Skip to content

Instantly share code, notes, and snippets.

@truatpasteurdotfr
Created March 21, 2022 08:29
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save truatpasteurdotfr/0781666fb41da3b6b7d25699e397a36e to your computer and use it in GitHub Desktop.
Save truatpasteurdotfr/0781666fb41da3b6b7d25699e397a36e to your computer and use it in GitHub Desktop.
apptainer -d exec docker://busybox /bin/busybox 2>&1 | tee /tmp/non-root.txt; doas apptainer -d exec docker://busybox /bin/busybox 2>&1 | tee /tmp/root.txt
DEBUG [U=2765,P=17030] persistentPreRun() Apptainer version: 1.0.1
DEBUG [U=2765,P=17030] persistentPreRun() Parsing configuration file /etc/apptainer/apptainer.conf
DEBUG [U=2765,P=17030] handleConfDir() /home/tru/.apptainer already exists. Not creating.
DEBUG [U=2765,P=17030] getCacheParentDir() environment variable APPTAINER_CACHEDIR not set, using default image cache
DEBUG [U=2765,P=17030] parseURI() Parsing docker://busybox into reference
INFO [U=2765,P=17030] pull() Using cached SIF image
DEBUG [U=2765,P=17030] execStarter() Saving umask 0022 for propagation into container
DEBUG [U=2765,P=17030] execStarter() Checking for encrypted system partition
DEBUG [U=2765,P=17030] Init() Image format detection
DEBUG [U=2765,P=17030] Init() Check for sandbox image format
DEBUG [U=2765,P=17030] Init() sandbox format initializer returned: not a directory image
DEBUG [U=2765,P=17030] Init() Check for sif image format
DEBUG [U=2765,P=17030] Init() sif image format detected
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding SHELL environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding CHARSET environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding PWD environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding LOGNAME environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding LANG environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding SSH_CONNECTION environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding TERM environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding USER environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding SHLVL environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding PAGER environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding PS1 environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding SSH_CLIENT environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding LC_COLLATE environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding MAIL environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding SSH_TTY environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding OLDPWD environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding _ environment variable
DEBUG [U=2765,P=17030] SetContainerEnv() Forwarding USER_PATH environment variable
VERBOSE [U=2765,P=17030] SetContainerEnv() Setting HOME=/home/tru
VERBOSE [U=2765,P=17030] SetContainerEnv() Setting PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
DEBUG [U=2765,P=17030] init() Use starter binary /usr/libexec/apptainer/bin/starter-suid
VERBOSE [U=0,P=17030] print() Set messagelevel to: 5
VERBOSE [U=0,P=17030] init() Starter initialization
DEBUG [U=0,P=17030] load_overlay_module() Trying to load overlay kernel module
DEBUG [U=0,P=17030] load_overlay_module() Overlay seems supported by the kernel
VERBOSE [U=0,P=17030] is_suid() Check if we are running as setuid
VERBOSE [U=0,P=17030] priv_drop() Drop root privileges
DEBUG [U=2765,P=17030] read_engine_config() Read engine configuration
DEBUG [U=2765,P=17030] init() Wait completion of stage1
VERBOSE [U=2765,P=17038] priv_drop() Drop root privileges permanently
DEBUG [U=2765,P=17038] set_parent_death_signal() Set parent death signal to 9
VERBOSE [U=2765,P=17038] init() Spawn stage 1
DEBUG [U=2765,P=17038] startup() apptainer runtime engine selected
VERBOSE [U=2765,P=17038] startup() Execute stage 1
DEBUG [U=2765,P=17038] StageOne() Entering stage 1
DEBUG [U=2765,P=17038] prepareAutofs() No autofs mount point found
DEBUG [U=2765,P=17038] Init() Image format detection
DEBUG [U=2765,P=17038] Init() Check for sandbox image format
DEBUG [U=2765,P=17038] Init() sandbox format initializer returned: not a directory image
DEBUG [U=2765,P=17038] Init() Check for sif image format
DEBUG [U=2765,P=17038] Init() sif image format detected
DEBUG [U=2765,P=17038] setSessionLayer() Overlay seems supported and allowed by kernel
DEBUG [U=2765,P=17038] setSessionLayer() Attempting to use overlayfs (enable overlay = try)
VERBOSE [U=2765,P=17030] wait_child() stage 1 exited with status 0
DEBUG [U=2765,P=17030] cleanup_fd() Close file descriptor 4
DEBUG [U=2765,P=17030] cleanup_fd() Close file descriptor 5
DEBUG [U=2765,P=17030] cleanup_fd() Close file descriptor 6
DEBUG [U=2765,P=17030] init() Set child signal mask
DEBUG [U=2765,P=17030] init() Create socketpair for master communication channel
DEBUG [U=2765,P=17030] init() Create RPC socketpair for communication between stage 2 and RPC server
VERBOSE [U=2765,P=17030] priv_escalate() Get root privileges
VERBOSE [U=0,P=17030] priv_escalate() Change filesystem uid to 2765
VERBOSE [U=0,P=17030] init() Spawn master process
ERROR [U=0,P=17030] chdir_to_proc_pid() Failed to change directory to /proc/17043: Permission denied
DEBUG [U=0,P=17043] set_parent_death_signal() Set parent death signal to 9
VERBOSE [U=0,P=17043] create_namespace() Create mount namespace
DEBUG [U=0,P=16995] persistentPreRun() Apptainer version: 1.0.1
DEBUG [U=0,P=16995] persistentPreRun() Parsing configuration file /etc/apptainer/apptainer.conf
DEBUG [U=0,P=16995] handleConfDir() /root/.apptainer already exists. Not creating.
DEBUG [U=0,P=16995] getCacheParentDir() environment variable APPTAINER_CACHEDIR not set, using default image cache
DEBUG [U=0,P=16995] parseURI() Parsing docker://busybox into reference
INFO [U=0,P=16995] pull() Using cached SIF image
DEBUG [U=0,P=16995] execStarter() Saving umask 0022 for propagation into container
DEBUG [U=0,P=16995] execStarter() Checking for encrypted system partition
DEBUG [U=0,P=16995] Init() Image format detection
DEBUG [U=0,P=16995] Init() Check for sandbox image format
DEBUG [U=0,P=16995] Init() sandbox format initializer returned: not a directory image
DEBUG [U=0,P=16995] Init() Check for sif image format
DEBUG [U=0,P=16995] Init() sif image format detected
DEBUG [U=0,P=16995] SetContainerEnv() Forwarding DOAS_USER environment variable
DEBUG [U=0,P=16995] SetContainerEnv() Forwarding LOGNAME environment variable
DEBUG [U=0,P=16995] SetContainerEnv() Forwarding SHELL environment variable
DEBUG [U=0,P=16995] SetContainerEnv() Forwarding TERM environment variable
DEBUG [U=0,P=16995] SetContainerEnv() Forwarding USER environment variable
DEBUG [U=0,P=16995] SetContainerEnv() Forwarding USER_PATH environment variable
VERBOSE [U=0,P=16995] SetContainerEnv() Setting HOME=/root
VERBOSE [U=0,P=16995] SetContainerEnv() Setting PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
DEBUG [U=0,P=16995] init() Use starter binary /usr/libexec/apptainer/bin/starter
VERBOSE [U=0,P=16995] print() Set messagelevel to: 5
VERBOSE [U=0,P=16995] init() Starter initialization
DEBUG [U=0,P=16995] load_overlay_module() Trying to load overlay kernel module
DEBUG [U=0,P=16995] load_overlay_module() Overlay seems supported by the kernel
VERBOSE [U=0,P=16995] is_suid() Check if we are running as setuid
DEBUG [U=0,P=16995] read_engine_config() Read engine configuration
DEBUG [U=0,P=16995] init() Wait completion of stage1
DEBUG [U=0,P=17001] set_parent_death_signal() Set parent death signal to 9
VERBOSE [U=0,P=17001] init() Spawn stage 1
DEBUG [U=0,P=17001] startup() apptainer runtime engine selected
VERBOSE [U=0,P=17001] startup() Execute stage 1
DEBUG [U=0,P=17001] StageOne() Entering stage 1
DEBUG [U=0,P=17001] prepareRootCaps() Root full capabilities
DEBUG [U=0,P=17001] prepareAutofs() No autofs mount point found
DEBUG [U=0,P=17001] Init() Image format detection
DEBUG [U=0,P=17001] Init() Check for sandbox image format
DEBUG [U=0,P=17001] Init() sandbox format initializer returned: not a directory image
DEBUG [U=0,P=17001] Init() Check for sif image format
DEBUG [U=0,P=17001] Init() sif image format detected
DEBUG [U=0,P=17001] setSessionLayer() Overlay seems supported and allowed by kernel
DEBUG [U=0,P=17001] setSessionLayer() Attempting to use overlayfs (enable overlay = try)
VERBOSE [U=0,P=16995] wait_child() stage 1 exited with status 0
DEBUG [U=0,P=16995] cleanup_fd() Close file descriptor 4
DEBUG [U=0,P=16995] cleanup_fd() Close file descriptor 5
DEBUG [U=0,P=16995] cleanup_fd() Close file descriptor 6
DEBUG [U=0,P=16995] init() Set child signal mask
DEBUG [U=0,P=16995] init() Create socketpair for master communication channel
DEBUG [U=0,P=16995] init() Create RPC socketpair for communication between stage 2 and RPC server
VERBOSE [U=0,P=16995] init() Spawn master process
DEBUG [U=0,P=17006] set_parent_death_signal() Set parent death signal to 9
VERBOSE [U=0,P=17006] create_namespace() Create mount namespace
VERBOSE [U=0,P=16995] enter_namespace() Entering in mount namespace
DEBUG [U=0,P=16995] enter_namespace() Opening namespace file ns/mnt
VERBOSE [U=0,P=17006] create_namespace() Create mount namespace
VERBOSE [U=0,P=17009] init() Spawn RPC server
DEBUG [U=0,P=16995] startup() apptainer runtime engine selected
VERBOSE [U=0,P=16995] startup() Execute master process
DEBUG [U=0,P=17009] startup() apptainer runtime engine selected
VERBOSE [U=0,P=17009] startup() Serve RPC requests
DEBUG [U=0,P=16995] setupSessionLayout() Using Layer system: overlay
DEBUG [U=0,P=16995] setupOverlayLayout() Creating overlay SESSIONDIR layout
DEBUG [U=0,P=16995] addRootfsMount() Mount rootfs in read-only mode
DEBUG [U=0,P=16995] addRootfsMount() Image type is 4096
DEBUG [U=0,P=16995] addRootfsMount() Mounting block [squashfs] image: /root/.apptainer/cache/oci-tmp/caa382c432891547782ce7140fb3b7304613d3b0438834dce1cad68896ab110a
DEBUG [U=0,P=16995] addKernelMount() Checking configuration file for 'mount proc'
DEBUG [U=0,P=16995] addKernelMount() Adding proc to mount list
