Skip to content

Instantly share code, notes, and snippets.

@DimanNe
Created June 19, 2021 19:41
Show Gist options
  • Save DimanNe/930aa6b39eedaf7f09bd23a8034a6648 to your computer and use it in GitHub Desktop.
Save DimanNe/930aa6b39eedaf7f09bd23a8034a6648 to your computer and use it in GitHub Desktop.
I0619 20:16:00.577462 3470386 main.go:218] ***************************
I0619 20:16:00.577479 3470386 main.go:219] Args: [/usr/bin/runsc --debug-log=/tmp/runsc/ --debug --strace --root /var/run/docker/runtime-runc/moby --log /run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/log.json --log-format json create --bundle /run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc --pid-file /run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/init.pid --console-socket /tmp/pty062615388/pty.sock 97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc]
I0619 20:16:00.577491 3470386 main.go:220] Version release-20210614.0
I0619 20:16:00.577495 3470386 main.go:221] GOOS: linux
I0619 20:16:00.577498 3470386 main.go:222] GOARCH: amd64
I0619 20:16:00.577501 3470386 main.go:223] PID: 3470386
I0619 20:16:00.577505 3470386 main.go:224] UID: 0, GID: 0
I0619 20:16:00.577509 3470386 main.go:225] Configuration:
I0619 20:16:00.577512 3470386 main.go:226] RootDir: /var/run/docker/runtime-runc/moby
I0619 20:16:00.577515 3470386 main.go:227] Platform: ptrace
I0619 20:16:00.577519 3470386 main.go:228] FileAccess: exclusive, overlay: false
I0619 20:16:00.577525 3470386 main.go:229] Network: sandbox, logging: false
I0619 20:16:00.577529 3470386 main.go:230] Strace: true, max size: 1024, syscalls:
I0619 20:16:00.577533 3470386 main.go:231] VFS2 enabled: false
I0619 20:16:00.577537 3470386 main.go:232] ***************************
W0619 20:16:00.578036 3470386 specutils.go:106] AppArmor profile "docker-default" is being ignored
W0619 20:16:00.578050 3470386 specutils.go:112] noNewPrivileges ignored. PR_SET_NO_NEW_PRIVS is assumed to always be set.
D0619 20:16:00.578155 3470386 specutils.go:74] Spec:
{
"ociVersion": "1.0.2-dev",
"process": {
"terminal": true,
"user": {
"uid": 1000,
"gid": 1000
},
"args": [
"/bin/bash"
],
"env": [
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"HOSTNAME=97319c243678",
"TERM=xterm-256color",
"DISPLAY=:0",
"COLORTERM=truecolor",
"USER_ID=1000",
"USER_GROUP=1000",
"USER_NAME=dimanne",
"HOME=/home/dimanne"
],
"cwd": "/home/dimanne",
"apparmorProfile": "docker-default",
"oomScoreAdj": 0
},
"root": {
"path": "/var/lib/docker/overlay2/0c7a5eb8ea79ebb437ff77eee4d4834161751ebdf92f2c6f2a4006df64ae5df0/merged"
},
"hostname": "97319c243678",
"mounts": [
{
"destination": "/proc",
"type": "proc",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/proc",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/dev",
"type": "tmpfs",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/tmpfs",
"options": [
"nosuid",
"strictatime",
"mode=755",
"size=65536k"
]
},
{
"destination": "/dev/pts",
"type": "devpts",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/devpts",
"options": [
"nosuid",
"noexec",
"newinstance",
"ptmxmode=0666",
"mode=0620",
"gid=5"
]
},
{
"destination": "/sys",
"type": "sysfs",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/sysfs",
"options": [
"nosuid",
"noexec",
"nodev",
"ro"
]
},
{
"destination": "/sys/fs/cgroup",
"type": "cgroup",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/cgroup",
"options": [
"ro",
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/dev/mqueue",
"type": "mqueue",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/mqueue",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/dev/shm",
"type": "tmpfs",
"source": "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/shm",
"options": [
"nosuid",
"noexec",
"nodev",
"mode=1777",
"size=34359738368"
]
},
{
"destination": "/tmp/.X11-unix",
"type": "bind",
"source": "/tmp/.X11-unix",
"options": [
"rbind",
"rprivate"
]
},
{
"destination": "/etc/resolv.conf",
"type": "bind",
"source": "/var/lib/docker/containers/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/resolv.conf",
"options": [
"rbind",
"rprivate"
]
},
{
"destination": "/etc/hostname",
"type": "bind",
"source": "/var/lib/docker/containers/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/hostname",
"options": [
"rbind",
"rprivate"
]
},
{
"destination": "/etc/hosts",
"type": "bind",
"source": "/var/lib/docker/containers/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/hosts",
"options": [
"rbind",
"rprivate"
]
},
{
"destination": "/home/dimanne/.Xauthority",
"type": "bind",
"source": "/home/dimanne/.Xauthority",
"options": [
"rbind",
"rprivate"
]
},
{
"destination": "/home/dimanne/.config",
"type": "bind",
"source": "/home/dimanne/devel/docker_mounts/kile/.config",
"options": [
"rbind",
"rprivate"
]
},
{
"destination": "/home/dimanne/devel",
"type": "bind",
"source": "/home/dimanne/devel",
"options": [
"rbind",
"rprivate"
]
}
],
"hooks": {
"prestart": [
{
"path": "/proc/3463722/exe",
"args": [
"libnetwork-setkey",
"-exec-root=/var/run/docker",
"97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc",
"631c26f857ae"
]
}
]
},
"linux": {
"sysctl": {
"net.ipv4.ip_unprivileged_port_start": "0"
},
"resources": {
"memory": {
"disableOOMKiller": false
},
"cpu": {
"shares": 0
},
"blockIO": {
"weight": 0
}
},
"cgroupsPath": "/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc",
"namespaces": [
{
"type": "mount"
},
{
"type": "network"
},
{
"type": "uts"
},
{
"type": "pid"
},
{
"type": "ipc"
}
]
}
}
D0619 20:16:00.578178 3470386 container.go:167] Create container, cid: 97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc, rootDir: "/var/run/docker/runtime-runc/moby"
D0619 20:16:00.578220 3470386 container.go:225] Creating new sandbox for container, cid: 97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc
D0619 20:16:00.578224 3470386 cgroup.go:337] New cgroup for pid: self, &{Name:/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc Parents:map[] Own:map[]}
D0619 20:16:00.578241 3470386 cgroup.go:345] Installing cgroup path "/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578302 3470386 cgroup.go:369] Creating cgroup "net_cls": "/sys/fs/cgroup/net_cls/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578330 3470386 cgroup.go:369] Creating cgroup "blkio": "/sys/fs/cgroup/blkio/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578355 3470386 cgroup.go:369] Creating cgroup "hugetlb": "/sys/fs/cgroup/hugetlb/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578376 3470386 cgroup.go:369] Creating cgroup "cpuacct": "/sys/fs/cgroup/cpuacct/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578431 3470386 cgroup.go:369] Creating cgroup "devices": "/sys/fs/cgroup/devices/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578451 3470386 cgroup.go:369] Creating cgroup "rdma": "/sys/fs/cgroup/rdma/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578469 3470386 cgroup.go:369] Creating cgroup "net_prio": "/sys/fs/cgroup/net_prio/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578476 3470386 cgroup.go:369] Creating cgroup "pids": "/sys/fs/cgroup/pids/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578492 3470386 cgroup.go:369] Creating cgroup "cpu": "/sys/fs/cgroup/cpu/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578500 3470386 cgroup.go:369] Creating cgroup "freezer": "/sys/fs/cgroup/freezer/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578517 3470386 cgroup.go:369] Creating cgroup "perf_event": "/sys/fs/cgroup/perf_event/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578534 3470386 cgroup.go:369] Creating cgroup "systemd": "/sys/fs/cgroup/systemd/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.578550 3470386 cgroup.go:369] Creating cgroup "cpuset": "/sys/fs/cgroup/cpuset/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600421 3470386 cgroup.go:369] Creating cgroup "memory": "/sys/fs/cgroup/memory/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600617 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/devices/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600641 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/rdma/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600657 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/net_prio/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600675 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/pids/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600690 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/cpuacct/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600712 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/cpu/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600723 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/perf_event/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600779 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/systemd/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600794 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/cpuset/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600809 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/memory/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600823 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/freezer/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600839 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/blkio/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600852 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/hugetlb/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600868 3470386 cgroup.go:457] Joining cgroup "/sys/fs/cgroup/net_cls/docker/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc"
D0619 20:16:00.600969 3470386 container.go:945] Starting gofer: /proc/self/exe [--root=/var/run/docker/runtime-runc/moby --debug=true --log=/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/log.json --log-format=json --debug-log=/tmp/runsc/ --strace=true --log-fd=3 --debug-log-fd=4 gofer --bundle /run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc --spec-fd=5 --mounts-fd=6 --io-fds=7 --io-fds=8 --io-fds=9 --io-fds=10 --io-fds=11 --io-fds=12 --io-fds=13 --io-fds=14]
