Open liuxu623 opened 12 months ago
containerd log
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: time="2023-09-21T14:56:37.248414780+08:00" level=debug msg="Exec for \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" with command [/bin/bash], tty true and stdin true"
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: time="2023-09-21T14:56:37.248448403+08:00" level=debug msg="Exec for \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" returns URL \"http://127.0.0.1:37965/exec/jiGwiulz\""
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StateProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"\", process_type: Container })","level":"DEBG","ts":"2023-09-21T06:56:37.278785275Z","subsystem":"service","stream id":"285","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service StateProcess(ProcessStateInfo { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", exec_id: \"\", pid: PID { pid: 1173477 }, bundle: \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", stdin: None, stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/1613844216/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/1613844216/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170-stderr\"), terminal: false, status: Running, exit_status: 0, exited_at: None })","level":"DEBG","ts":"2023-09-21T06:56:37.278920201Z","pid":"1173477","name":"kata-runtime","version":"0.1.0","stream id":"285","subsystem":"service","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: time="2023-09-21T14:56:37.278985284+08:00" level=debug msg="Generated exec id \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\" for container \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\""
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service ExecProcess(ExecProcessRequest { process: ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec }, terminal: true, stdin: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdin\"), stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stderr\"), spec_type_url: \"types.containerd.io/opencontainers/runtime-spec/1/Process\", spec_value: [123, 34, 116, 101, 114, 109, 105, 110, 97, 108, 34, 58, 116, 114, 117, 101, 44, 34, 117, 115, 101, 114, 34, 58, 123, 34, 117, 105, 100, 34, 58, 48, 44, 34, 103, 105, 100, 34, 58, 48, 44, 34, 97, 100, 100, 105, 116, 105, 111, 110, 97, 108, 71, 105, 100, 115, 34, 58, 91, 49, 48, 93, 125, 44, 34, 97, 114, 103, 115, 34, 58, 91, 34, 47, 98, 105, 110, 47, 98, 97, 115, 104, 34, 93, 44, 34, 101, 110, 118, 34, 58, 91, 34, 80, 65, 84, 72, 61, 47, 117, 115, 114, 47, 108, 111, 99, 97, 108, 47, 115, 98, 105, 110, 58, 47, 117, 115, 114, 47, 108, 111, 99, 97, 108, 47, 98, 105, 110, 58, 47, 117, 115, 114, 47, 115, 98, 105, 110, 58, 47, 117, 115, 114, 47, 98, 105, 110, 58, 47, 115, 98, 105, 110, 58, 47, 98, 105, 110, 34, 44, 34, 72, 79, 83, 84, 78, 65, 77, 69, 61, 98, 117, 115, 121, 98, 111, 120, 45, 107, 97, 116, 97, 45, 49, 34, 44, 34, 65, 80, 80, 73, 68, 61, 34, 44, 34, 90, 75, 95, 72, 79, 83, 84, 61, 49, 48, 46, 48, 46, 49, 46, 49, 53, 51, 58, 50, 49, 56, 49, 44, 49, 48, 46, 48, 46, 49, 46, 49, 53, 50, 58, 50, 49, 56, 49, 44, 49, 48, 46, 48, 46, 49, 46, 49, 55, 54, 58, 50, 49, 56, 49, 44, 49, 48, 46, 48, 46, 49, 46, 50, 50, 56, 58, 50, 49, 56, 49, 44, 49, 48, 46, 48, 46, 49, 46, 50, 48, 50, 58, 50, 49, 56, 49, 34, 44, 34, 88, 72, 83, 95, 69, 78, 86, 61, 112, 114, 111, 100, 34, 44, 34, 83, 69, 82, 86, 73, 67, 69, 95, 73, 68, 61, 98, 117, 115, 121, 98, 111, 120, 45, 107, 97, 116, 97, 45, 49, 34, 44, 34, 67, 65, 84, 95, 82, 79, 85, 84, 69, 82, 95, 65, 68, 68, 82, 69, 83, 83, 69, 83, 61, 49, 48, 46, 48, 46, 50, 50, 56, 46, 49, 48, 58, 56, 48, 56, 48, 34, 44, 34, 69, 68, 83, 95, 72, 79, 83, 84, 83, 61, 49, 48, 46, 49, 52, 52, 46, 49, 50, 50, 46, 49, 51, 57, 58, 56, 48, 34, 44, 34, 83, 87, 95, 65, 71, 69, 78, 84, 95, 67, 79, 76, 76, 69, 67, 84, 79, 82, 95, 66, 65, 67, 75, 69, 78, 68, 95, 83, 69, 82, 86, 73, 67, 69, 83, 61, 49, 48, 46, 49, 49, 46, 50, 49, 48, 46, 49, 55, 57, 58, 49, 49, 56, 48, 48, 44, 49, 48, 46, 49, 49, 46, 50, 48, 56, 46, 49, 52, 56, 58, 49, 49, 56, 48, 48, 34, 44, 34, 69, 68, 83, 95, 72, 84, 84, 80, 95, 72, 79, 83, 84, 61, 49, 48, 46, 49, 52, 52, 46, 49, 50, 50, 46, 49, 52, 51, 58, 56, 48, 56, 53, 34, 44, 34, 84, 82, 65, 67, 69, 95, 65, 71, 69, 78, 84, 95, 79, 80, 84, 83, 61, 45, 106, 97, 118, 97, 97, 103, 101, 110, 116, 58, 47, 100, 97, 116, 97, 47, 115, 107, 121, 119, 97, 108, 107, 105, 110, 103, 47, 97, 103, 101, 110, 116, 47, 115, 107, 121, 119, 97, 108, 107, 105, 110, 103, 45, 97, 103, 101, 110, 116, 46, 106, 97, 114, 34, 44, 34, 68, 73, 83, 65, 66, 76, 69, 95, 67, 79, 78, 83, 85, 76, 61, 116, 114, 117, 101, 34, 44, 34, 85, 83, 69, 95, 82, 69, 68, 67, 65, 83, 84, 61, 49, 34, 44, 34, 77, 79, 78, 73, 84, 79, 82, 95, 75, 65, 70, 75, 65, 61, 107, 97, 102, 107, 97, 45, 113, 99, 115, 104, 52, 45, 115, 97, 50, 45, 109, 101, 116, 97, 49, 46, 105, 110, 116, 46, 120, 105, 97, 111, 104, 111, 110, 103, 115, 104, 117, 46, 99, 111, 109, 58, 57, 48, 57, 50, 44, 107, 97, 102, 107, 97, 45, 113, 99, 115, 104, 52, 45, 115, 97, 50, 45, 109, 101, 116, 97, 50, 46, 105, 110, 116, 46, 120, 105, 97, 111, 104, 111, 110, 103, 115, 104, 117, 46, 99, 111, 109, 58, 57, 48, 57, 50, 44, 107, 97, 102, 107, 97, 45, 113, 99, 115, 104, 52, 45, 115, 97, 50, 45, 109, 101, 116, 97, 51, 46, 105, 110, 116, 46, 120, 105, 97, 111, 104, 111, 110, 103, 115, 104, 117, 46, 99, 111, 109, 58, 57, 48, 57, 50, 34, 44, 34, 88, 72, 83, 95, 90, 79, 78, 69, 61, 97, 108, 115, 104, 49, 34, 44, 34, 90, 75, 95, 78, 65, 77, 69, 83, 80, 65, 67, 69, 61, 112, 114, 111, 100, 95, 115, 101, 114, 118, 105, 99, 101, 95, 118, 49, 34, 44, 34, 80, 79, 68, 95, 73, 80, 61, 49, 48, 46, 49, 52, 53, 46, 50, 51, 50, 46, 50, 50, 48, 34, 44, 34, 82, 69, 68, 67, 65, 83, 84, 95, 68, 65, 69, 77, 79, 78, 95, 72, 79, 83, 84, 61, 49, 48, 46, 49, 52, 52, 46, 57, 46, 50, 50, 49, 34, 44, 34, 69, 68, 83, 95, 72, 79, 83, 84, 61, 49, 48, 46, 49, 52, 52, 46, 49, 50, 50, 46, 49, 51, 57, 58, 56, 48, 34, 44, 34, 88, 72, 83, 95, 75, 56, 83, 61, 97, 108, 115, 104, 49, 34, 44, 34, 88, 72, 83, 95, 82, 69, 71, 73, 79, 78, 61, 97, 108, 45, 115, 104, 34, 44, 34, 78, 65, 77, 69, 83, 80, 65, 67, 69, 61, 100, 101, 102, 97, 117, 108, 116, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 83, 69, 82, 86, 73, 67, 69, 95, 80, 79, 82, 84, 95, 72, 84, 84, 80, 83, 61, 52, 52, 51, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 80, 79, 82, 84, 61, 116, 99, 112, 58, 47, 47, 49, 48, 46, 50, 48, 48, 46, 49, 48, 52, 46, 49, 58, 52, 52, 51, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 80, 79, 82, 84, 95, 52, 52, 51, 95, 84, 67, 80, 61, 116, 99, 112, 58, 47, 47, 49, 48, 46, 50, 48, 48, 46, 49, 48, 52, 46, 49, 58, 52, 52, 51, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 80, 79, 82, 84, 95, 52, 52, 51, 95, 84, 67, 80, 95, 80, 82, 79, 84, 79, 61, 116, 99, 112, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 80, 79, 82, 84, 95, 52, 52, 51, 95, 84, 67, 80, 95, 80, 79, 82, 84, 61, 52, 52, 51, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 80, 79, 82, 84, 95, 52, 52, 51, 95, 84, 67, 80, 95, 65, 68, 68, 82, 61, 49, 48, 46, 50, 48, 48, 46, 49, 48, 52, 46, 49, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 83, 69, 82, 86, 73, 67, 69, 95, 72, 79, 83, 84, 61, 49, 48, 46, 50, 48, 48, 46, 49, 48, 52, 46, 49, 34, 44, 34, 75, 85, 66, 69, 82, 78, 69, 84, 69, 83, 95, 83, 69, 82, 86, 73, 67, 69, 95, 80, 79, 82, 84, 61, 52, 52, 51, 34, 44, 34, 84, 69, 82, 77, 61, 120, 116, 101, 114, 109, 34, 93, 44, 34, 99, 119, 100, 34, 58, 34, 47, 34, 44, 34, 99, 97, 112, 97, 98, 105, 108, 105, 116, 105, 101, 115, 34, 58, 123, 34, 98, 111, 117, 110, 100, 105, 110, 103, 34, 58, 91, 34, 67, 65, 80, 95, 67, 72, 79, 87, 78, 34, 44, 34, 67, 65, 80, 95, 68, 65, 67, 95, 79, 86, 69, 82, 82, 73, 68, 69, 34, 44, 34, 67, 65, 80, 95, 70, 83, 69, 84, 73, 68, 34, 44, 34, 67, 65, 80, 95, 70, 79, 87, 78, 69, 82, 34, 44, 34, 67, 65, 80, 95, 77, 75, 78, 79, 68, 34, 44, 34, 67, 65, 80, 95, 78, 69, 84, 95, 82, 65, 87, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 71, 73, 68, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 85, 73, 68, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 70, 67, 65, 80, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 80, 67, 65, 80, 34, 44, 34, 67, 65, 80, 95, 78, 69, 84, 95, 66, 73, 78, 68, 95, 83, 69, 82, 86, 73, 67, 69, 34, 44, 34, 67, 65, 80, 95, 83, 89, 83, 95, 67, 72, 82, 79, 79, 84, 34, 44, 34, 67, 65, 80, 95, 75, 73, 76, 76, 34, 44, 34, 67, 65, 80, 95, 65, 85, 68, 73, 84, 95, 87, 82, 73, 84, 69, 34, 93, 44, 34, 101, 102, 102, 101, 99, 116, 105, 118, 101, 34, 58, 91, 34, 67, 65, 80, 95, 67, 72, 79, 87, 78, 34, 44, 34, 67, 65, 80, 95, 68, 65, 67, 95, 79, 86, 69, 82, 82, 73, 68, 69, 34, 44, 34, 67, 65, 80, 95, 70, 83, 69, 84, 73, 68, 34, 44, 34, 67, 65, 80, 95, 70, 79, 87, 78, 69, 82, 34, 44, 34, 67, 65, 80, 95, 77, 75, 78, 79, 68, 34, 44, 34, 67, 65, 80, 95, 78, 69, 84, 95, 82, 65, 87, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 71, 73, 68, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 85, 73, 68, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 70, 67, 65, 80, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 80, 67, 65, 80, 34, 44, 34, 67, 65, 80, 95, 78, 69, 84, 95, 66, 73, 78, 68, 95, 83, 69, 82, 86, 73, 67, 69, 34, 44, 34, 67, 65, 80, 95, 83, 89, 83, 95, 67, 72, 82, 79, 79, 84, 34, 44, 34, 67, 65, 80, 95, 75, 73, 76, 76, 34, 44, 34, 67, 65, 80, 95, 65, 85, 68, 73, 84, 95, 87, 82, 73, 84, 69, 34, 93, 44, 34, 112, 101, 114, 109, 105, 116, 116, 101, 100, 34, 58, 91, 34, 67, 65, 80, 95, 67, 72, 79, 87, 78, 34, 44, 34, 67, 65, 80, 95, 68, 65, 67, 95, 79, 86, 69, 82, 82, 73, 68, 69, 34, 44, 34, 67, 65, 80, 95, 70, 83, 69, 84, 73, 68, 34, 44, 34, 67, 65, 80, 95, 70, 79, 87, 78, 69, 82, 34, 44, 34, 67, 65, 80, 95, 77, 75, 78, 79, 68, 34, 44, 34, 67, 65, 80, 95, 78, 69, 84, 95, 82, 65, 87, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 71, 73, 68, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 85, 73, 68, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 70, 67, 65, 80, 34, 44, 34, 67, 65, 80, 95, 83, 69, 84, 80, 67, 65, 80, 34, 44, 34, 67, 65, 80, 95, 78, 69, 84, 95, 66, 73, 78, 68, 95, 83, 69, 82, 86, 73, 67, 69, 34, 44, 34, 67, 65, 80, 95, 83, 89, 83, 95, 67, 72, 82, 79, 79, 84, 34, 44, 34, 67, 65, 80, 95, 75, 73, 76, 76, 34, 44, 34, 67, 65, 80, 95, 65, 85, 68, 73, 84, 95, 87, 82, 73, 84, 69, 34, 93, 125, 44, 34, 111, 111, 109, 83, 99, 111, 114, 101, 65, 100, 106, 34, 58, 49, 48, 48, 48, 125] })","level":"DEBG","ts":"2023-09-21T06:56:37.27954331Z","stream id":"287","name":"kata-runtime","subsystem":"service","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service ExecProcess","level":"DEBG","ts":"2023-09-21T06:56:37.279584529Z","pid":"1173477","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0","subsystem":"service","stream id":"287"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StateProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.279706028Z","stream id":"289","subsystem":"service","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StateProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.27986513Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0","pid":"1173477","name":"kata-runtime","subsystem":"service","stream id":"291"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service StateProcess(ProcessStateInfo { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", pid: PID { pid: 1173477 }, bundle: \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", stdin: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdin\"), stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stderr\"), terminal: true, status: Created, exit_status: 0, exited_at: None })","level":"DEBG","ts":"2023-09-21T06:56:37.279903072Z","subsystem":"service","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477","stream id":"289"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service StateProcess(ProcessStateInfo { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", pid: PID { pid: 1173477 }, bundle: \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", stdin: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdin\"), stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stderr\"), terminal: true, status: Created, exit_status: 0, exited_at: None })","level":"DEBG","ts":"2023-09-21T06:56:37.279938909Z","stream id":"291","pid":"1173477","version":"0.1.0","subsystem":"service","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StartProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.279988904Z","subsystem":"service","stream id":"295","version":"0.1.0","name":"kata-runtime","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service WaitProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.280048597Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","stream id":"293","pid":"1173477","name":"kata-runtime","version":"0.1.0","subsystem":"service"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"start wait process","level":"INFO","ts":"2023-09-21T06:56:37.280077231Z","container_id":"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170","subsystem":"virt-container","pid":"1173477","exec_id":"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"rpc call from shim to agent: \\\"exec_process\\\"\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.280264239Z\",\"version\":\"0.1.0\",\"pid\":\"56\",\"source\":\"agent\",\"name\":\"kata-agent\",\"subsystem\":\"rpc\"}","level":"INFO","ts":"2023-09-21T06:56:37.280854673Z","name":"kata-runtime","version":"0.1.0","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"do_exec_process cid: dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170 eid: d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.280313954Z\",\"version\":\"0.1.0\",\"source\":\"agent\",\"pid\":\"56\",\"subsystem\":\"rpc\",\"name\":\"kata-agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.280903896Z","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"before create console socket!\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.280368467Z\",\"subsystem\":\"process\",\"version\":\"0.1.0\",\"name\":\"kata-agent\",\"pid\":\"56\",\"source\":\"agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.280952508Z","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"enter container.start!\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.280407671Z\",\"subsystem\":\"container\",\"source\":\"agent\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"module\":\"rustjail\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"name\":\"kata-agent\",\"version\":\"0.1.0\",\"pid\":\"56\"}","level":"INFO","ts":"2023-09-21T06:56:37.281008214Z","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"exec fifo opened!\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.280445062Z\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"module\":\"rustjail\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"subsystem\":\"container\",\"source\":\"agent\",\"name\":\"kata-agent\",\"version\":\"0.1.0\",\"pid\":\"56\"}","level":"INFO","ts":"2023-09-21T06:56:37.281063769Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","subsystem":"agent","version":"0.1.0","pid":"1173477","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"Continuing execution in temporary process, new child has pid: Pid(90)\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281390361Z\",\"name\":\"kata-agent\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"version\":\"0.1.0\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"source\":\"agent\",\"pid\":\"56\",\"module\":\"rustjail\",\"action\":\"child process log\",\"subsystem\":\"container\"}","level":"INFO","ts":"2023-09-21T06:56:37.281495847Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","version":"0.1.0","subsystem":"agent","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"child pid: 90\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281548561Z\",\"module\":\"rustjail\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"version\":\"0.1.0\",\"pid\":\"56\",\"name\":\"kata-agent\",\"source\":\"agent\",\"subsystem\":\"container\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\"}","level":"INFO","ts":"2023-09-21T06:56:37.281891496Z","subsystem":"agent","name":"kata-runtime","pid":"1173477","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"try to send spec from parent to child\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281751154Z\",\"pid\":\"56\",\"subsystem\":\"container\",\"module\":\"rustjail\",\"version\":\"0.1.0\",\"name\":\"kata-agent\",\"source\":\"agent\",\"action\":\"join-namespaces\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\"}","level":"INFO","ts":"2023-09-21T06:56:37.281950718Z","name":"kata-runtime","pid":"1173477","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait child received oci spec\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281777434Z\",\"action\":\"join-namespaces\",\"pid\":\"56\",\"name\":\"kata-agent\",\"source\":\"agent\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"subsystem\":\"container\",\"version\":\"0.1.0\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"module\":\"rustjail\"}","level":"INFO","ts":"2023-09-21T06:56:37.282009048Z","version":"0.1.0","subsystem":"agent","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"temporary parent process exit successfully\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281802121Z\",\"source\":\"agent\",\"name\":\"kata-agent\",\"module\":\"rustjail\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"version\":\"0.1.0\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"action\":\"child process log\",\"subsystem\":\"container\",\"pid\":\"56\"}","level":"INFO","ts":"2023-09-21T06:56:37.282069523Z","subsystem":"agent","name":"kata-runtime","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"handling signal\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281951854Z\",\"version\":\"0.1.0\",\"pid\":\"56\",\"source\":\"agent\",\"name\":\"kata-agent\",\"subsystem\":\"signals\",\"signal\":\"SIGCHLD\"}","level":"INFO","ts":"2023-09-21T06:56:37.282118616Z","subsystem":"agent","pid":"1173477","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait_status\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.281971341Z\",\"source\":\"agent\",\"pid\":\"56\",\"name\":\"kata-agent\",\"version\":\"0.1.0\",\"subsystem\":\"signals\",\"wait_status result\":\"Exited(Pid(89), 0)\"}","level":"INFO","ts":"2023-09-21T06:56:37.282172758Z","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"child process start run\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.282082131Z\",\"module\":\"rustjail\",\"source\":\"agent\",\"name\":\"kata-agent\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"action\":\"child process log\",\"subsystem\":\"container\",\"pid\":\"56\",\"version\":\"0.1.0\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\"}","level":"INFO","ts":"2023-09-21T06:56:37.282233453Z","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","subsystem":"agent"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"notify parent to send oci process\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.282270367Z\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"subsystem\":\"container\",\"name\":\"kata-agent\",\"version\":\"0.1.0\",\"module\":\"rustjail\",\"action\":\"child process log\",\"pid\":\"56\",\"source\":\"agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.282365373Z","version":"0.1.0","subsystem":"agent","pid":"1173477","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"send oci process from parent to child\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.282373543Z\",\"action\":\"join-namespaces\",\"subsystem\":\"container\",\"source\":\"agent\",\"version\":\"0.1.0\",\"pid\":\"56\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"module\":\"rustjail\",\"name\":\"kata-agent\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\"}","level":"INFO","ts":"2023-09-21T06:56:37.282487554Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0","subsystem":"agent","pid":"1173477","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait child received oci process\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.282398891Z\",\"source\":\"agent\",\"module\":\"rustjail\",\"pid\":\"56\",\"action\":\"join-namespaces\",\"name\":\"kata-agent\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"version\":\"0.1.0\",\"subsystem\":\"container\"}","level":"INFO","ts":"2023-09-21T06:56:37.282546466Z","version":"0.1.0","subsystem":"agent","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"notify parent to send cgroup manager\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.282508207Z\",\"pid\":\"56\",\"name\":\"kata-agent\",\"module\":\"rustjail\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"subsystem\":\"container\",\"version\":\"0.1.0\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"source\":\"agent\",\"action\":\"child process log\"}","level":"INFO","ts":"2023-09-21T06:56:37.2826071Z","pid":"1173477","version":"0.1.0","subsystem":"agent","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait child setup user namespace\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.28261507Z\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"action\":\"join-namespaces\",\"source\":\"agent\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"name\":\"kata-agent\",\"subsystem\":\"container\",\"pid\":\"56\",\"module\":\"rustjail\",\"version\":\"0.1.0\"}","level":"INFO","ts":"2023-09-21T06:56:37.282702371Z","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0","subsystem":"agent","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"write oom score 1000\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.283029284Z\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"version\":\"0.1.0\",\"action\":\"child process log\",\"subsystem\":\"container\",\"source\":\"agent\",\"pid\":\"56\",\"name\":\"kata-agent\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"module\":\"rustjail\"}","level":"INFO","ts":"2023-09-21T06:56:37.283121094Z","name":"kata-runtime","pid":"1173477","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","subsystem":"agent"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"notify parent unshare user ns completed\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.283144863Z\",\"module\":\"rustjail\",\"source\":\"agent\",\"version\":\"0.1.0\",\"subsystem\":\"container\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"action\":\"child process log\",\"pid\":\"56\",\"name\":\"kata-agent\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\"}","level":"INFO","ts":"2023-09-21T06:56:37.283247483Z","name":"kata-runtime","subsystem":"agent","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"apply processes to cgroups!\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.283374097Z\",\"name\":\"kata-agent\",\"subsystem\":\"container\",\"module\":\"rustjail\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"action\":\"join-namespaces\",\"source\":\"agent\",\"pid\":\"56\",\"version\":\"0.1.0\"}","level":"INFO","ts":"2023-09-21T06:56:37.285212393Z","version":"0.1.0","subsystem":"agent","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"notify child to continue\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.284948627Z\",\"subsystem\":\"container\",\"action\":\"join-namespaces\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"name\":\"kata-agent\",\"source\":\"agent\",\"version\":\"0.1.0\",\"pid\":\"56\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"module\":\"rustjail\"}","level":"INFO","ts":"2023-09-21T06:56:37.28529558Z","name":"kata-runtime","version":"0.1.0","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait for child process ready to run exec\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.284975448Z\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"action\":\"join-namespaces\",\"pid\":\"56\",\"module\":\"rustjail\",\"source\":\"agent\",\"version\":\"0.1.0\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"subsystem\":\"container\",\"name\":\"kata-agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.285354401Z","name":"kata-runtime","subsystem":"agent","version":"0.1.0","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait parent to setup user id mapping\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.285000756Z\",\"version\":\"0.1.0\",\"action\":\"child process log\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"module\":\"rustjail\",\"name\":\"kata-agent\",\"subsystem\":\"container\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"pid\":\"56\",\"source\":\"agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.285410237Z","name":"kata-runtime","version":"0.1.0","pid":"1173477","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"join namespace CLONE_NEWIPC\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.285377409Z\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"source\":\"agent\",\"module\":\"rustjail\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"subsystem\":\"container\",\"action\":\"child process log\",\"name\":\"kata-agent\",\"pid\":\"56\",\"version\":\"0.1.0\"}","level":"INFO","ts":"2023-09-21T06:56:37.285570641Z","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"join namespace CLONE_NEWUTS\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.285443735Z\",\"action\":\"child process log\",\"pid\":\"56\",\"module\":\"rustjail\",\"version\":\"0.1.0\",\"subsystem\":\"container\",\"name\":\"kata-agent\",\"source\":\"agent\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\"}","level":"INFO","ts":"2023-09-21T06:56:37.285629061Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477","subsystem":"agent","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"setup rootfs /run/kata-containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/rootfs\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.285468732Z\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"source\":\"agent\",\"pid\":\"56\",\"module\":\"rustjail\",\"action\":\"child process log\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"version\":\"0.1.0\",\"name\":\"kata-agent\",\"subsystem\":\"container\"}","level":"INFO","ts":"2023-09-21T06:56:37.285688765Z","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","subsystem":"agent","name":"kata-runtime","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"process command: [\\\"/bin/bash\\\"]\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.285639655Z\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"source\":\"agent\",\"name\":\"kata-agent\",\"action\":\"child process log\",\"subsystem\":\"container\",\"module\":\"rustjail\",\"version\":\"0.1.0\",\"pid\":\"56\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\"}","level":"INFO","ts":"2023-09-21T06:56:37.285789896Z","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","name":"kata-runtime","subsystem":"agent"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"begin to stop process","level":"INFO","ts":"2023-09-21T06:56:37.287131877Z","exec_id":"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095","container_id":"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170","pid":"1173477","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","subsystem":"virt-container"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"create container process error the file /bin/bash was not found\",\"level\":\"ERRO\",\"ts\":\"2023-09-21T06:56:37.287135157Z\",\"module\":\"rustjail\",\"pid\":\"56\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"name\":\"kata-agent\",\"version\":\"0.1.0\",\"source\":\"agent\",\"subsystem\":\"container\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\"}","level":"ERRO","ts":"2023-09-21T06:56:37.2875511Z","subsystem":"agent","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"temporary parent process exit:child exit: the file /bin/bash was not found\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.28723735Z\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"subsystem\":\"container\",\"source\":\"agent\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"action\":\"child process log\",\"module\":\"rustjail\",\"pid\":\"56\",\"name\":\"kata-agent\",\"version\":\"0.1.0\"}","level":"INFO","ts":"2023-09-21T06:56:37.287632554Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","subsystem":"agent","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"read child process log end\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.287269741Z\",\"name\":\"kata-agent\",\"source\":\"agent\",\"version\":\"0.1.0\",\"subsystem\":\"container\",\"cid\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"pid\":\"56\",\"module\":\"rustjail\",\"eid\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"action\":\"child process log\"}","level":"INFO","ts":"2023-09-21T06:56:37.287737503Z","pid":"1173477","version":"0.1.0","subsystem":"agent","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"child exited unexpectedly\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.287301171Z\",\"name\":\"kata-agent\",\"pid\":\"56\",\"version\":\"0.1.0\",\"subsystem\":\"signals\",\"child-pid\":\"89\",\"source\":\"agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.28782543Z","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","subsystem":"agent"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"wait_status\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.28732729Z\",\"name\":\"kata-agent\",\"version\":\"0.1.0\",\"source\":\"agent\",\"subsystem\":\"signals\",\"pid\":\"56\",\"wait_status result\":\"Exited(Pid(90), 0)\"}","level":"INFO","ts":"2023-09-21T06:56:37.287906383Z","pid":"1173477","version":"0.1.0","subsystem":"agent","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"child exited unexpectedly\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.28735339Z\",\"subsystem\":\"signals\",\"child-pid\":\"90\",\"name\":\"kata-agent\",\"source\":\"agent\",\"pid\":\"56\",\"version\":\"0.1.0\"}","level":"INFO","ts":"2023-09-21T06:56:37.28801055Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","subsystem":"agent","name":"kata-runtime","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"failed to signal kill. rpc status: code: INTERNAL message: \"Invalid exec id\"","level":"WARN","ts":"2023-09-21T06:56:37.288065053Z","exec_id":"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095","version":"0.1.0","name":"kata-runtime","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","subsystem":"virt-container","container_id":"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"handling signal\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.2873745Z\",\"subsystem\":\"signals\",\"version\":\"0.1.0\",\"name\":\"kata-agent\",\"source\":\"agent\",\"pid\":\"56\",\"signal\":\"SIGCHLD\"}","level":"INFO","ts":"2023-09-21T06:56:37.288230016Z","pid":"1173477","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","subsystem":"agent"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"begin wait exit","level":"INFO","ts":"2023-09-21T06:56:37.288272236Z","exec_id":"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095","pid":"1173477","version":"0.1.0","subsystem":"virt-container","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","container_id":"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"rpc call from shim to agent: \\\"signal_process\\\"\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.287469389Z\",\"pid\":\"56\",\"name\":\"kata-agent\",\"subsystem\":\"rpc\",\"version\":\"0.1.0\",\"source\":\"agent\"}","level":"INFO","ts":"2023-09-21T06:56:37.288358018Z","name":"kata-runtime","subsystem":"agent","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"signal process\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.287552807Z\",\"version\":\"0.1.0\",\"subsystem\":\"rpc\",\"source\":\"agent\",\"pid\":\"56\",\"name\":\"kata-agent\",\"exec-id\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"container-id\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\",\"signal\":\"9\"}","level":"INFO","ts":"2023-09-21T06:56:37.288433691Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","subsystem":"agent","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StateProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.28846993Z","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","subsystem":"service","stream id":"297","name":"kata-runtime","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service StateProcess(ProcessStateInfo { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", pid: PID { pid: 1173477 }, bundle: \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", stdin: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdin\"), stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stderr\"), terminal: true, status: Stopped, exit_status: 0, exited_at: None })","level":"DEBG","ts":"2023-09-21T06:56:37.288519033Z","name":"kata-runtime","subsystem":"service","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","version":"0.1.0","pid":"1173477","stream id":"297"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StateProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.288559589Z","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","stream id":"299","pid":"1173477","subsystem":"service"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service StateProcess(ProcessStateInfo { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", pid: PID { pid: 1173477 }, bundle: \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", stdin: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdin\"), stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stderr\"), terminal: true, status: Stopped, exit_status: 0, exited_at: None })","level":"DEBG","ts":"2023-09-21T06:56:37.288606388Z","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","subsystem":"service","version":"0.1.0","stream id":"299"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service KillProcess(KillRequest { process: ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec }, signal: 9, all: false })","level":"DEBG","ts":"2023-09-21T06:56:37.288650011Z","name":"kata-runtime","stream id":"301","subsystem":"service","pid":"1173477","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service WaitProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:56:37.288690898Z","version":"0.1.0","subsystem":"service","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","stream id":"303","name":"kata-runtime","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"start wait process","level":"INFO","ts":"2023-09-21T06:56:37.288726926Z","subsystem":"virt-container","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","version":"0.1.0","name":"kata-runtime","container_id":"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170","exec_id":"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"failed to signal process ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec } rpc status: code: INTERNAL message: \"Invalid exec id\"","level":"WARN","ts":"2023-09-21T06:56:37.288771581Z","version":"0.1.0","subsystem":"virt-container","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service KillProcess","level":"DEBG","ts":"2023-09-21T06:56:37.288804172Z","subsystem":"service","stream id":"301","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","version":"0.1.0","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"begin wait exit","level":"INFO","ts":"2023-09-21T06:56:37.288839379Z","name":"kata-runtime","version":"0.1.0","subsystem":"virt-container","exec_id":"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","container_id":"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170","pid":"1173477"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"rpc call from shim to agent: \\\"signal_process\\\"\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.288297257Z\",\"source\":\"agent\",\"subsystem\":\"rpc\",\"version\":\"0.1.0\",\"name\":\"kata-agent\",\"pid\":\"56\"}","level":"INFO","ts":"2023-09-21T06:56:37.288906957Z","subsystem":"agent","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477","version":"0.1.0"}
Sep 21 14:56:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"{\"msg\":\"signal process\",\"level\":\"INFO\",\"ts\":\"2023-09-21T06:56:37.288316934Z\",\"version\":\"0.1.0\",\"name\":\"kata-agent\",\"pid\":\"56\",\"source\":\"agent\",\"subsystem\":\"rpc\",\"signal\":\"9\",\"exec-id\":\"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\",\"container-id\":\"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\"}","level":"INFO","ts":"2023-09-21T06:56:37.288975998Z","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","pid":"1173477","subsystem":"agent","name":"kata-runtime","version":"0.1.0"}
Sep 21 14:57:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: time="2023-09-21T14:57:37.288310265+08:00" level=error msg="Failed to delete exec process \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\" for container \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\"" error="context deadline exceeded: unknown"
Sep 21 14:57:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: E0921 14:57:37.288361 4624 exec.go:87] error executing command in container: failed to exec in container: failed to start exec "d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095": Others("failed to handler message handler request\n\nCaused by:\n 0: start process\n 1: start\n 2: enter process\n 3: exec process\n 4: rpc status: code: INTERNAL message: \"the file /bin/bash was not found\""): unknown
Sep 21 14:57:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"method handle /containerd.task.v2.Task/Wait got error timed out","level":"ERRO","ts":"2023-09-21T06:57:37.288520212Z","version":"0.1.0","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime","pid":"1173477","subsystem":"root"}
Sep 21 14:57:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"====> task service StateProcess(ContainerProcess { container_id: ContainerID { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\" }, exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", process_type: Exec })","level":"DEBG","ts":"2023-09-21T06:57:37.288586638Z","pid":"1173477","version":"0.1.0","stream id":"413","subsystem":"service","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","name":"kata-runtime"}
Sep 21 14:57:37 iZuf6ir9zx8jfkixmpfxj1Z containerd[4624]: {"msg":"<==== task service StateProcess(ProcessStateInfo { container_id: \"dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", exec_id: \"d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095\", pid: PID { pid: 1173477 }, bundle: \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170\", stdin: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdin\"), stdout: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stdout\"), stderr: Some(\"/run/containerd/io.containerd.grpc.v1.cri/containers/dbf9917fd1b89ddc534c7fb0653784176c0324c45223a82bca7e15fb5b964170/io/3837103425/d8a7bb548961d770985aae53688a5863f53bd03a76af02129e338ff82672c095-stderr\"), terminal: true, status: Stopped, exit_status: 0, exited_at: None })","level":"DEBG","ts":"2023-09-21T06:57:37.288642464Z","name":"kata-runtime","version":"0.1.0","subsystem":"service","pid":"1173477","source":"61b627f7d2cbe2605323218a3e2e75f313ab98941a26a085da341eb5ee5655e1","stream id":"413"}
# Meta details
Running `kata-collect-data.sh` version `3.1.3 (commit ee57732fe08504773b1b5474f2248834ae1fbd66)` at `2023-09-21.11:17:29.853470497+0800`.
---
Runtime is `/usr/bin/kata-runtime`.
# `kata-env`
```toml
[Kernel]
Path = "/opt/kata/share/kata-containers/vmlinux-5.19.2-100"
Parameters = "systemd.unit=kata-containers.target systemd.mask=systemd-networkd.service systemd.mask=systemd-networkd.socket agent.log=debug agent.debug_console agent.debug_console_vport=1026 console=ttyS1 agent.log_vport=1025"
[Meta]
Version = "1.0.26"
[Image]
Path = "/opt/kata/share/kata-containers/kata-containers.img"
[Initrd]
Path = ""
[Hypervisor]
MachineType = ""
Version = "<
# Runtime config files
## Runtime default config files
```
/etc/kata-containers/configuration.toml
/opt/kata/share/defaults/kata-containers/configuration.toml
```
## Runtime config file contents
```toml
# Copyright (c) 2019-2022 Alibaba Cloud
# Copyright (c) 2019-2022 Ant Group
#
# SPDX-License-Identifier: Apache-2.0
#
# XXX: WARNING: this file is auto-generated.
# XXX:
# XXX: Source file: "config/configuration-dragonball.toml.in"
# XXX: Project:
# XXX: Name: Kata Containers
# XXX: Type: kata
[hypervisor.dragonball]
path = ""
ctlpath = ""
kernel = "/opt/kata/share/kata-containers/vmlinux.container"
image = "/opt/kata/share/kata-containers/kata-containers.img"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type="ext4"
# List of valid annotation names for the hypervisor
# Each member of the list is a regular expression, which is the base name
# of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path"
enable_annotations = []
# List of valid annotations values for the hypervisor
# Each member of the list is a path pattern as described by glob(3).
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends: []
valid_hypervisor_paths = []
# List of valid annotations values for ctlpath
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends:
# valid_ctlpaths =
# Optional space-separated list of options to pass to the guest kernel.
# For example, use `kernel_params = "vsyscall=emulate"` if you are having
# trouble running pre-2.15 glibc.
#
# WARNING: - any parameter specified here will take priority over the default
# parameter value of the same name used to start the virtual machine.
# Do not set values here unless you understand the impact of doing so as you
# may stop the virtual machine from booting.
# To see the list of default parameters, enable hypervisor debug, create a
# container and look for 'default-kernel-parameters' log entries.
kernel_params = "console=ttyS1 agent.log_vport=1025"
# Path to the firmware.
# If you want that DB uses the default firmware leave this option empty
firmware = ""
# Default number of vCPUs per SB/VM:
# unspecified or 0 --> will be set to 1
# < 0 --> will be set to the actual number of physical cores
# > 0 <= number of physical cores --> will be set to the specified number
# > number of physical cores --> will be set to the actual number of physical cores
default_vcpus = 1
# Default maximum number of vCPUs per SB/VM:
# unspecified or == 0 --> will be set to the actual number of physical cores or to the maximum number
# of vCPUs supported by KVM if that number is exceeded
# > 0 <= number of physical cores --> will be set to the specified number
# > number of physical cores --> will be set to the actual number of physical cores or to the maximum number
# of vCPUs supported by KVM if that number is exceeded
# WARNING: Depending of the architecture, the maximum number of vCPUs supported by KVM is used when
# the actual number of physical cores is greater than it.
# WARNING: Be aware that this value impacts the virtual machine's memory footprint and CPU
# the hotplug functionality. For example, `default_maxvcpus = 240` specifies that until 240 vCPUs
# can be added to a SB/VM, but the memory footprint will be big. Another example, with
# `default_maxvcpus = 8` the memory footprint will be small, but 8 will be the maximum number of
# vCPUs supported by the SB/VM. In general, we recommend that you do not edit this variable,
# unless you know what are you doing.
default_maxvcpus = 1
# Bridges can be used to hot plug devices.
# Limitations:
# * Currently only pci bridges are supported
# * Until 30 devices per bridge can be hot plugged.
# * Until 5 PCI bridges can be cold plugged per VM.
# This limitation could be a bug in the kernel
# Default number of bridges per SB/VM:
# unspecified or 0 --> will be set to 0
# > 1 <= 5 --> will be set to the specified number
# > 5 --> will be set to 5
default_bridges = 0
# Default memory size in MiB for SB/VM.
# If unspecified then it will be set 2048 MiB.
default_memory = 2048
# Block storage driver to be used for the hypervisor in case the container
# rootfs is backed by a block device. DB only supports virtio-blk.
block_device_driver = "virtio-blk"
# This option changes the default hypervisor and kernel parameters
# to enable debug output where available.
#
# Default false
enable_debug = true
# Disable the customizations done in the runtime when it detects
# that it is running on top a VMM. This will result in the runtime
# behaving as it would when running on bare metal.
#
#disable_nesting_checks = true
# If host doesn't support vhost_net, set to true. Thus we won't create vhost fds for nics.
# Default false
#disable_vhost_net = true
# Path to OCI hook binaries in the *guest rootfs*.
# This does not affect host-side hooks which must instead be added to
# the OCI spec passed to the runtime.
#
# You can create a rootfs with hooks by customizing the osbuilder scripts:
# https://github.com/kata-containers/kata-containers/tree/main/tools/osbuilder
#
# Hooks must be stored in a subdirectory of guest_hook_path according to their
# hook type, i.e. "guest_hook_path/{prestart,poststart,poststop}".
# The agent will scan these directories for executable files and add them, in
# lexicographical order, to the lifecycle of the guest container.
# Hooks are executed in the runtime namespace of the guest. See the official documentation:
# https://github.com/opencontainers/runtime-spec/blob/v1.0.1/config.md#posix-platform-hooks
# Warnings will be logged if any error is encountered while scanning for hooks,
# but it will not abort container execution.
#guest_hook_path = "/usr/share/oci/hooks"
# Shared file system type:
# - inline-virtio-fs (default)
# - virtio-fs
# - virtio-9p
# - virtio-fs-nydus
# "inline-virtio-fs" is the same as "virtio-fs", but it is running in the same process
# of shim, does not need an external virtiofsd process.
shared_fs = "inline-virtio-fs"
# Default size of DAX cache in MiB
virtio_fs_cache_size = 0
# Extra args for virtiofsd daemon
#
# Format example:
# ["-o", "arg1=xxx,arg2", "-o", "hello world", "--arg3=yyy"]
# Examples:
# Set virtiofsd log level to debug : ["-o", "log_level=debug"] or ["-d"]
#
# see `virtiofsd -h` for possible options.
virtio_fs_extra_args = ["--thread-pool-size=1", "-o", "announce_submounts"]
# Cache mode:
#
# - never
# Metadata, data, and pathname lookup are not cached in guest. They are
# always fetched from host and any changes are immediately pushed to host.
#
# - auto
# Metadata and pathname lookup cache expires after a configured amount of
# time (default is 1 second). Data is cached while the file is open (close
# to open consistency).
#
# - always
# Metadata, data, and pathname lookup are cached in guest and never expire.
virtio_fs_cache = "auto"
# Enable huge pages for VM RAM, default false
# Enabling this will result in the VM memory
# being allocated using huge pages.
# This is useful when you want to use vhost-user network
# stacks within the container. This will automatically
# result in memory pre allocation
#enable_hugepages = true
[agent.kata]