VERBOSE [U=0,P=16995] addKernelMount() Default mount: /proc:/proc
DEBUG [U=0,P=16995] addKernelMount() Checking configuration file for 'mount sys'
DEBUG [U=0,P=16995] addKernelMount() Adding sysfs to mount list
VERBOSE [U=0,P=16995] addKernelMount() Default mount: /sys:/sys
DEBUG [U=0,P=16995] addDevMount() Checking configuration file for 'mount dev'
DEBUG [U=0,P=16995] addDevMount() Adding dev to mount list
VERBOSE [U=0,P=16995] addDevMount() Default mount: /dev:/dev
DEBUG [U=0,P=16995] addHostMount() Not mounting host file systems per configuration
VERBOSE [U=0,P=16995] addBindsMount() Found 'bind path' = /etc/localtime, /etc/localtime
VERBOSE [U=0,P=16995] addBindsMount() Found 'bind path' = /etc/hosts, /etc/hosts
DEBUG [U=0,P=16995] addHomeStagingDir() Staging home directory (/root) at /var/apptainer/mnt/session/root
DEBUG [U=0,P=16995] addHomeMount() Adding home directory mount [/var/apptainer/mnt/session/root:/root] to list using layer: overlay
DEBUG [U=0,P=16995] addTmpMount() Checking for 'mount tmp' in configuration file
VERBOSE [U=0,P=16995] addTmpMount() Default mount: /tmp:/tmp
VERBOSE [U=0,P=16995] addTmpMount() Default mount: /var/tmp:/var/tmp
DEBUG [U=0,P=16995] addScratchMount() Not mounting scratch directory: Not requested
DEBUG [U=0,P=16995] addLibsMount() Checking for 'user bind control' in configuration file
DEBUG [U=0,P=16995] addFilesMount() Checking for 'user bind control' in configuration file
DEBUG [U=0,P=16995] addResolvConfMount() Adding /etc/resolv.conf to mount list
VERBOSE [U=0,P=16995] addResolvConfMount() Default mount: /etc/resolv.conf:/etc/resolv.conf
DEBUG [U=0,P=16995] addHostnameMount() Skipping hostname mount, not virtualizing UTS namespace on user request
DEBUG [U=0,P=16995] create() Mount all
DEBUG [U=0,P=16995] mountGeneric() Mounting tmpfs to /var/apptainer/mnt/session
DEBUG [U=0,P=16995] mountImage() Mounting loop device /dev/loop0 to /var/apptainer/mnt/session/rootfs of type squashfs
DEBUG [U=0,P=16995] mountGeneric() Mounting overlay to /var/apptainer/mnt/session/final
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/final
DEBUG [U=0,P=16995] setPropagationMount() Set RPC mount propagation flag to SLAVE
VERBOSE [U=0,P=16995] addIdentityMount() Not updating passwd/group files, running as root!
DEBUG [U=0,P=16995] mountGeneric() Mounting /dev to /var/apptainer/mnt/session/final/dev
DEBUG [U=0,P=16995] mountGeneric() Mounting /etc/localtime to /var/apptainer/mnt/session/final/etc/localtime
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/final/etc/localtime
DEBUG [U=0,P=16995] mountGeneric() Mounting /etc/hosts to /var/apptainer/mnt/session/final/etc/hosts
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/final/etc/hosts
DEBUG [U=0,P=16995] mountGeneric() Mounting /proc to /var/apptainer/mnt/session/final/proc
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/final/proc
DEBUG [U=0,P=16995] mountGeneric() Mounting sysfs to /var/apptainer/mnt/session/final/sys
DEBUG [U=0,P=16995] mountGeneric() Mounting /root to /var/apptainer/mnt/session/root
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/root
DEBUG [U=0,P=16995] mountGeneric() Mounting /var/apptainer/mnt/session/root to /var/apptainer/mnt/session/final/root
DEBUG [U=0,P=16995] mountGeneric() Mounting /tmp to /var/apptainer/mnt/session/final/tmp
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/final/tmp
DEBUG [U=0,P=16995] mountGeneric() Mounting /var/tmp to /var/apptainer/mnt/session/final/var/tmp
DEBUG [U=0,P=16995] mountGeneric() Remounting /var/apptainer/mnt/session/final/var/tmp
DEBUG [U=0,P=16995] mountGeneric() Mounting /var/apptainer/mnt/session/etc/resolv.conf to /var/apptainer/mnt/session/final/etc/resolv.conf
DEBUG [U=0,P=16995] addCwdMount() Using /home/tru as current working directory
VERBOSE [U=0,P=16995] addCwdMount() Not mounting CWD, /home/tru doesn't exist within container
VERBOSE [U=0,P=16995] addCwdMount() Not mounting CWD, while getting /home/tru information: stat /var/apptainer/mnt/session/final/home/tru: no such file or directory
DEBUG [U=0,P=16995] create() Chroot into /var/apptainer/mnt/session/final
DEBUG [U=0,P=17009] Chroot() Hold reference to host / directory
DEBUG [U=0,P=17009] Chroot() Called pivot_root on /var/apptainer/mnt/session/final
DEBUG [U=0,P=17009] Chroot() Change current directory to host / directory
DEBUG [U=0,P=17009] Chroot() Apply slave mount propagation for host / directory
DEBUG [U=0,P=17009] Chroot() Called unmount(/, syscall.MNT_DETACH)
DEBUG [U=0,P=17009] Chroot() Changing directory to / to avoid getpwd issues
DEBUG [U=0,P=16995] create() Chdir into / to avoid errors
VERBOSE [U=0,P=17006] wait_child() rpc server exited with status 0
DEBUG [U=0,P=17006] init() Set container privileges
DEBUG [U=0,P=17006] apply_privileges() Effective capabilities: 0x0000003fffffffff
DEBUG [U=0,P=17006] apply_privileges() Permitted capabilities: 0x0000003fffffffff
DEBUG [U=0,P=17006] apply_privileges() Bounding capabilities: 0x0000003fffffffff
DEBUG [U=0,P=17006] apply_privileges() Inheritable capabilities: 0x0000003fffffffff
DEBUG [U=0,P=17006] apply_privileges() Ambient capabilities: 0x0000003fffffffff
DEBUG [U=0,P=17006] apply_privileges() Set user ID to 0
DEBUG [U=0,P=17006] set_parent_death_signal() Set parent death signal to 9
DEBUG [U=0,P=17006] startup() apptainer runtime engine selected
VERBOSE [U=0,P=17006] startup() Execute stage 2
DEBUG [U=0,P=17006] StageTwo() Entering stage 2
DEBUG [U=0,P=17006] StartProcess() Setting umask in container to 0022
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/01-base.sh
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/10-docker2singularity.sh
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/90-environment.sh
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/94-appsbase.sh
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/95-apps.sh
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/99-base.sh
DEBUG [U=0,P=17006] sylogBuiltin() Sourcing /.singularity.d/env/99-runtimevars.sh
DEBUG [U=0,P=17006] sylogBuiltin() Running action command exec
DEBUG [U=0,P=16995] PostStartProcess() Post start process
BusyBox v1.34.1 (2022-03-10 23:58:34 UTC) multi-call binary.
BusyBox is copyrighted by many authors between 1998-2015.
Licensed under GPLv2. See source distribution for detailed
copyright notices.
Usage: busybox [function [arguments]...]
or: busybox --list[-full]
or: busybox --show SCRIPT
or: busybox --install [-s] [DIR]
or: function [arguments]...
BusyBox is a multi-call binary that combines many common Unix
utilities into a single executable. Most people will create a
link to busybox for each function they wish to use and BusyBox
will act like whatever it was invoked as.
Currently defined functions:
[, [[, acpid, add-shell, addgroup, adduser, adjtimex, ar, arch, arp,
arping, ascii, ash, awk, base32, base64, basename, bc, beep,
blkdiscard, blkid, blockdev, bootchartd, brctl, bunzip2, bzcat, bzip2,
cal, cat, chat, chattr, chgrp, chmod, chown, chpasswd, chpst, chroot,
chrt, chvt, cksum, clear, cmp, comm, conspy, cp, cpio, crc32, crond,
crontab, cryptpw, cttyhack, cut, date, dc, dd, deallocvt, delgroup,
deluser, depmod, devmem, df, dhcprelay, diff, dirname, dmesg, dnsd,
dnsdomainname, dos2unix, dpkg, dpkg-deb, du, dumpkmap, dumpleases,
echo, ed, egrep, eject, env, envdir, envuidgid, ether-wake, expand,
expr, factor, fakeidentd, fallocate, false, fatattr, fbset, fbsplash,
fdflush, fdformat, fdisk, fgconsole, fgrep, find, findfs, flock, fold,
free, freeramdisk, fsck, fsck.minix, fsfreeze, fstrim, fsync, ftpd,
ftpget, ftpput, fuser, getopt, getty, grep, groups, gunzip, gzip, halt,
hd, hdparm, head, hexdump, hexedit, hostid, hostname, httpd, hush,
hwclock, i2cdetect, i2cdump, i2cget, i2cset, i2ctransfer, id, ifconfig,
ifdown, ifenslave, ifplugd, ifup, inetd, init, insmod, install, ionice,
iostat, ip, ipaddr, ipcalc, ipcrm, ipcs, iplink, ipneigh, iproute,
iprule, iptunnel, kbd_mode, kill, killall, killall5, klogd, last, less,
link, linux32, linux64, linuxrc, ln, loadfont, loadkmap, logger, login,
logname, logread, losetup, lpd, lpq, lpr, ls, lsattr, lsmod, lsof,
lspci, lsscsi, lsusb, lzcat, lzma, lzop, makedevs, makemime, man,
md5sum, mdev, mesg, microcom, mim, mkdir, mkdosfs, mke2fs, mkfifo,
mkfs.ext2, mkfs.minix, mkfs.vfat, mknod, mkpasswd, mkswap, mktemp,
modinfo, modprobe, more, mount, mountpoint, mpstat, mt, mv, nameif,
nanddump, nandwrite, nbd-client, nc, netstat, nice, nl, nmeter, nohup,
nologin, nproc, nsenter, nslookup, ntpd, od, openvt, partprobe, passwd,
paste, patch, pgrep, pidof, ping, ping6, pipe_progress, pivot_root,
pkill, pmap, popmaildir, poweroff, powertop, printenv, printf, ps,
pscan, pstree, pwd, pwdx, raidautorun, rdate, rdev, readahead,
readlink, readprofile, realpath, reboot, reformime, remove-shell,
renice, reset, resize, resume, rev, rm, rmdir, rmmod, route, rpm,
rpm2cpio, rtcwake, run-init, run-parts, runlevel, runsv, runsvdir, rx,
script, scriptreplay, sed, sendmail, seq, setarch, setconsole,
setfattr, setfont, setkeycodes, setlogcons, setpriv, setserial, setsid,
setuidgid, sh, sha1sum, sha256sum, sha3sum, sha512sum, showkey, shred,
shuf, slattach, sleep, smemcap, softlimit, sort, split, ssl_client,
start-stop-daemon, stat, strings, stty, su, sulogin, sum, sv, svc,
svlogd, svok, swapoff, swapon, switch_root, sync, sysctl, syslogd, tac,
tail, tar, taskset, tc, tcpsvd, tee, telnet, telnetd, test, tftp,
tftpd, time, timeout, top, touch, tr, traceroute, traceroute6, true,
truncate, ts, tty, ttysize, tunctl, ubiattach, ubidetach, ubimkvol,
ubirename, ubirmvol, ubirsvol, ubiupdatevol, udhcpc, udhcpc6, udhcpd,
udpsvd, uevent, umount, uname, unexpand, uniq, unix2dos, unlink,
unlzma, unshare, unxz, unzip, uptime, users, usleep, uudecode,
uuencode, vconfig, vi, vlock, volname, w, wall, watch, watchdog, wc,
wget, which, who, whoami, whois, xargs, xxd, xz, xzcat, yes, zcat,
zcip
DEBUG [U=0,P=16995] Master() Child exited with exit status 0
@truatpasteurdotfr
Copy link
Author

Solution from [Cedric Clerget]

With grsec in place, if you add your user in group ID 30 ? this is set in the kernel config :

CONFIG_GRKERNSEC_PROC_GID=30

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment