Oct 2 19:20:23.045524 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:20:23.045558 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:20:23.045572 kernel: BIOS-provided physical RAM map: Oct 2 19:20:23.045582 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 2 19:20:23.045592 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Oct 2 19:20:23.045602 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Oct 2 19:20:23.045619 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Oct 2 19:20:23.045629 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Oct 2 19:20:23.045640 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Oct 2 19:20:23.045651 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Oct 2 19:20:23.045661 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Oct 2 19:20:23.045672 kernel: printk: bootconsole [earlyser0] enabled Oct 2 19:20:23.045682 kernel: NX (Execute Disable) protection: active Oct 2 19:20:23.045693 kernel: efi: EFI v2.70 by Microsoft Oct 2 19:20:23.045710 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5caa98 RNG=0x3ffd1018 Oct 2 19:20:23.045722 kernel: random: crng init done Oct 2 19:20:23.045733 kernel: SMBIOS 3.1.0 present. Oct 2 19:20:23.045744 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 Oct 2 19:20:23.045769 kernel: Hypervisor detected: Microsoft Hyper-V Oct 2 19:20:23.045780 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Oct 2 19:20:23.045791 kernel: Hyper-V Host Build:20348-10.0-1-0.1462 Oct 2 19:20:23.045803 kernel: Hyper-V: Nested features: 0x1e0101 Oct 2 19:20:23.045817 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Oct 2 19:20:23.045827 kernel: Hyper-V: Using hypercall for remote TLB flush Oct 2 19:20:23.045839 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Oct 2 19:20:23.045851 kernel: tsc: Marking TSC unstable due to running on Hyper-V Oct 2 19:20:23.045863 kernel: tsc: Detected 2593.906 MHz processor Oct 2 19:20:23.045875 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:20:23.045888 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:20:23.045899 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Oct 2 19:20:23.045911 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:20:23.045923 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Oct 2 19:20:23.045938 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Oct 2 19:20:23.045950 kernel: Using GB pages for direct mapping Oct 2 19:20:23.045962 kernel: Secure boot disabled Oct 2 19:20:23.045973 kernel: ACPI: Early table checksum verification disabled Oct 2 19:20:23.045985 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Oct 2 19:20:23.045997 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046008 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046021 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 19:20:23.046040 kernel: ACPI: FACS 0x000000003FFFE000 000040 Oct 2 19:20:23.046053 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046066 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046078 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046091 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046104 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046119 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046133 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:20:23.046145 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Oct 2 19:20:23.046158 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Oct 2 19:20:23.046171 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Oct 2 19:20:23.046183 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Oct 2 19:20:23.046196 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Oct 2 19:20:23.046208 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Oct 2 19:20:23.046224 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Oct 2 19:20:23.046237 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Oct 2 19:20:23.046249 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Oct 2 19:20:23.046261 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Oct 2 19:20:23.046273 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:20:23.046285 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:20:23.046298 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Oct 2 19:20:23.046310 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Oct 2 19:20:23.046322 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Oct 2 19:20:23.046337 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Oct 2 19:20:23.046348 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Oct 2 19:20:23.046359 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Oct 2 19:20:23.046371 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Oct 2 19:20:23.046382 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Oct 2 19:20:23.046393 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Oct 2 19:20:23.046405 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Oct 2 19:20:23.046416 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Oct 2 19:20:23.046428 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Oct 2 19:20:23.046443 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Oct 2 19:20:23.046455 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Oct 2 19:20:23.046467 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Oct 2 19:20:23.046479 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Oct 2 19:20:23.046491 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Oct 2 19:20:23.046503 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Oct 2 19:20:23.046515 kernel: Zone ranges: Oct 2 19:20:23.046528 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:20:23.046541 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:20:23.046558 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:20:23.046571 kernel: Movable zone start for each node Oct 2 19:20:23.046584 kernel: Early memory node ranges Oct 2 19:20:23.046598 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Oct 2 19:20:23.046610 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Oct 2 19:20:23.046623 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Oct 2 19:20:23.046636 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:20:23.046650 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Oct 2 19:20:23.046664 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:20:23.046681 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Oct 2 19:20:23.046695 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Oct 2 19:20:23.046708 kernel: ACPI: PM-Timer IO Port: 0x408 Oct 2 19:20:23.046721 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Oct 2 19:20:23.046734 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:20:23.046747 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:20:23.046790 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:20:23.046802 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Oct 2 19:20:23.046813 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:20:23.046827 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Oct 2 19:20:23.046839 kernel: Booting paravirtualized kernel on Hyper-V Oct 2 19:20:23.046850 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:20:23.046862 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:20:23.046873 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:20:23.046884 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:20:23.046896 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:20:23.046908 kernel: Hyper-V: PV spinlocks enabled Oct 2 19:20:23.046920 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:20:23.046936 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Oct 2 19:20:23.046948 kernel: Policy zone: Normal Oct 2 19:20:23.046961 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:20:23.046974 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:20:23.046985 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:20:23.046996 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:20:23.047007 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:20:23.047019 kernel: Memory: 8081148K/8387460K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 306052K reserved, 0K cma-reserved) Oct 2 19:20:23.047034 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:20:23.047046 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:20:23.047067 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:20:23.047082 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:20:23.047095 kernel: rcu: RCU event tracing is enabled. Oct 2 19:20:23.047108 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:20:23.047121 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:20:23.047133 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:20:23.047145 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:20:23.047158 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:20:23.047171 kernel: Using NULL legacy PIC Oct 2 19:20:23.047186 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Oct 2 19:20:23.047198 kernel: Console: colour dummy device 80x25 Oct 2 19:20:23.047211 kernel: printk: console [tty1] enabled Oct 2 19:20:23.047224 kernel: printk: console [ttyS0] enabled Oct 2 19:20:23.047236 kernel: printk: bootconsole [earlyser0] disabled Oct 2 19:20:23.047251 kernel: ACPI: Core revision 20210730 Oct 2 19:20:23.047263 kernel: Failed to register legacy timer interrupt Oct 2 19:20:23.047275 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:20:23.047288 kernel: Hyper-V: Using IPI hypercalls Oct 2 19:20:23.047301 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Oct 2 19:20:23.047314 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:20:23.047327 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:20:23.047340 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:20:23.047353 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:20:23.047366 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:20:23.047381 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:20:23.047394 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:20:23.047406 kernel: RETBleed: Vulnerable Oct 2 19:20:23.047419 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:20:23.047432 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:20:23.047445 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:20:23.047457 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:20:23.047470 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:20:23.047482 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:20:23.047495 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:20:23.047511 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:20:23.047524 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:20:23.047536 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:20:23.047549 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:20:23.047562 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Oct 2 19:20:23.047574 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Oct 2 19:20:23.047588 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Oct 2 19:20:23.047601 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Oct 2 19:20:23.047614 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:20:23.047627 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:20:23.047640 kernel: LSM: Security Framework initializing Oct 2 19:20:23.047652 kernel: SELinux: Initializing. Oct 2 19:20:23.047667 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:20:23.047680 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:20:23.047693 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:20:23.047706 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:20:23.047720 kernel: signal: max sigframe size: 3632 Oct 2 19:20:23.047732 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:20:23.047746 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:20:23.047776 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:20:23.047790 kernel: x86: Booting SMP configuration: Oct 2 19:20:23.047802 kernel: .... node #0, CPUs: #1 Oct 2 19:20:23.047819 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Oct 2 19:20:23.047834 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:20:23.047847 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:20:23.047861 kernel: smpboot: Max logical packages: 1 Oct 2 19:20:23.047873 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Oct 2 19:20:23.047886 kernel: devtmpfs: initialized Oct 2 19:20:23.047899 kernel: x86/mm: Memory block size: 128MB Oct 2 19:20:23.047911 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Oct 2 19:20:23.047927 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:20:23.047941 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:20:23.047954 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:20:23.047967 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:20:23.047981 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:20:23.047995 kernel: audit: type=2000 audit(1696274421.024:1): state=initialized audit_enabled=0 res=1 Oct 2 19:20:23.048008 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:20:23.048021 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:20:23.048034 kernel: cpuidle: using governor menu Oct 2 19:20:23.048049 kernel: ACPI: bus type PCI registered Oct 2 19:20:23.048062 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:20:23.048076 kernel: dca service started, version 1.12.1 Oct 2 19:20:23.048088 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:20:23.048101 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:20:23.048115 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:20:23.048128 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:20:23.048141 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:20:23.048154 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:20:23.048170 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:20:23.048182 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:20:23.048196 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:20:23.048210 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:20:23.048224 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:20:23.048238 kernel: ACPI: Interpreter enabled Oct 2 19:20:23.048251 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:20:23.048265 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:20:23.048277 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:20:23.048293 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Oct 2 19:20:23.048305 kernel: iommu: Default domain type: Translated Oct 2 19:20:23.048318 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:20:23.048330 kernel: vgaarb: loaded Oct 2 19:20:23.048343 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:20:23.048356 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:20:23.048368 kernel: PTP clock support registered Oct 2 19:20:23.048381 kernel: Registered efivars operations Oct 2 19:20:23.048393 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:20:23.048407 kernel: PCI: System does not support PCI Oct 2 19:20:23.048421 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Oct 2 19:20:23.048434 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:20:23.048447 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:20:23.048460 kernel: pnp: PnP ACPI init Oct 2 19:20:23.048473 kernel: pnp: PnP ACPI: found 3 devices Oct 2 19:20:23.048486 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:20:23.048498 kernel: NET: Registered PF_INET protocol family Oct 2 19:20:23.048511 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:20:23.048527 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:20:23.048540 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:20:23.048553 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:20:23.048566 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:20:23.048580 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:20:23.048592 