container_pipe_size=1
# If enabled, make the agent display debug-level messages.
# (default: disabled)
enable_debug = true
# Enable agent tracing.
#
# If enabled, the agent will generate OpenTelemetry trace spans.
#
# Notes:
#
# - If the runtime also has tracing enabled, the agent spans will be
# associated with the appropriate runtime parent span.
# - If enabled, the runtime will wait for the container to shutdown,
# increasing the container shutdown time slightly.
#
# (default: disabled)
#enable_tracing = true
# Enable debug console.
# If enabled, user can connect guest OS running inside hypervisor
# through "kata-runtime exec
```toml
# Copyright (c) 2017-2019 Intel Corporation
# Copyright (c) 2021 Adobe Inc.
#
# SPDX-License-Identifier: Apache-2.0
#
# XXX: WARNING: this file is auto-generated.
# XXX:
# XXX: Source file: "config/configuration-qemu.toml.in"
# XXX: Project:
# XXX: Name: Kata Containers
# XXX: Type: kata
[hypervisor.qemu]
path = "/opt/kata/bin/qemu-system-x86_64"
kernel = "/opt/kata/share/kata-containers/vmlinux.container"
image = "/opt/kata/share/kata-containers/kata-containers.img"
# initrd = "/opt/kata/share/kata-containers/kata-containers-initrd.img"
machine_type = "q35"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type="ext4"
# Enable confidential guest support.
# Toggling that setting may trigger different hardware features, ranging
# from memory encryption to both memory and CPU-state encryption and integrity.
# The Kata Containers runtime dynamically detects the available feature set and
# aims at enabling the largest possible one, returning an error if none is
# available, or none is supported by the hypervisor.
#
# Known limitations:
# * Does not work by design:
# - CPU Hotplug
# - Memory Hotplug
# - NVDIMM devices
#
# Default false
# confidential_guest = true
# Choose AMD SEV-SNP confidential guests
# In case of using confidential guests on AMD hardware that supports both SEV
# and SEV-SNP, the following enables SEV-SNP guests. SEV guests are default.
# Default false
# sev_snp_guest = true
# Enable running QEMU VMM as a non-root user.
# By default QEMU VMM run as root. When this is set to true, QEMU VMM process runs as
# a non-root random user. See documentation for the limitations of this mode.
# rootless = true
# List of valid annotation names for the hypervisor
# Each member of the list is a regular expression, which is the base name
# of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path"
enable_annotations = ["enable_iommu"]
# List of valid annotations values for the hypervisor
# Each member of the list is a path pattern as described by glob(3).
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends: ["/opt/kata/bin/qemu-system-x86_64"]
valid_hypervisor_paths = ["/opt/kata/bin/qemu-system-x86_64"]
# Optional space-separated list of options to pass to the guest kernel.
# For example, use `kernel_params = "vsyscall=emulate"` if you are having
# trouble running pre-2.15 glibc.
#
# WARNING: - any parameter specified here will take priority over the default
# parameter value of the same name used to start the virtual machine.
# Do not set values here unless you understand the impact of doing so as you
# may stop the virtual machine from booting.
# To see the list of default parameters, enable hypervisor debug, create a
# container and look for 'default-kernel-parameters' log entries.
kernel_params = ""
# Path to the firmware.
# If you want that qemu uses the default firmware leave this option empty
firmware = ""
# Path to the firmware volume.
# firmware TDVF or OVMF can be split into FIRMWARE_VARS.fd (UEFI variables
# as configuration) and FIRMWARE_CODE.fd (UEFI program image). UEFI variables
# can be customized per each user while UEFI code is kept same.
firmware_volume = ""
# Machine accelerators
# comma-separated list of machine accelerators to pass to the hypervisor.
# For example, `machine_accelerators = "nosmm,nosmbus,nosata,nopit,static-prt,nofw"`
machine_accelerators=""
# Qemu seccomp sandbox feature
# comma-separated list of seccomp sandbox features to control the syscall access.
# For example, `seccompsandbox= "on,obsolete=deny,spawn=deny,resourcecontrol=deny"`
# Note: "elevateprivileges=deny" doesn't work with daemonize option, so it's removed from the seccomp sandbox
# Another note: enabling this feature may reduce performance, you may enable
# /proc/sys/net/core/bpf_jit_enable to reduce the impact. see https://man7.org/linux/man-pages/man8/bpfc.8.html
#seccompsandbox="on,obsolete=deny,spawn=deny,resourcecontrol=deny"
# CPU features
# comma-separated list of cpu features to pass to the cpu
# For example, `cpu_features = "pmu=off,vmx=off"
cpu_features="pmu=off"
# Default number of vCPUs per SB/VM:
# unspecified or 0 --> will be set to 1
# < 0 --> will be set to the actual number of physical cores
# > 0 <= number of physical cores --> will be set to the specified number
# > number of physical cores --> will be set to the actual number of physical cores
default_vcpus = 1
# Default maximum number of vCPUs per SB/VM:
# unspecified or == 0 --> will be set to the actual number of physical cores or to the maximum number
# of vCPUs supported by KVM if that number is exceeded
# > 0 <= number of physical cores --> will be set to the specified number
# > number of physical cores --> will be set to the actual number of physical cores or to the maximum number
# of vCPUs supported by KVM if that number is exceeded
# WARNING: Depending of the architecture, the maximum number of vCPUs supported by KVM is used when
# the actual number of physical cores is greater than it.
# WARNING: Be aware that this value impacts the virtual machine's memory footprint and CPU
# the hotplug functionality. For example, `default_maxvcpus = 240` specifies that until 240 vCPUs
# can be added to a SB/VM, but the memory footprint will be big. Another example, with
# `default_maxvcpus = 8` the memory footprint will be small, but 8 will be the maximum number of
# vCPUs supported by the SB/VM. In general, we recommend that you do not edit this variable,
# unless you know what are you doing.
# NOTICE: on arm platform with gicv2 interrupt controller, set it to 8.
default_maxvcpus = 0
# Bridges can be used to hot plug devices.
# Limitations:
# * Currently only pci bridges are supported
# * Until 30 devices per bridge can be hot plugged.
# * Until 5 PCI bridges can be cold plugged per VM.
# This limitation could be a bug in qemu or in the kernel
# Default number of bridges per SB/VM:
# unspecified or 0 --> will be set to 1
# > 1 <= 5 --> will be set to the specified number
# > 5 --> will be set to 5
default_bridges = 1
# Default memory size in MiB for SB/VM.
# If unspecified then it will be set 2048 MiB.
default_memory = 2048
#
# Default memory slots per SB/VM.
# If unspecified then it will be set 10.
# This is will determine the times that memory will be hotadded to sandbox/VM.
#memory_slots = 10
# Default maximum memory in MiB per SB / VM
# unspecified or == 0 --> will be set to the actual amount of physical RAM
# > 0 <= amount of physical RAM --> will be set to the specified number
# > amount of physical RAM --> will be set to the actual amount of physical RAM
default_maxmemory = 0
# The size in MiB will be plused to max memory of hypervisor.
# It is the memory address space for the NVDIMM devie.
# If set block storage driver (block_device_driver) to "nvdimm",
# should set memory_offset to the size of block device.
# Default 0
#memory_offset = 0
# Specifies virtio-mem will be enabled or not.
# Please note that this option should be used with the command
# "echo 1 > /proc/sys/vm/overcommit_memory".
# Default false
#enable_virtio_mem = true
# Disable block device from being used for a container's rootfs.
# In case of a storage driver like devicemapper where a container's
# root file system is backed by a block device, the block device is passed
# directly to the hypervisor for performance reasons.
# This flag prevents the block device from being passed to the hypervisor,
# virtio-fs is used instead to pass the rootfs.
disable_block_device_use = false
# Shared file system type:
# - virtio-fs (default)
# - virtio-9p
# - virtio-fs-nydus
shared_fs = "virtio-fs"
# Path to vhost-user-fs daemon.
virtio_fs_daemon = "/opt/kata/libexec/virtiofsd"
# List of valid annotations values for the virtiofs daemon
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends: ["/opt/kata/libexec/virtiofsd"]
valid_virtio_fs_daemon_paths = ["/opt/kata/libexec/virtiofsd"]
# Default size of DAX cache in MiB
virtio_fs_cache_size = 0
# Default size of virtqueues
virtio_fs_queue_size = 1024
# Extra args for virtiofsd daemon
#
# Format example:
# ["--arg1=xxx", "--arg2=yyy"]
# Examples:
# Set virtiofsd log level to debug : ["--log-level=debug"]
#
# see `virtiofsd -h` for possible options.
virtio_fs_extra_args = ["--thread-pool-size=1", "--announce-submounts"]
# Cache mode:
#
# - never
# Metadata, data, and pathname lookup are not cached in guest. They are
# always fetched from host and any changes are immediately pushed to host.
#
# - auto
# Metadata and pathname lookup cache expires after a configured amount of
# time (default is 1 second). Data is cached while the file is open (close
# to open consistency).
#
# - always
# Metadata, data, and pathname lookup are cached in guest and never expire.
virtio_fs_cache = "auto"
# Block storage driver to be used for the hypervisor in case the container
# rootfs is backed by a block device. This is virtio-scsi, virtio-blk
# or nvdimm.
block_device_driver = "virtio-scsi"
# aio is the I/O mechanism used by qemu
# Options:
#
# - threads
# Pthread based disk I/O.
#
# - native
# Native Linux I/O.
#
# - io_uring
# Linux io_uring API. This provides the fastest I/O operations on Linux, requires kernel>5.1 and
# qemu >=5.0.
block_device_aio = "io_uring"
# Specifies cache-related options will be set to block devices or not.
# Default false
#block_device_cache_set = true
# Specifies cache-related options for block devices.
# Denotes whether use of O_DIRECT (bypass the host page cache) is enabled.
# Default false
#block_device_cache_direct = true
# Specifies cache-related options for block devices.
# Denotes whether flush requests for the device are ignored.
# Default false
#block_device_cache_noflush = true
# Enable iothreads (data-plane) to be used. This causes IO to be
# handled in a separate IO thread. This is currently only implemented
# for SCSI.
#
enable_iothreads = false
# Enable pre allocation of VM RAM, default false
# Enabling this will result in lower container density
# as all of the memory will be allocated and locked
# This is useful when you want to reserve all the memory
# upfront or in the cases where you want memory latencies
# to be very predictable
# Default false
#enable_mem_prealloc = true
# Enable huge pages for VM RAM, default false
# Enabling this will result in the VM memory
# being allocated using huge pages.
# This is useful when you want to use vhost-user network
# stacks within the container. This will automatically
# result in memory pre allocation
#enable_hugepages = true
# Enable vhost-user storage device, default false
# Enabling this will result in some Linux reserved block type
# major range 240-254 being chosen to represent vhost-user devices.
enable_vhost_user_store = false
# The base directory specifically used for vhost-user devices.
# Its sub-path "block" is used for block devices; "block/sockets" is
# where we expect vhost-user sockets to live; "block/devices" is where
# simulated block device nodes for vhost-user devices to live.
vhost_user_store_path = "/var/run/kata-containers/vhost-user"
# Enable vIOMMU, default false
# Enabling this will result in the VM having a vIOMMU device
# This will also add the following options to the kernel's
# command line: intel_iommu=on,iommu=pt
#enable_iommu = true
# Enable IOMMU_PLATFORM, default false
# Enabling this will result in the VM device having iommu_platform=on set
#enable_iommu_platform = true
# List of valid annotations values for the vhost user store path
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends: ["/var/run/kata-containers/vhost-user"]
valid_vhost_user_store_paths = ["/var/run/kata-containers/vhost-user"]
# The timeout for reconnecting on non-server spdk sockets when the remote end goes away.
# qemu will delay this many seconds and then attempt to reconnect.
# Zero disables reconnecting, and the default is zero.
vhost_user_reconnect_timeout_sec = 0
# Enable file based guest memory support. The default is an empty string which
# will disable this feature. In the case of virtio-fs, this is enabled
# automatically and '/dev/shm' is used as the backing folder.
# This option will be ignored if VM templating is enabled.
#file_mem_backend = ""
# List of valid annotations values for the file_mem_backend annotation
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends: [""]
valid_file_mem_backends = [""]
# -pflash can add image file to VM. The arguments of it should be in format
# of ["/path/to/flash0.img", "/path/to/flash1.img"]
pflashes = []
# This option changes the default hypervisor and kernel parameters
# to enable debug output where available. And Debug also enable the hmp socket.
#
# Default false
enable_debug = true
# Disable the customizations done in the runtime when it detects
# that it is running on top a VMM. This will result in the runtime
# behaving as it would when running on bare metal.
#
#disable_nesting_checks = true
# This is the msize used for 9p shares. It is the number of bytes
# used for 9p packet payload.
#msize_9p = 8192
# If false and nvdimm is supported, use nvdimm device to plug guest image.
# Otherwise virtio-block device is used.
#
# nvdimm is not supported when `confidential_guest = true`.
#
# Default is false
#disable_image_nvdimm = true
# VFIO devices are hotplugged on a bridge by default.
# Enable hotplugging on root bus. This may be required for devices with
# a large PCI bar, as this is a current limitation with hotplugging on
# a bridge.
# Default false
#hotplug_vfio_on_root_bus = true
# Before hot plugging a PCIe device, you need to add a pcie_root_port device.
# Use this parameter when using some large PCI bar devices, such as Nvidia GPU
# The value means the number of pcie_root_port
# This value is valid when hotplug_vfio_on_root_bus is true and machine_type is "q35"
# Default 0
#pcie_root_port = 2
# If vhost-net backend for virtio-net is not desired, set to true. Default is false, which trades off
# security (vhost-net runs ring0) for network I/O performance.
#disable_vhost_net = true
#
# Default entropy source.
# The path to a host source of entropy (including a real hardware RNG)
# /dev/urandom and /dev/random are two main options.
# Be aware that /dev/random is a blocking source of entropy. If the host
# runs out of entropy, the VMs boot time will increase leading to get startup
# timeouts.
# The source of entropy /dev/urandom is non-blocking and provides a
# generally acceptable source of entropy. It should work well for pretty much
# all practical purposes.
#entropy_source= "/dev/urandom"
# List of valid annotations values for entropy_source
# The default if not set is empty (all annotations rejected.)
# Your distribution recommends: ["/dev/urandom","/dev/random",""]
valid_entropy_sources = ["/dev/urandom","/dev/random",""]
# Path to OCI hook binaries in the *guest rootfs*.
# This does not affect host-side hooks which must instead be added to
# the OCI spec passed to the runtime.
#
# You can create a rootfs with hooks by customizing the osbuilder scripts:
# https://github.com/kata-containers/kata-containers/tree/main/tools/osbuilder
#
# Hooks must be stored in a subdirectory of guest_hook_path according to their
# hook type, i.e. "guest_hook_path/{prestart,poststart,poststop}".
# The agent will scan these directories for executable files and add them, in
# lexicographical order, to the lifecycle of the guest container.
# Hooks are executed in the runtime namespace of the guest. See the official documentation:
# https://github.com/opencontainers/runtime-spec/blob/v1.0.1/config.md#posix-platform-hooks
# Warnings will be logged if any error is encountered while scanning for hooks,
# but it will not abort container execution.
#guest_hook_path = "/usr/share/oci/hooks"
#
# Use rx Rate Limiter to control network I/O inbound bandwidth(size in bits/sec for SB/VM).
# In Qemu, we use classful qdiscs HTB(Hierarchy Token Bucket) to discipline traffic.
# Default 0-sized value means unlimited rate.
#rx_rate_limiter_max_rate = 0
# Use tx Rate Limiter to control network I/O outbound bandwidth(size in bits/sec for SB/VM).
# In Qemu, we use classful qdiscs HTB(Hierarchy Token Bucket) and ifb(Intermediate Functional Block)
# to discipline traffic.
# Default 0-sized value means unlimited rate.
#tx_rate_limiter_max_rate = 0
# Set where to save the guest memory dump file.
# If set, when GUEST_PANICKED event occurred,
# guest memeory will be dumped to host filesystem under guest_memory_dump_path,
# This directory will be created automatically if it does not exist.
#
# The dumped file(also called vmcore) can be processed with crash or gdb.
#
# WARNING:
# Dump guest’s memory can take very long depending on the amount of guest memory
# and use much disk space.
#guest_memory_dump_path="/var/crash/kata"
# If enable paging.
# Basically, if you want to use "gdb" rather than "crash",
# or need the guest-virtual addresses in the ELF vmcore,
# then you should enable paging.
#
# See: https://www.qemu.org/docs/master/qemu-qmp-ref.html#Dump-guest-memory for details
#guest_memory_dump_paging=false
# Enable swap in the guest. Default false.
# When enable_guest_swap is enabled, insert a raw file to the guest as the swap device
# if the swappiness of a container (set by annotation "io.katacontainers.container.resource.swappiness")
# is bigger than 0.
# The size of the swap device should be
# swap_in_bytes (set by annotation "io.katacontainers.container.resource.swap_in_bytes") - memory_limit_in_bytes.
# If swap_in_bytes is not set, the size should be memory_limit_in_bytes.
# If swap_in_bytes and memory_limit_in_bytes is not set, the size should
# be default_memory.
#enable_guest_swap = true
# use legacy serial for guest console if available and implemented for architecture. Default false
#use_legacy_serial = true
# disable applying SELinux on the VMM process (default false)
disable_selinux=false
# disable applying SELinux on the container process
# If set to false, the type `container_t` is applied to the container process by default.
# Note: To enable guest SELinux, the guest rootfs must be CentOS that is created and built
# with `SELINUX=yes`.
# (default: true)
disable_guest_selinux=true
[factory]
# VM templating support. Once enabled, new VMs are created from template
# using vm cloning. They will share the same initial kernel, initramfs and
# agent memory by mapping it readonly. It helps speeding up new container
# creation and saves a lot of memory if there are many kata containers running
# on the same host.
#
# When disabled, new VMs are created from scratch.
#
# Note: Requires "initrd=" to be set ("image=" is not supported).
#
# Default false
#enable_template = true
# Specifies the path of template.
#
# Default "/run/vc/vm/template"
#template_path = "/run/vc/vm/template"
# The number of caches of VMCache:
# unspecified or == 0 --> VMCache is disabled
# > 0 --> will be set to the specified number
#
# VMCache is a function that creates VMs as caches before using it.
# It helps speed up new container creation.
# The function consists of a server and some clients communicating
# through Unix socket. The protocol is gRPC in protocols/cache/cache.proto.
# The VMCache server will create some VMs and cache them by factory cache.
# It will convert the VM to gRPC format and transport it when gets
# requestion from clients.
# Factory grpccache is the VMCache client. It will request gRPC format
# VM and convert it back to a VM. If VMCache function is enabled,
# kata-runtime will request VM from factory grpccache when it creates
# a new sandbox.
#
# Default 0
#vm_cache_number = 0
# Specify the address of the Unix socket that is used by VMCache.
#
# Default /var/run/kata-containers/cache.sock
#vm_cache_endpoint = "/var/run/kata-containers/cache.sock"
[agent.kata]
# If enabled, make the agent display debug-level messages.
# (default: disabled)
enable_debug = true
# Enable agent tracing.
#
# If enabled, the agent will generate OpenTelemetry trace spans.
#
# Notes:
#
# - If the runtime also has tracing enabled, the agent spans will be
# associated with the appropriate runtime parent span.
# - If enabled, the runtime will wait for the container to shutdown,
# increasing the container shutdown time slightly.
#
# (default: disabled)
#enable_tracing = true
# Comma separated list of kernel modules and their parameters.
# These modules will be loaded in the guest kernel using modprobe(8).
# The following example can be used to load two kernel modules with parameters
# - kernel_modules=["e1000e InterruptThrottleRate=3000,3000,3000 EEE=1", "i915 enable_ppgtt=0"]
# The first word is considered as the module name and the rest as its parameters.
# Container will not be started when:
# * A kernel module is specified and the modprobe command is not installed in the guest
# or it fails loading the module.
# * The module is not available in the guest or it doesn't met the guest kernel
# requirements, like architecture and version.
#
kernel_modules=[]
# Enable debug console.
# If enabled, user can connect guest OS running inside hypervisor
# through "kata-runtime exec
Containerd shim v2 is `/usr/bin/containerd-shim-kata-v2`.
```
Kata Containers containerd shim (Rust): id: io.containerd.kata.v2, version: 3.1.3, commit:
```
# KSM throttler
## version
## systemd service
# Image details
```yaml
---
osbuilder:
url: "https://github.com/kata-containers/kata-containers/tools/osbuilder"
version: "unknown"
rootfs-creation-time: "2023-09-18T13:07:37.331265579+0000Z"
description: "osbuilder rootfs"
file-format-version: "0.0.2"
architecture: "x86_64"
base-distro:
name: "ubuntu"
version: "focal"
packages:
default:
- "chrony"
- "dbus"
- "init"
- "iptables"
extra:
agent:
url: "https://github.com/kata-containers/kata-containers"
name: "kata-agent"
version: "3.1.3"
agent-is-init-daemon: "no"
```
---
# Initrd details
No initrd
---
# Logfiles
## Runtime logs
No recent runtime problems found in system journal.
No recent throttler problems found in system journal.
Recent problems found in system journal:
```
time="2023-09-20T16:20:52.227333616+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.227350158+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.287793955+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.287840252+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.287867283+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.287893032+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.348166377+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.348207264+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.348234856+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.348261497+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.408542015+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.408567994+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.408586068+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.408601337+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.468862428+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.468891673+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.468912243+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.468929275+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.529290766+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.52932977+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.529377711+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.529405443+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.589680992+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.589718072+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.589747748+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.589773096+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.650021503+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.650048244+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.650064605+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.650081196+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.710432208+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.710475049+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.710504454+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:20:52.71053386+08:00" level=error msg="warning: KVM_GET_DEVICE_ATTR(0, KVM_X86_XCOMP_GUEST_SUPP) error: -22" name=containerd-shim-v2 pid=4146622 qemuPid=4146634 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers/hypervisor subsystem=qemu
time="2023-09-20T16:21:26.777494032+08:00" level=warning msg="notify on errors" error="failed to ping agent: Failed to Check if grpc server is working: context deadline exceeded" sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers subsystem=virtcontainers/monitor
time="2023-09-20T16:21:26.777608358+08:00" level=warning msg="write error to watcher" error="failed to ping agent: Failed to Check if grpc server is working: context deadline exceeded" sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers subsystem=virtcontainers/monitor
time="2023-09-20T16:21:26.777755907+08:00" level=error msg="Wait for process failed" container=2dcd03056a439a41ed5eb467affee699c3662c6c3edeae681d8dbbd063cb64e5 error="Dead agent" name=containerd-shim-v2 pid=2dcd03056a439a41ed5eb467affee699c3662c6c3edeae681d8dbbd063cb64e5 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=containerd-kata-shim-v2
time="2023-09-20T16:21:26.777923104+08:00" level=error msg="Wait for process failed" container=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee error="ttrpc: closed" name=containerd-shim-v2 pid=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=containerd-kata-shim-v2
time="2023-09-20T16:21:26.77807439+08:00" level=warning msg="notify on errors" error="failed to ping agent: Failed to Check if grpc server is working: Dead agent" sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers subsystem=virtcontainers/monitor
time="2023-09-20T16:21:26.778119506+08:00" level=warning msg="write error to watcher" error="failed to ping agent: Failed to Check if grpc server is working: Dead agent" sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers subsystem=virtcontainers/monitor
time="2023-09-20T16:21:26.783257353+08:00" level=warning msg="Agent did not stop sandbox" error="Dead agent" name=containerd-shim-v2 pid=4146622 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee sandboxid=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers subsystem=sandbox
time="2023-09-20T16:21:26.783824207+08:00" level=error msg="Failed to read guest console logs" console-protocol=unix console-url=/run/vc/vm/9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee/console.sock error="read unix @->/run/vc/vm/9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee/console.sock: use of closed network connection" name=containerd-shim-v2 pid=4146622 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=virtcontainers subsystem=sandbox
time="2023-09-20T16:21:26.956400913+08:00" level=warning msg="sandbox stopped unexpectedly" error="failed to ping agent: Failed to Check if grpc server is working: context deadline exceeded" name=containerd-shim-v2 pid=4146622 sandbox=9cf4582007db718af70ba7102001be83af5c5e873f74f03b968369e69d98ebee source=containerd-kata-shim-v2
time="2023-09-20T16:21:26.956870512+08:00" level=error msg="failed to cleanup the &{%!s(*cgroups.cgroup=&{0xbdf700 [0xc00042e780 0xc00004adf0 0xc00004ae50 0xc00004ae70 0xc000121e90 0xc00042e7a0] {0 0}
# Container manager details
## Kubernetes
```
Client Version: version.Info{Major:"1", Minor:"20+", GitVersion:"v1.20.11-aliyun.1", GitCommit:"757dfe7e010afcfa31591df65f26b4b80540975e", GitTreeState:"clean", BuildDate:"2022-04-20T07:51:09Z", GoVersion:"go1.15.15", Compiler:"gc", Platform:"linux/amd64"}
The connection to the server localhost:8080 was refused - did you specify the right host or port?
```
```
apiVersion: v1
clusters: null
contexts: null
current-context: ""
kind: Config
preferences: {}
users: null
```
```
Type=simple
Restart=always
NotifyAccess=none
RestartUSec=10s
TimeoutStartUSec=1min 30s
TimeoutStopUSec=1min 30s
RuntimeMaxUSec=infinity
WatchdogUSec=0
WatchdogTimestamp=Wed 2023-09-20 19:59:38 CST
WatchdogTimestampMonotonic=12233132
PermissionsStartOnly=no
RootDirectoryStartOnly=no
RemainAfterExit=no
GuessMainPID=yes
MainPID=4836
ControlPID=0
FileDescriptorStoreMax=0
NFileDescriptorStore=0
StatusErrno=0
Result=success
UID=[not set]
GID=[not set]
NRestarts=0
ExecMainStartTimestamp=Wed 2023-09-20 19:59:38 CST
ExecMainStartTimestampMonotonic=12233111
ExecMainExitTimestampMonotonic=0
ExecMainPID=4836
ExecMainCode=0
ExecMainStatus=0
ExecStart={ path=/usr/bin/kubelet ; argv[]=/usr/bin/kubelet $KUBELET_KUBECONFIG_ARGS $KUBELET_SYSTEM_PODS_ARGS $KUBELET_NETWORK_ARGS $KUBELET_DNS_ARGS $KUBELET_AUTHZ_ARGS $KUBELET_CGROUP_ARGS $KUBELET_CERTIFICATE_ARGS $KUBELET_EXTRA_ARGS $KUBELET_CUSTOMIZED_ARGS --container-runtime=remote --container-runtime-endpoint=/var/run/containerd/containerd.sock ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }
Slice=system.slice
ControlGroup=/system.slice/kubelet.service
MemoryCurrent=271073280
CPUUsageNSec=[not set]
EffectiveCPUs=
EffectiveMemoryNodes=
TasksCurrent=159
IPIngressBytes=18446744073709551615
IPIngressPackets=18446744073709551615
IPEgressBytes=18446744073709551615
IPEgressPackets=18446744073709551615
Delegate=no
CPUAccounting=no
CPUWeight=[not set]
StartupCPUWeight=[not set]
CPUShares=[not set]
StartupCPUShares=[not set]
CPUQuotaPerSecUSec=infinity
CPUQuotaPeriodUSec=infinity
AllowedCPUs=
AllowedMemoryNodes=
IOAccounting=no
IOWeight=[not set]
StartupIOWeight=[not set]
BlockIOAccounting=no
BlockIOWeight=[not set]
StartupBlockIOWeight=[not set]
MemoryAccounting=yes
DefaultMemoryLow=0
DefaultMemoryMin=0
MemoryMin=0
MemoryLow=0
MemoryHigh=infinity
MemoryMax=infinity
MemorySwapMax=infinity
MemoryLimit=infinity
DevicePolicy=auto
TasksAccounting=yes
TasksMax=3298223
IPAccounting=no
Environment=GODEBUG=madvdontneed=1 KUBELET_EXTRA_ARGS=--node-labels=alibabacloud.com/nodepool-id=np61a945d250984d87ae5094a7378e69d9,ack.aliyun.com=cc18c5c6ed8bf4fa9bf2606866014e441 [unprintable] [unprintable] [unprintable] [unprintable] [unprintable] KUBELET_CGROUP_ARGS=--cgroup-driver=systemd [unprintable]
EnvironmentFiles=/etc/kubernetes/kubelet-customized-args.conf (ignore_errors=yes)
UMask=0022
LimitCPU=infinity
LimitCPUSoft=infinity
LimitFSIZE=infinity
LimitFSIZESoft=infinity
LimitDATA=infinity
LimitDATASoft=infinity
LimitSTACK=infinity
LimitSTACKSoft=8388608
LimitCORE=infinity
LimitCORESoft=0
LimitRSS=infinity
LimitRSSSoft=infinity
LimitNOFILE=262144
LimitNOFILESoft=1024
LimitAS=infinity
LimitASSoft=infinity
LimitNPROC=2061389
LimitNPROCSoft=2061389
LimitMEMLOCK=65536
LimitMEMLOCKSoft=65536
LimitLOCKS=infinity
LimitLOCKSSoft=infinity
LimitSIGPENDING=2061389
LimitSIGPENDINGSoft=2061389
LimitMSGQUEUE=819200
LimitMSGQUEUESoft=819200
LimitNICE=0
LimitNICESoft=0
LimitRTPRIO=0
LimitRTPRIOSoft=0
LimitRTTIME=infinity
LimitRTTIMESoft=infinity
OOMScoreAdjust=0
Nice=0
IOSchedulingClass=0
IOSchedulingPriority=0
CPUSchedulingPolicy=0
CPUSchedulingPriority=0
CPUAffinity=
CPUAffinityFromNUMA=no
NUMAPolicy=n/a
NUMAMask=
TimerSlackNSec=50000
CPUSchedulingResetOnFork=no
NonBlocking=no
StandardInput=null
StandardInputData=
StandardOutput=journal
StandardError=inherit
TTYReset=no
TTYVHangup=no
TTYVTDisallocate=no
SyslogPriority=30
SyslogLevelPrefix=yes
SyslogLevel=6
SyslogFacility=3
LogLevelMax=-1
LogRateLimitIntervalUSec=0
LogRateLimitBurst=0
SecureBits=0
CapabilityBoundingSet=cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read 0x26 0x27
AmbientCapabilities=
DynamicUser=no
RemoveIPC=no
MountFlags=
PrivateTmp=no
PrivateDevices=no
ProtectKernelTunables=no
ProtectKernelModules=no
ProtectControlGroups=no
PrivateNetwork=no
PrivateUsers=no
PrivateMounts=no
ProtectHome=no
ProtectSystem=no
SameProcessGroup=no
UtmpMode=init
IgnoreSIGPIPE=yes
NoNewPrivileges=no
SystemCallErrorNumber=0
LockPersonality=no
RuntimeDirectoryPreserve=no
RuntimeDirectoryMode=0755
StateDirectoryMode=0755
CacheDirectoryMode=0755
LogsDirectoryMode=0755
ConfigurationDirectoryMode=0755
MemoryDenyWriteExecute=no
RestrictRealtime=no
RestrictSUIDSGID=no
RestrictNamespaces=no
MountAPIVFS=no
KeyringMode=private
KillMode=control-group
KillSignal=15
SendSIGKILL=yes
SendSIGHUP=no
Id=kubelet.service
Names=kubelet.service
Requires=sysinit.target system.slice
WantedBy=multi-user.target
Conflicts=shutdown.target
Before=shutdown.target multi-user.target
After=basic.target docker.service systemd-journald.socket system.slice sysinit.target containerd.service
Documentation=http://kubernetes.io/docs/
Description=kubelet: The Kubernetes Node Agent
LoadState=loaded
ActiveState=active
FreezerState=running
SubState=running
FragmentPath=/etc/systemd/system/kubelet.service
DropInPaths=/etc/systemd/system/kubelet.service.d/10-kubeadm.conf
UnitFileState=enabled
UnitFilePreset=enabled
StateChangeTimestamp=Wed 2023-09-20 19:59:38 CST
StateChangeTimestampMonotonic=12233132
InactiveExitTimestamp=Wed 2023-09-20 19:59:38 CST
InactiveExitTimestampMonotonic=12233132
ActiveEnterTimestamp=Wed 2023-09-20 19:59:38 CST
ActiveEnterTimestampMonotonic=12233132
ActiveExitTimestampMonotonic=0
InactiveEnterTimestampMonotonic=0
CanStart=yes
CanStop=yes
CanReload=no
CanIsolate=no
CanFreeze=yes
StopWhenUnneeded=no
RefuseManualStart=no
RefuseManualStop=no
AllowIsolate=no
DefaultDependencies=yes
OnFailureJobMode=replace
IgnoreOnIsolate=no
NeedDaemonReload=no
JobTimeoutUSec=infinity
JobRunningTimeoutUSec=infinity
JobTimeoutAction=none
ConditionResult=yes
AssertResult=yes
ConditionTimestamp=Wed 2023-09-20 19:59:38 CST
ConditionTimestampMonotonic=12230416
AssertTimestamp=Wed 2023-09-20 19:59:38 CST
AssertTimestampMonotonic=12230416
Transient=no
Perpetual=no
StartLimitIntervalUSec=0
StartLimitBurst=5
StartLimitAction=none
FailureAction=none
SuccessAction=none
InvocationID=6de74862e3b64e1c9fd217d5dfff9a15
CollectMode=inactive
```
## containerd
```
containerd containerd.io 1.5.13 a17ec496a95e55601607ca50828147e8ccaeebf1
```
```
Type=notify
Restart=always
NotifyAccess=main
RestartUSec=5s
TimeoutStartUSec=1min 30s
TimeoutStopUSec=1min 30s
RuntimeMaxUSec=infinity
WatchdogUSec=0
WatchdogTimestamp=Wed 2023-09-20 19:59:38 CST
WatchdogTimestampMonotonic=12230317
PermissionsStartOnly=no
RootDirectoryStartOnly=no
RemainAfterExit=no
GuessMainPID=yes
MainPID=4624
ControlPID=0
FileDescriptorStoreMax=0
NFileDescriptorStore=0
StatusErrno=0
Result=success
UID=[not set]
GID=[not set]
NRestarts=0
ExecMainStartTimestamp=Wed 2023-09-20 19:59:37 CST
ExecMainStartTimestampMonotonic=12053195
ExecMainExitTimestampMonotonic=0
ExecMainPID=4624
ExecMainCode=0
ExecMainStatus=0
ExecStartPre={ path=/sbin/modprobe ; argv[]=/sbin/modprobe overlay ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }
ExecStart={ path=/usr/bin/containerd ; argv[]=/usr/bin/containerd ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }
Slice=system.slice
ControlGroup=/system.slice/containerd.service
MemoryCurrent=587059200
CPUUsageNSec=[not set]
EffectiveCPUs=
EffectiveMemoryNodes=
TasksCurrent=393
IPIngressBytes=18446744073709551615
IPIngressPackets=18446744073709551615
IPEgressBytes=18446744073709551615
IPEgressPackets=18446744073709551615
Delegate=yes
DelegateControllers=cpu cpuacct cpuset io blkio memory devices pids
CPUAccounting=no
CPUWeight=[not set]
StartupCPUWeight=[not set]
CPUShares=[not set]
StartupCPUShares=[not set]
CPUQuotaPerSecUSec=infinity
CPUQuotaPeriodUSec=infinity
AllowedCPUs=
AllowedMemoryNodes=
IOAccounting=no
IOWeight=[not set]
StartupIOWeight=[not set]
BlockIOAccounting=no
BlockIOWeight=[not set]
StartupBlockIOWeight=[not set]
MemoryAccounting=yes
DefaultMemoryLow=0
DefaultMemoryMin=0
MemoryMin=0
MemoryLow=0
MemoryHigh=infinity
MemoryMax=infinity
MemorySwapMax=infinity
MemoryLimit=infinity
DevicePolicy=auto
TasksAccounting=yes
TasksMax=infinity
IPAccounting=no
UMask=0022
LimitCPU=infinity
LimitCPUSoft=infinity
LimitFSIZE=infinity
LimitFSIZESoft=infinity
LimitDATA=infinity
LimitDATASoft=infinity
LimitSTACK=infinity
LimitSTACKSoft=8388608
LimitCORE=infinity
LimitCORESoft=infinity
LimitRSS=infinity
LimitRSSSoft=infinity
LimitNOFILE=1048576
LimitNOFILESoft=1048576
LimitAS=infinity
LimitASSoft=infinity
LimitNPROC=infinity
LimitNPROCSoft=infinity
LimitMEMLOCK=65536
LimitMEMLOCKSoft=65536
LimitLOCKS=infinity
LimitLOCKSSoft=infinity
LimitSIGPENDING=2061389
LimitSIGPENDINGSoft=2061389
LimitMSGQUEUE=819200
LimitMSGQUEUESoft=819200
LimitNICE=0
LimitNICESoft=0
LimitRTPRIO=0
LimitRTPRIOSoft=0
LimitRTTIME=infinity
LimitRTTIMESoft=infinity
OOMScoreAdjust=-999
Nice=0
IOSchedulingClass=0
IOSchedulingPriority=0
CPUSchedulingPolicy=0
CPUSchedulingPriority=0
CPUAffinity=
CPUAffinityFromNUMA=no
NUMAPolicy=n/a
NUMAMask=
TimerSlackNSec=50000
CPUSchedulingResetOnFork=no
NonBlocking=no
StandardInput=null
StandardInputData=
StandardOutput=journal
StandardError=inherit
TTYReset=no
TTYVHangup=no
TTYVTDisallocate=no
SyslogPriority=30
SyslogLevelPrefix=yes
SyslogLevel=6
SyslogFacility=3
LogLevelMax=-1
LogRateLimitIntervalUSec=0
LogRateLimitBurst=0
SecureBits=0
CapabilityBoundingSet=cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read 0x26 0x27
AmbientCapabilities=
DynamicUser=no
RemoveIPC=no
MountFlags=
PrivateTmp=no
PrivateDevices=no
ProtectKernelTunables=no
ProtectKernelModules=no
ProtectControlGroups=no
PrivateNetwork=no
PrivateUsers=no
PrivateMounts=no
ProtectHome=no
ProtectSystem=no
SameProcessGroup=no
UtmpMode=init
IgnoreSIGPIPE=yes
NoNewPrivileges=no
SystemCallErrorNumber=0
LockPersonality=no
RuntimeDirectoryPreserve=no
RuntimeDirectoryMode=0755
StateDirectoryMode=0755
CacheDirectoryMode=0755
LogsDirectoryMode=0755
ConfigurationDirectoryMode=0755
MemoryDenyWriteExecute=no
RestrictRealtime=no
RestrictSUIDSGID=no
RestrictNamespaces=no
MountAPIVFS=no
KeyringMode=private
KillMode=process
KillSignal=15
SendSIGKILL=yes
SendSIGHUP=no
Id=containerd.service
Names=containerd.service
Requires=sysinit.target system.slice
WantedBy=multi-user.target
Conflicts=shutdown.target
Before=kubelet.service shutdown.target multi-user.target
After=sysinit.target system.slice systemd-journald.socket basic.target network.target local-fs.target
Documentation=https://containerd.io
Description=containerd container runtime
LoadState=loaded
ActiveState=active
FreezerState=running
SubState=running
FragmentPath=/etc/systemd/system/containerd.service
UnitFileState=enabled
UnitFilePreset=enabled
StateChangeTimestamp=Wed 2023-09-20 19:59:38 CST
StateChangeTimestampMonotonic=12230317
InactiveExitTimestamp=Wed 2023-09-20 19:59:37 CST
InactiveExitTimestampMonotonic=12036811
ActiveEnterTimestamp=Wed 2023-09-20 19:59:38 CST
ActiveEnterTimestampMonotonic=12230317
ActiveExitTimestampMonotonic=0
InactiveEnterTimestampMonotonic=0
CanStart=yes
CanStop=yes
CanReload=no
CanIsolate=no
CanFreeze=yes
StopWhenUnneeded=no
RefuseManualStart=no
RefuseManualStop=no
AllowIsolate=no
DefaultDependencies=yes
OnFailureJobMode=replace
IgnoreOnIsolate=no
NeedDaemonReload=no
JobTimeoutUSec=infinity
JobRunningTimeoutUSec=infinity
JobTimeoutAction=none
ConditionResult=yes
AssertResult=yes
ConditionTimestamp=Wed 2023-09-20 19:59:37 CST
ConditionTimestampMonotonic=12035694
AssertTimestamp=Wed 2023-09-20 19:59:37 CST
AssertTimestampMonotonic=12035694
Transient=no
Perpetual=no
StartLimitIntervalUSec=10s
StartLimitBurst=5
StartLimitAction=none
FailureAction=none
SuccessAction=none
InvocationID=8bc2951823604b6889dc02f2f8556851
CollectMode=inactive
```
```toml
version = 2
root = "/var/lib/containerd"
state = "/run/containerd"
disabled_plugins = []
required_plugins = ["io.containerd.grpc.v1.cri"]
oom_score = -999
# Alibaba Cloud Vendor enhancement configuration
# imports = ["/etc/containerd/alibabacloud.toml"]
[grpc]
address = "/run/containerd/containerd.sock"
max_recv_message_size = 16777216
max_send_message_size = 16777216
[debug]
address = "/run/containerd/debug.sock"
level = "debug"
[timeouts]
"io.containerd.timeout.shim.cleanup" = "5s"
"io.containerd.timeout.shim.load" = "5s"
"io.containerd.timeout.shim.shutdown" = "3s"
"io.containerd.timeout.task.state" = "2s"
[plugins]
[plugins."io.containerd.gc.v1.scheduler"]
pause_threshold = 0.02
deletion_threshold = 0
mutation_threshold = 100
schedule_delay = "0s"
startup_delay = "100ms"
[plugins."io.containerd.grpc.v1.cri"]
sandbox_image = "registry-vpc.cn-shanghai.aliyuncs.com/acs/pause:3.5"
ignore_image_defined_volumes = true
[plugins."io.containerd.grpc.v1.cri".containerd]
snapshotter = "overlayfs"
disable_snapshot_annotations = true
discard_unpacked_layers = false
default_runtime_name = "runc"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes]
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.kata]
runtime_type = "io.containerd.kata.v2"
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc]
runtime_type = "io.containerd.runc.v2"
privileged_without_host_devices = false
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc.options]
NoPivotRoot = false
NoNewKeyring = false
SystemdCgroup = true
[plugins."io.containerd.grpc.v1.cri".cni]
bin_dir = "/opt/cni/bin"
conf_dir = "/etc/cni/net.d"
max_conf_num = 1
[plugins."io.containerd.grpc.v1.cri".registry]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
endpoint = ["https://registry-1.docker.io"]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker-reg.devops.xiaohongshu.com"]
endpoint = ["http://10.144.9.221:7071","https://docker-reg.devops.xiaohongshu.com"]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."artifactory-hz.devops.xiaohongshu.com"]
endpoint = ["http://10.144.9.221:7071","https://artifactory-hz.devops.xiaohongshu.com"]
[plugins."io.containerd.internal.v1.opt"]
path = "/opt/containerd"
[plugins."io.containerd.internal.v1.restart"]
interval = "10s"
[plugins."io.containerd.metadata.v1.bolt"]
content_sharing_policy = "shared"
```
# Packages
No `dpkg`
Have `rpm`
```
```
Kata Monitor `kata-monitor`.
```
kata-monitor
Version: 0.3.0
Go version: go1.19.3
Git commit: ee57732fe08504773b1b5474f2248834ae1fbd66
OS/Arch: linux/amd64
```
Runtime
/usr/bin/kata-runtime kata-env
Runtime config files
cat "/etc/kata-containers/configuration.toml"
cat "/opt/kata/share/defaults/kata-containers/configuration.toml"
Containerd shim v2
containerd-shim-kata-v2 --version
KSM throttler
Image details
Initrd details
Logfiles
Runtime logs
Throttler logs
Kata Containerd Shim v2
Container manager details
Kubernetes
kubectl version
kubectl config view
systemctl show kubelet
containerd
containerd --version
systemctl show containerd
cat /etc/containerd/config.toml
Packages
rpm -qa|egrep "(cc-oci-runtime|cc-runtime|runv|kata-runtime|kata-ksm-throttler|kata-containers-image|linux-container|qemu-)"
Kata Monitor
kata-monitor --version