I0619 20:16:00.601496 3470386 container.go:949] Gofer started, PID: 3470392
I0619 20:16:00.601562 3470386 sandbox.go:444] Creating sandbox process with addr: runsc-sandbox.97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc
I0619 20:16:00.601655 3470386 sandbox.go:568] Sandbox will be started in new mount, IPC and UTS namespaces
I0619 20:16:00.601661 3470386 sandbox.go:578] Sandbox will be started in the current PID namespace
I0619 20:16:00.601665 3470386 sandbox.go:589] Sandbox will be started in the container's network namespace: {Type:network Path:}
I0619 20:16:00.601702 3470386 sandbox.go:632] Sandbox will be started in new user namespace
D0619 20:16:00.601730 3470386 sandbox.go:750] Donating FD 3: "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/log.json"
D0619 20:16:00.601735 3470386 sandbox.go:750] Donating FD 4: "/tmp/runsc/runsc.log.20210619-201600.601540.boot"
D0619 20:16:00.601739 3470386 sandbox.go:750] Donating FD 5: "control_server_socket"
D0619 20:16:00.601742 3470386 sandbox.go:750] Donating FD 6: "|0"
D0619 20:16:00.601745 3470386 sandbox.go:750] Donating FD 7: "/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/config.json"
D0619 20:16:00.601749 3470386 sandbox.go:750] Donating FD 8: "|1"
D0619 20:16:00.601752 3470386 sandbox.go:750] Donating FD 9: "sandbox IO FD"
D0619 20:16:00.601756 3470386 sandbox.go:750] Donating FD 10: "sandbox IO FD"
D0619 20:16:00.601759 3470386 sandbox.go:750] Donating FD 11: "sandbox IO FD"
D0619 20:16:00.601762 3470386 sandbox.go:750] Donating FD 12: "sandbox IO FD"
D0619 20:16:00.601766 3470386 sandbox.go:750] Donating FD 13: "sandbox IO FD"
D0619 20:16:00.601769 3470386 sandbox.go:750] Donating FD 14: "sandbox IO FD"
D0619 20:16:00.601772 3470386 sandbox.go:750] Donating FD 15: "sandbox IO FD"
D0619 20:16:00.601774 3470386 sandbox.go:750] Donating FD 16: "sandbox IO FD"
D0619 20:16:00.601778 3470386 sandbox.go:750] Donating FD 17: "/dev/pts/15"
D0619 20:16:00.601781 3470386 sandbox.go:750] Donating FD 18: "/dev/pts/15"
D0619 20:16:00.601784 3470386 sandbox.go:750] Donating FD 19: "/dev/pts/15"
D0619 20:16:00.601787 3470386 sandbox.go:753] Starting sandbox: /proc/self/exe [runsc-sandbox --root=/var/run/docker/runtime-runc/moby --debug=true --log=/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc/log.json --log-format=json --debug-log=/tmp/runsc/ --strace=true --log-fd=3 --debug-log-fd=4 boot --bundle=/run/containerd/io.containerd.runtime.v2.task/moby/97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc --controller-fd=5 --mounts-fd=6 --spec-fd=7 --start-sync-fd=8 --io-fds=9 --io-fds=10 --io-fds=11 --io-fds=12 --io-fds=13 --io-fds=14 --io-fds=15 --io-fds=16 --stdio-fds=17 --stdio-fds=18 --stdio-fds=19 --setup-root --cpu-num 32 97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc]
D0619 20:16:00.601794 3470386 sandbox.go:754] SysProcAttr: &{Chroot: Credential:0xc0000b63f0 Ptrace:false Setsid:true Setpgid:false Setctty:true Noctty:false Ctty:17 Foreground:false Pgid:0 Pdeathsig:signal 0 Cloneflags:0 Unshareflags:0 UidMappings:[{ContainerID:65534 HostID:65534 Size:1}] GidMappings:[{ContainerID:65534 HostID:65534 Size:1}] GidMappingsEnableSetgroups:false AmbientCaps:[21 18]}
I0619 20:16:00.602448 3470386 sandbox.go:777] Sandbox started, PID: 3470394
D0619 20:16:00.750275 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/systemd/system.slice/containerd.service"
D0619 20:16:00.750331 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/net_prio"
D0619 20:16:00.750355 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/memory/system.slice/containerd.service"
D0619 20:16:00.750373 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/cpuacct/system.slice/containerd.service"
D0619 20:16:00.750400 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/blkio/system.slice/containerd.service"
D0619 20:16:00.750416 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/pids/system.slice/containerd.service"
D0619 20:16:00.750436 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/freezer"
D0619 20:16:00.750447 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/devices/system.slice/containerd.service"
D0619 20:16:00.750463 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/perf_event"
D0619 20:16:00.750495 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/cpu/system.slice/containerd.service"
D0619 20:16:00.750506 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/hugetlb"
D0619 20:16:00.750520 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/net_cls"
D0619 20:16:00.750529 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/cpuset"
D0619 20:16:00.783782 3470386 cgroup.go:444] Restoring cgroup "/sys/fs/cgroup/rdma"
D0619 20:16:00.783822 3470386 container.go:743] Save container, cid: 97319c243678ce179d56f8cee080b8e5e10af3395514bb588e336ffdd25176cc
I0619 20:16:00.784094 3470386 main.go:248] Exiting with status: 0
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment