- network_gvrp
- instance_pool_move
- gpu_sriov
- pci_device_type
- storage_volume_state
- network_acl
- migration_stateful
- disk_state_quota
- storage_ceph_features
- projects_compression
- projects_images_remote_cache_expiry
- certificate_project
- network_ovn_acl
- projects_images_auto_update
- projects_restricted_cluster_target
- images_default_architecture
- network_ovn_acl_defaults
- gpu_mig
- project_usage
- network_bridge_acl
- warnings
- projects_restricted_backups_and_snapshots
- clustering_join_token
- clustering_description
- server_trusted_proxy
api_status: stable
api_version: "1.0"
auth: trusted
public: false
auth_methods:
- tls
environment:
  addresses:
  - XXX.XXX.XXX.XXX:8443
  architectures:
  - x86_64
  - i686
  certificate: | XXX
  certificate_fingerprint: XXX
  driver: qemu | lxc
  driver_version: 5.2.0 | 4.0.9
  firewall: nftables
  kernel: Linux
  kernel_architecture: x86_64
  kernel_features:
    netnsid_getifaddrs: "true"
    seccomp_listener: "true"
    seccomp_listener_continue: "false"
    shiftfs: "false"
    uevent_injection: "true"
    unpriv_fscaps: "true"
  kernel_version: 5.3.18-57-default
  lxc_features:
    cgroup2: "true"
    devpts_fd: "true"
    mount_injection_file: "true"
    network_gateway_device_route: "true"
    network_ipvlan: "true"
    network_l2proxy: "true"
    network_phys_macvlan_mtu: "true"
    network_veth_router: "true"
    pidfd: "true"
    seccomp_allow_deny_syntax: "true"
    seccomp_notify: "true"
    seccomp_proxy_send_notify_fd: "true"
  os_name: openSUSE Leap
  os_version: "15.3"
  project: default
  server: lxd
  server_clustered: false
  server_name: naunas
  server_pid: 1944
  server_version: "4.15"
  storage: dir
  storage_version: "1"

but on thumbleweed lxd works normal

[werwolf@power] ~   
❯ lxc exec atlas -- bash
[root@atlas ~]# exit
exit

[werwolf@power] ~   
❯ uname -a
Linux power 5.12.9-1-default #1 SMP Thu Jun 3 07:44:58 UTC 2021 (f17eb01) x86_64 x86_64 x86_64 GNU/Linux

[werwolf@power] ~   
❯ rpm -qa | grep lxd    
lxd-4.14-2.1.x86_64
lxd-bash-completion-4.14-2.1.noarch

clarification: on tumbleweed, the exec works normally, but for some reason the auto-assignment of ip addresses to the container does not work

Yeah you need to use the package in the distro – it’s in the default repos. I think you could in principle use snapd (there is a package for it IIRC) but I’ve never tried it.