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:20:23.048606 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:20:23.048619 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:20:23.048631 kernel: NET: Registered PF_XDP protocol family Oct 2 19:20:23.048647 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:20:23.048660 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:20:23.048673 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Oct 2 19:20:23.048687 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:20:23.048700 kernel: Initialise system trusted keyrings Oct 2 19:20:23.048713 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:20:23.048726 kernel: Key type asymmetric registered Oct 2 19:20:23.048739 kernel: Asymmetric key parser 'x509' registered Oct 2 19:20:23.048768 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:20:23.048791 kernel: io scheduler mq-deadline registered Oct 2 19:20:23.048804 kernel: io scheduler kyber registered Oct 2 19:20:23.048817 kernel: io scheduler bfq registered Oct 2 19:20:23.048830 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:20:23.048843 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:20:23.048857 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:20:23.048870 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:20:23.048883 kernel: i8042: PNP: No PS/2 controller found. Oct 2 19:20:23.049053 kernel: rtc_cmos 00:02: registered as rtc0 Oct 2 19:20:23.049171 kernel: rtc_cmos 00:02: setting system clock to 2023-10-02T19:20:22 UTC (1696274422) Oct 2 19:20:23.049282 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Oct 2 19:20:23.049299 kernel: fail to initialize ptp_kvm Oct 2 19:20:23.049313 kernel: intel_pstate: CPU model not supported Oct 2 19:20:23.049325 kernel: efifb: probing for efifb Oct 2 19:20:23.049338 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 19:20:23.049351 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 19:20:23.049364 kernel: efifb: scrolling: redraw Oct 2 19:20:23.049381 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 19:20:23.049393 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:20:23.049407 kernel: fb0: EFI VGA frame buffer device Oct 2 19:20:23.049419 kernel: pstore: Registered efi as persistent store backend Oct 2 19:20:23.049432 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:20:23.049446 kernel: Segment Routing with IPv6 Oct 2 19:20:23.049459 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:20:23.049472 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:20:23.049485 kernel: Key type dns_resolver registered Oct 2 19:20:23.049500 kernel: IPI shorthand broadcast: enabled Oct 2 19:20:23.049511 kernel: sched_clock: Marking stable (808647500, 24042500)->(1065727000, -233037000) Oct 2 19:20:23.049522 kernel: registered taskstats version 1 Oct 2 19:20:23.049534 kernel: Loading compiled-in X.509 certificates Oct 2 19:20:23.049547 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:20:23.049561 kernel: Key type .fscrypt registered Oct 2 19:20:23.049574 kernel: Key type fscrypt-provisioning registered Oct 2 19:20:23.049588 kernel: pstore: Using crash dump compression: deflate Oct 2 19:20:23.049603 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:20:23.049615 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:20:23.049629 kernel: ima: No architecture policies found Oct 2 19:20:23.049642 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:20:23.049654 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:20:23.049668 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:20:23.049683 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:20:23.049697 kernel: Run /init as init process Oct 2 19:20:23.049711 kernel: with arguments: Oct 2 19:20:23.049725 kernel: /init Oct 2 19:20:23.049742 kernel: with environment: Oct 2 19:20:23.049775 kernel: HOME=/ Oct 2 19:20:23.049789 kernel: TERM=linux Oct 2 19:20:23.049803 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:20:23.049818 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:20:23.049832 systemd[1]: Detected virtualization microsoft. Oct 2 19:20:23.049845 systemd[1]: Detected architecture x86-64. Oct 2 19:20:23.049859 systemd[1]: Running in initrd. Oct 2 19:20:23.049872 systemd[1]: No hostname configured, using default hostname. Oct 2 19:20:23.049886 systemd[1]: Hostname set to . Oct 2 19:20:23.049901 systemd[1]: Initializing machine ID from random generator. Oct 2 19:20:23.049915 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:20:23.049929 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:20:23.049943 systemd[1]: Reached target cryptsetup.target. Oct 2 19:20:23.049957 systemd[1]: Reached target paths.target. Oct 2 19:20:23.049971 systemd[1]: Reached target slices.target. Oct 2 19:20:23.049988 systemd[1]: Reached target swap.target. Oct 2 19:20:23.050002 systemd[1]: Reached target timers.target. Oct 2 19:20:23.050016 systemd[1]: Listening on iscsid.socket. Oct 2 19:20:23.050029 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:20:23.050043 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:20:23.050057 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:20:23.050072 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:20:23.050089 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:20:23.050103 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:20:23.050114 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:20:23.050126 systemd[1]: Reached target sockets.target. Oct 2 19:20:23.050138 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:20:23.050149 systemd[1]: Finished network-cleanup.service. Oct 2 19:20:23.050160 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:20:23.050172 systemd[1]: Starting systemd-journald.service... Oct 2 19:20:23.050184 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:20:23.050196 systemd[1]: Starting systemd-resolved.service... Oct 2 19:20:23.050204 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:20:23.050216 systemd-journald[183]: Journal started Oct 2 19:20:23.052869 systemd-journald[183]: Runtime Journal (/run/log/journal/bc2e382ffd3149c09e84c46decf639c9) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:20:23.042587 systemd-modules-load[184]: Inserted module 'overlay' Oct 2 19:20:23.062653 systemd[1]: Started systemd-journald.service. Oct 2 19:20:23.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.085803 kernel: audit: type=1130 audit(1696274423.065:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.066474 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:20:23.086066 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:20:23.090895 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:20:23.106718 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:20:23.103291 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:20:23.107470 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:20:23.128254 kernel: audit: type=1130 audit(1696274423.085:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.142244 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:20:23.169134 kernel: audit: type=1130 audit(1696274423.089:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.169158 kernel: audit: type=1130 audit(1696274423.102:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.169168 kernel: Bridge firewalling registered Oct 2 19:20:23.169247 systemd-modules-load[184]: Inserted module 'br_netfilter' Oct 2 19:20:23.174356 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:20:23.182724 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:20:23.185464 systemd-resolved[185]: Positive Trust Anchors: Oct 2 19:20:23.185480 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:20:23.185524 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:20:23.214482 kernel: SCSI subsystem initialized Oct 2 19:20:23.213884 systemd-resolved[185]: Defaulting to hostname 'linux'. Oct 2 19:20:23.217359 systemd[1]: Started systemd-resolved.service. Oct 2 19:20:23.222135 systemd[1]: Reached target nss-lookup.target. Oct 2 19:20:23.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.227062 dracut-cmdline[200]: dracut-dracut-053 Oct 2 19:20:23.261773 kernel: audit: type=1130 audit(1696274423.173:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.261800 kernel: audit: type=1130 audit(1696274423.180:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.261811 kernel: audit: type=1130 audit(1696274423.221:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.261896 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:20:23.298551 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:20:23.298626 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:20:23.307774 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:20:23.311595 systemd-modules-load[184]: Inserted module 'dm_multipath' Oct 2 19:20:23.314501 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:20:23.330309 kernel: audit: type=1130 audit(1696274423.316:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.330561 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:20:23.344492 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:20:23.362867 kernel: audit: type=1130 audit(1696274423.349:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.368773 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:20:23.382773 kernel: iscsi: registered transport (tcp) Oct 2 19:20:23.407026 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:20:23.407098 kernel: QLogic iSCSI HBA Driver Oct 2 19:20:23.436780 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:20:23.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.442872 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:20:23.493775 kernel: raid6: avx512x4 gen() 18440 MB/s Oct 2 19:20:23.513767 kernel: raid6: avx512x4 xor() 8191 MB/s Oct 2 19:20:23.533763 kernel: raid6: avx512x2 gen() 18437 MB/s Oct 2 19:20:23.554769 kernel: raid6: avx512x2 xor() 29640 MB/s Oct 2 19:20:23.574764 kernel: raid6: avx512x1 gen() 18603 MB/s Oct 2 19:20:23.594763 kernel: raid6: avx512x1 xor() 26876 MB/s Oct 2 19:20:23.615767 kernel: raid6: avx2x4 gen() 18411 MB/s Oct 2 19:20:23.635763 kernel: raid6: avx2x4 xor() 7480 MB/s Oct 2 19:20:23.655763 kernel: raid6: avx2x2 gen() 18521 MB/s Oct 2 19:20:23.675767 kernel: raid6: avx2x2 xor() 22361 MB/s Oct 2 19:20:23.695762 kernel: raid6: avx2x1 gen() 14140 MB/s Oct 2 19:20:23.715763 kernel: raid6: avx2x1 xor() 18903 MB/s Oct 2 19:20:23.735765 kernel: raid6: sse2x4 gen() 11342 MB/s Oct 2 19:20:23.755760 kernel: raid6: sse2x4 xor() 7222 MB/s Oct 2 19:20:23.775762 kernel: raid6: sse2x2 gen() 12698 MB/s Oct 2 19:20:23.795766 kernel: raid6: sse2x2 xor() 7443 MB/s Oct 2 19:20:23.815763 kernel: raid6: sse2x1 gen() 11554 MB/s Oct 2 19:20:23.840069 kernel: raid6: sse2x1 xor() 5627 MB/s Oct 2 19:20:23.840086 kernel: raid6: using algorithm avx512x1 gen() 18603 MB/s Oct 2 19:20:23.840098 kernel: raid6: .... xor() 26876 MB/s, rmw enabled Oct 2 19:20:23.843631 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:20:23.862775 kernel: xor: automatically using best checksumming function avx Oct 2 19:20:23.957778 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:20:23.965438 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:20:23.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.969000 audit: BPF prog-id=7 op=LOAD Oct 2 19:20:23.969000 audit: BPF prog-id=8 op=LOAD Oct 2 19:20:23.971010 systemd[1]: Starting systemd-udevd.service... Oct 2 19:20:23.985862 systemd-udevd[384]: Using default interface naming scheme 'v252'. Oct 2 19:20:23.992739 systemd[1]: Started systemd-udevd.service. Oct 2 19:20:23.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.996167 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:20:24.015258 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Oct 2 19:20:24.041923 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:20:24.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.050120 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:20:24.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.084712 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:20:24.127774 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:20:24.167915 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:20:24.167976 kernel: AES CTR mode by8 optimization enabled Oct 2 19:20:24.172342 kernel: hv_vmbus: Vmbus version:5.2 Oct 2 19:20:24.184767 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 19:20:24.200773 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 19:20:24.217028 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 19:20:24.217084 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:20:24.217097 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 19:20:24.230154 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 19:20:24.230210 kernel: scsi host0: storvsc_host_t Oct 2 19:20:24.230248 kernel: scsi host1: storvsc_host_t Oct 2 19:20:24.238809 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 19:20:24.249362 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 19:20:24.249412 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 19:20:24.249451 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 19:20:24.290258 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 19:20:24.290516 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 19:20:24.290641 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:20:24.299595 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 19:20:24.299899 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 19:20:24.304770 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:20:24.309286 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:20:24.317305 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 19:20:24.317533 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:20:24.318766 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 19:20:24.413771 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (445) Oct 2 19:20:24.415703 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:20:24.439769 kernel: hv_netvsc 000d3aba-6e5a-000d-3aba-6e5a000d3aba eth0: VF slot 1 added Oct 2 19:20:24.454953 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:20:24.460305 kernel: hv_vmbus: registering driver hv_pci Oct 2 19:20:24.470789 kernel: hv_pci 1d3bf750-4759-4ba2-83aa-45a5c38c29b8: PCI VMBus probing: Using version 0x10004 Oct 2 19:20:24.474388 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:20:24.492770 kernel: hv_pci 1d3bf750-4759-4ba2-83aa-45a5c38c29b8: PCI host bridge to bus 4759:00 Oct 2 19:20:24.492992 kernel: pci_bus 4759:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Oct 2 19:20:24.498509 kernel: pci_bus 4759:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 19:20:24.522454 kernel: pci 4759:00:02.0: [15b3:1016] type 00 class 0x020000 Oct 2 19:20:24.522525 kernel: pci 4759:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:20:24.505823 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:20:24.509229 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:20:24.516961 systemd[1]: Starting disk-uuid.service... Oct 2 19:20:24.535810 kernel: pci 4759:00:02.0: enabling Extended Tags Oct 2 19:20:24.548852 kernel: pci 4759:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 4759:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Oct 2 19:20:24.559855 kernel: pci_bus 4759:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 19:20:24.560050 kernel: pci 4759:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:20:24.567771 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:20:24.575772 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:20:24.730782 kernel: mlx5_core 4759:00:02.0: firmware version: 14.30.1224 Oct 2 19:20:24.890784 kernel: mlx5_core 4759:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:20:25.035941 kernel: mlx5_core 4759:00:02.0: Supported tc offload range - chains: 1, prios: 1 Oct 2 19:20:25.036214 kernel: mlx5_core 4759:00:02.0: mlx5e_tc_post_act_init:40:(pid 203): firmware level support is missing Oct 2 19:20:25.047952 kernel: hv_netvsc 000d3aba-6e5a-000d-3aba-6e5a000d3aba eth0: VF registering: eth1 Oct 2 19:20:25.048129 kernel: mlx5_core 4759:00:02.0 eth1: joined to eth0 Oct 2 19:20:25.065770 kernel: mlx5_core 4759:00:02.0 enP18265s1: renamed from eth1 Oct 2 19:20:25.583191 disk-uuid[539]: The operation has completed successfully. Oct 2 19:20:25.585961 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:20:25.655815 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:20:25.655930 systemd[1]: Finished disk-uuid.service. Oct 2 19:20:25.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.667551 systemd[1]: Starting verity-setup.service... Oct 2 19:20:25.697115 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:20:25.780324 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:20:25.787083 systemd[1]: Finished verity-setup.service. Oct 2 19:20:25.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.792242 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:20:25.871804 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:20:25.872243 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:20:25.876475 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:20:25.881198 systemd[1]: Starting ignition-setup.service... Oct 2 19:20:25.886333 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:20:25.905984 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:20:25.906049 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:20:25.906069 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:20:25.936205 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:20:25.965840 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:20:25.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.970000 audit: BPF prog-id=9 op=LOAD Oct 2 19:20:25.971982 systemd[1]: Starting systemd-networkd.service... Oct 2 19:20:25.985475 systemd[1]: Finished ignition-setup.service. Oct 2 19:20:25.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.991480 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:20:26.009162 systemd-networkd[794]: lo: Link UP Oct 2 19:20:26.009172 systemd-networkd[794]: lo: Gained carrier Oct 2 19:20:26.013441 systemd-networkd[794]: Enumeration completed Oct 2 19:20:26.013537 systemd[1]: Started systemd-networkd.service. Oct 2 19:20:26.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.017961 systemd-networkd[794]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:20:26.020343 systemd[1]: Reached target network.target. Oct 2 19:20:26.028569 systemd[1]: Starting iscsiuio.service... Oct 2 19:20:26.036453 systemd[1]: Started iscsiuio.service. Oct 2 19:20:26.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.041281 systemd[1]: Starting iscsid.service... Oct 2 19:20:26.047989 iscsid[801]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:20:26.047989 iscsid[801]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:20:26.047989 iscsid[801]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:20:26.047989 iscsid[801]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:20:26.072522 iscsid[801]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:20:26.072522 iscsid[801]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:20:26.080655 systemd[1]: Started iscsid.service. Oct 2 19:20:26.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.084479 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:20:26.097126 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:20:26.101130 kernel: mlx5_core 4759:00:02.0 enP18265s1: Link up Oct 2 19:20:26.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.103105 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:20:26.109416 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:20:26.111856 systemd[1]: Reached target remote-fs.target. Oct 2 19:20:26.114918 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:20:26.134432 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:20:26.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.174765 kernel: hv_netvsc 000d3aba-6e5a-000d-3aba-6e5a000d3aba eth0: Data path switched to VF: enP18265s1 Oct 2 19:20:26.174969 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:20:26.179992 systemd-networkd[794]: enP18265s1: Link UP Oct 2 19:20:26.180230 systemd-networkd[794]: eth0: Link UP Oct 2 19:20:26.180663 systemd-networkd[794]: eth0: Gained carrier Oct 2 19:20:26.187961 systemd-networkd[794]: enP18265s1: Gained carrier Oct 2 19:20:26.214845 systemd-networkd[794]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:20:26.802229 ignition[796]: Ignition 2.14.0 Oct 2 19:20:26.802246 ignition[796]: Stage: fetch-offline Oct 2 19:20:26.802328 ignition[796]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:26.802373 ignition[796]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:26.845331 ignition[796]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:26.845532 ignition[796]: parsed url from cmdline: "" Oct 2 19:20:26.846884 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:20:26.845535 ignition[796]: no config URL provided Oct 2 19:20:26.852152 systemd[1]: Starting ignition-fetch.service... Oct 2 19:20:26.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.845541 ignition[796]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:20:26.845549 ignition[796]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:20:26.845555 ignition[796]: failed to fetch config: resource requires networking Oct 2 19:20:26.845987 ignition[796]: Ignition finished successfully Oct 2 19:20:26.868008 ignition[820]: Ignition 2.14.0 Oct 2 19:20:26.868014 ignition[820]: Stage: fetch Oct 2 19:20:26.868114 ignition[820]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:26.868134 ignition[820]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:26.871088 ignition[820]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:26.872550 ignition[820]: parsed url from cmdline: "" Oct 2 19:20:26.872557 ignition[820]: no config URL provided Oct 2 19:20:26.872567 ignition[820]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:20:26.872587 ignition[820]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:20:26.872641 ignition[820]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 19:20:26.897909 ignition[820]: GET result: OK Oct 2 19:20:26.899581 ignition[820]: config has been read from IMDS userdata Oct 2 19:20:26.899640 ignition[820]: parsing config with SHA512: 4e0cad93877411c9bed6ab7664aab6e50e98ddbe9ead0b9d3abf2485f6befdc4363bde95f8293245ed4869057002c8483d1744e580c793f3bd6c2036dfcb4183 Oct 2 19:20:26.913639 unknown[820]: fetched base config from "system" Oct 2 19:20:26.913864 unknown[820]: fetched base config from "system" Oct 2 19:20:26.914307 ignition[820]: fetch: fetch complete Oct 2 19:20:26.913872 unknown[820]: fetched user config from "azure" Oct 2 19:20:26.914312 ignition[820]: fetch: fetch passed Oct 2 19:20:26.914358 ignition[820]: Ignition finished successfully Oct 2 19:20:26.928197 systemd[1]: Finished ignition-fetch.service. Oct 2 19:20:26.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.931531 systemd[1]: Starting ignition-kargs.service... Oct 2 19:20:26.943531 ignition[826]: Ignition 2.14.0 Oct 2 19:20:26.943541 ignition[826]: Stage: kargs Oct 2 19:20:26.943668 ignition[826]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:26.943700 ignition[826]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:26.948538 ignition[826]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:26.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.949998 ignition[826]: kargs: kargs passed Oct 2 19:20:26.951937 systemd[1]: Finished ignition-kargs.service. Oct 2 19:20:26.950431 ignition[826]: Ignition finished successfully Oct 2 19:20:26.957886 systemd[1]: Starting ignition-disks.service... Oct 2 19:20:26.966436 ignition[832]: Ignition 2.14.0 Oct 2 19:20:26.966442 ignition[832]: Stage: disks Oct 2 19:20:26.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.973942 systemd[1]: Finished ignition-disks.service. Oct 2 19:20:26.966535 ignition[832]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:26.977842 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:20:26.966556 ignition[832]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:26.982721 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:20:26.970448 ignition[832]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:26.985064 systemd[1]: Reached target local-fs.target. Oct 2 19:20:26.973146 ignition[832]: disks: disks passed Oct 2 19:20:26.990499 systemd[1]: Reached target sysinit.target. Oct 2 19:20:26.973188 ignition[832]: Ignition finished successfully Oct 2 19:20:26.992821 systemd[1]: Reached target basic.target. Oct 2 19:20:26.998790 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:20:27.024252 systemd-fsck[840]: ROOT: clean, 603/7326000 files, 481068/7359488 blocks Oct 2 19:20:27.027676 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:20:27.033552 systemd[1]: Mounting sysroot.mount... Oct 2 19:20:27.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.050779 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:20:27.050488 systemd[1]: Mounted sysroot.mount. Oct 2 19:20:27.054478 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:20:27.066442 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:20:27.072651 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 19:20:27.077969 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:20:27.078094 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:20:27.088700 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:20:27.101743 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:20:27.115376 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (850) Oct 2 19:20:27.115694 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:20:27.126076 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:20:27.126112 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:20:27.126129 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:20:27.134305 initrd-setup-root[856]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:20:27.141208 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:20:27.146733 initrd-setup-root[881]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:20:27.153887 initrd-setup-root[889]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:20:27.161112 initrd-setup-root[897]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:20:27.277936 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:20:27.298244 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:20:27.298275 kernel: audit: type=1130 audit(1696274427.277:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.279026 systemd[1]: Starting ignition-mount.service... Oct 2 19:20:27.303904 systemd[1]: Starting sysroot-boot.service... Oct 2 19:20:27.313975 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:20:27.314094 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:20:27.335358 ignition[917]: INFO : Ignition 2.14.0 Oct 2 19:20:27.335358 ignition[917]: INFO : Stage: mount Oct 2 19:20:27.340459 ignition[917]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:27.340459 ignition[917]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:27.354951 ignition[917]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:27.359547 ignition[917]: INFO : mount: mount passed Oct 2 19:20:27.362862 ignition[917]: INFO : Ignition finished successfully Oct 2 19:20:27.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.363328 systemd[1]: Finished sysroot-boot.service. Oct 2 19:20:27.382705 kernel: audit: type=1130 audit(1696274427.367:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.368981 systemd[1]: Finished ignition-mount.service. Oct 2 19:20:27.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.401770 kernel: audit: type=1130 audit(1696274427.384:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.558425 coreos-metadata[849]: Oct 02 19:20:27.558 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 19:20:27.564219 coreos-metadata[849]: Oct 02 19:20:27.564 INFO Fetch successful Oct 2 19:20:27.599299 coreos-metadata[849]: Oct 02 19:20:27.599 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 19:20:27.618026 coreos-metadata[849]: Oct 02 19:20:27.617 INFO Fetch successful Oct 2 19:20:27.623074 coreos-metadata[849]: Oct 02 19:20:27.622 INFO wrote hostname ci-3510.3.0-a-78385808f2 to /sysroot/etc/hostname Oct 2 19:20:27.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.624784 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 19:20:27.648179 kernel: audit: type=1130 audit(1696274427.629:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.631346 systemd[1]: Starting ignition-files.service... Oct 2 19:20:27.651588 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:20:27.664773 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (928) Oct 2 19:20:27.673734 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:20:27.673797 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:20:27.673810 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:20:27.682565 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:20:27.697604 ignition[947]: INFO : Ignition 2.14.0 Oct 2 19:20:27.697604 ignition[947]: INFO : Stage: files Oct 2 19:20:27.701857 ignition[947]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:27.701857 ignition[947]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:27.710938 ignition[947]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:27.717471 ignition[947]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:20:27.720687 ignition[947]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:20:27.720687 ignition[947]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:20:27.741170 ignition[947]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:20:27.744949 ignition[947]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:20:27.748904 unknown[947]: wrote ssh authorized keys file for user: core Oct 2 19:20:27.751514 ignition[947]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:20:27.751514 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:20:27.751514 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:20:28.173000 systemd-networkd[794]: eth0: Gained IPv6LL Oct 2 19:20:28.214177 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:20:28.444474 ignition[947]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:20:28.452354 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:20:28.452354 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:20:28.452354 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:20:28.811012 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:20:28.905683 ignition[947]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:20:28.919917 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:20:28.919917 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:20:28.919917 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:20:29.130545 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:20:31.162815 ignition[947]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:20:31.173821 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:20:31.173821 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:20:31.173821 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:20:31.342624 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:20:35.215993 ignition[947]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:20:35.230106 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (950) Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3956704086" Oct 2 19:20:35.230136 ignition[947]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3956704086": device or resource busy Oct 2 19:20:35.230136 ignition[947]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3956704086", trying btrfs: device or resource busy Oct 2 19:20:35.230136 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3956704086" Oct 2 19:20:35.345291 kernel: audit: type=1130 audit(1696274435.275:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.345329 kernel: audit: type=1130 audit(1696274435.312:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.345351 kernel: audit: type=1130 audit(1696274435.312:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.242252 systemd[1]: mnt-oem3956704086.mount: Deactivated successfully. Oct 2 19:20:35.362287 kernel: audit: type=1131 audit(1696274435.312:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3956704086" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem3956704086" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem3956704086" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(e): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1980748799" Oct 2 19:20:35.362398 ignition[947]: CRITICAL : files: createFilesystemsFiles: createFiles: op(d): op(e): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1980748799": device or resource busy Oct 2 19:20:35.362398 ignition[947]: ERROR : files: createFilesystemsFiles: createFiles: op(d): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1980748799", trying btrfs: device or resource busy Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1980748799" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(f): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1980748799" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(10): [started] unmounting "/mnt/oem1980748799" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(10): [finished] unmounting "/mnt/oem1980748799" Oct 2 19:20:35.362398 ignition[947]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:20:35.362398 ignition[947]: INFO : files: op(11): [started] processing unit "waagent.service" Oct 2 19:20:35.362398 ignition[947]: INFO : files: op(11): [finished] processing unit "waagent.service" Oct 2 19:20:35.433735 kernel: audit: type=1130 audit(1696274435.375:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.433766 kernel: audit: type=1131 audit(1696274435.375:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.265414 systemd[1]: mnt-oem1980748799.mount: Deactivated successfully. Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:20:35.434296 ignition[947]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:20:35.434296 ignition[947]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:20:35.434296 ignition[947]: INFO : files: files passed Oct 2 19:20:35.537506 kernel: audit: type=1130 audit(1696274435.505:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.271695 systemd[1]: Finished ignition-files.service. Oct 2 19:20:35.537972 initrd-setup-root-after-ignition[972]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:20:35.538581 ignition[947]: INFO : Ignition finished successfully Oct 2 19:20:35.297877 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:20:35.307820 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:20:35.308628 systemd[1]: Starting ignition-quench.service... Oct 2 19:20:35.313478 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:20:35.327734 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:20:35.327838 systemd[1]: Finished ignition-quench.service. Oct 2 19:20:35.328044 systemd[1]: Reached target ignition-complete.target. Oct 2 19:20:35.332648 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:20:35.369119 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:20:35.369211 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:20:35.375349 systemd[1]: Reached target initrd-fs.target. Oct 2 19:20:35.409840 systemd[1]: Reached target initrd.target. Oct 2 19:20:35.417423 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:20:35.418385 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:20:35.499747 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:20:35.519422 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:20:35.529619 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:20:35.640332 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:20:35.645375 systemd[1]: Stopped target timers.target. Oct 2 19:20:35.651378 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:20:35.651531 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:20:35.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.669236 systemd[1]: Stopped target initrd.target. Oct 2 19:20:35.674460 kernel: audit: type=1131 audit(1696274435.656:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.674553 systemd[1]: Stopped target basic.target. Oct 2 19:20:35.678843 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:20:35.683981 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:20:35.686668 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:20:35.691650 systemd[1]: Stopped target remote-fs.target. Oct 2 19:20:35.698533 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:20:35.703451 systemd[1]: Stopped target sysinit.target. Oct 2 19:20:35.709826 systemd[1]: Stopped target local-fs.target. Oct 2 19:20:35.714284 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:20:35.718985 systemd[1]: Stopped target swap.target. Oct 2 19:20:35.721195 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:20:35.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.721315 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:20:35.744209 kernel: audit: type=1131 audit(1696274435.725:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.739557 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:20:35.744294 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:20:35.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.744450 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:20:35.767459 kernel: audit: type=1131 audit(1696274435.748:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.749165 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:20:35.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.762419 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:20:35.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.767604 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:20:35.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.767713 systemd[1]: Stopped ignition-files.service. Oct 2 19:20:35.773224 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 19:20:35.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.807044 iscsid[801]: iscsid shutting down. Oct 2 19:20:35.810882 ignition[985]: INFO : Ignition 2.14.0 Oct 2 19:20:35.810882 ignition[985]: INFO : Stage: umount Oct 2 19:20:35.810882 ignition[985]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:35.810882 ignition[985]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:20:35.810882 ignition[985]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:20:35.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.773360 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 19:20:35.840188 ignition[985]: INFO : umount: umount passed Oct 2 19:20:35.840188 ignition[985]: INFO : Ignition finished successfully Oct 2 19:20:35.781129 systemd[1]: Stopping ignition-mount.service... Oct 2 19:20:35.789122 systemd[1]: Stopping iscsid.service... Oct 2 19:20:35.792165 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:20:35.794430 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:20:35.794601 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:20:35.797371 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:20:35.797516 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:20:35.805132 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:20:35.805234 systemd[1]: Stopped iscsid.service. Oct 2 19:20:35.811154 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:20:35.811249 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:20:35.818644 systemd[1]: Stopping iscsiuio.service... Oct 2 19:20:35.871378 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:20:35.874171 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:20:35.876521 systemd[1]: Stopped iscsiuio.service. Oct 2 19:20:35.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.880891 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:20:35.883427 systemd[1]: Stopped ignition-mount.service. Oct 2 19:20:35.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.885839 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:20:35.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.885925 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:20:35.888230 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:20:35.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.888273 systemd[1]: Stopped ignition-disks.service. Oct 2 19:20:35.888604 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:20:35.888636 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:20:35.889087 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:20:35.889119 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:20:35.889529 systemd[1]: Stopped target network.target. Oct 2 19:20:35.890460 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:20:35.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.890495 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:20:35.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.890953 systemd[1]: Stopped target paths.target. Oct 2 19:20:35.891372 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:20:35.960000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:20:35.898786 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:20:35.904454 systemd[1]: Stopped target slices.target. Oct 2 19:20:35.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.906592 systemd[1]: Stopped target sockets.target. Oct 2 19:20:35.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.908681 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:20:35.908726 systemd[1]: Closed iscsid.socket. Oct 2 19:20:35.910696 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:20:35.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.910734 systemd[1]: Closed iscsiuio.socket. Oct 2 19:20:35.912721 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:20:35.912787 systemd[1]: Stopped ignition-setup.service. Oct 2 19:20:35.913916 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:20:35.913951 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:20:36.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:36.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.931344 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:20:36.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.933632 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:20:36.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.940807 systemd-networkd[794]: eth0: DHCPv6 lease lost Oct 2 19:20:36.027000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:20:36.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:35.943909 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:20:35.944019 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:20:35.950861 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:20:35.950954 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:20:35.957896 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:20:35.957933 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:20:35.962956 systemd[1]: Stopping network-cleanup.service... Oct 2 19:20:35.966507 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:20:35.966567 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:20:35.971030 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:20:35.971087 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:20:35.975575 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:20:35.975614 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:20:35.978521 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:20:35.984904 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:20:35.985034 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:20:35.992012 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:20:35.992059 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:20:35.998664 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:20:35.998827 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:20:36.004067 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:20:36.004119 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:20:36.006469 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:20:36.006512 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:20:36.010893 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:20:36.010943 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:20:36.014031 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:20:36.017824 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:20:36.017886 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:20:36.027629 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:20:36.027691 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:20:36.032273 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:20:36.032331 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:20:36.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:36.114765 kernel: hv_netvsc 000d3aba-6e5a-000d-3aba-6e5a000d3aba eth0: Data path switched from VF: enP18265s1 Oct 2 19:20:36.115113 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:20:36.115238 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:20:36.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:36.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:36.136813 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:20:36.136936 systemd[1]: Stopped network-cleanup.service. Oct 2 19:20:36.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:36.144147 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:20:36.150060 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:20:36.161182 systemd[1]: Switching root. Oct 2 19:20:36.188030 systemd-journald[183]: Journal stopped Oct 2 19:20:41.185322 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Oct 2 19:20:41.185349 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:20:41.185360 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:20:41.185371 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:20:41.185379 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:20:41.185390 kernel: SELinux: policy capability open_perms=1 Oct 2 19:20:41.185401 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:20:41.185412 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:20:41.185420 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:20:41.185431 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:20:41.185440 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:20:41.185449 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:20:41.185459 systemd[1]: Successfully loaded SELinux policy in 139.065ms. Oct 2 19:20:41.185471 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.799ms. Oct 2 19:20:41.185485 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:20:41.185498 systemd[1]: Detected virtualization microsoft. Oct 2 19:20:41.185508 systemd[1]: Detected architecture x86-64. Oct 2 19:20:41.185518 systemd[1]: Detected first boot. Oct 2 19:20:41.185530 systemd[1]: Hostname set to . Oct 2 19:20:41.185541 systemd[1]: Initializing machine ID from random generator. Oct 2 19:20:41.185554 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:20:41.185563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:20:41.185574 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:20:41.185586 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:20:41.185598 kernel: kauditd_printk_skb: 42 callbacks suppressed Oct 2 19:20:41.185607 kernel: audit: type=1334 audit(1696274440.682:90): prog-id=12 op=LOAD Oct 2 19:20:41.185620 kernel: audit: type=1334 audit(1696274440.682:91): prog-id=3 op=UNLOAD Oct 2 19:20:41.185630 kernel: audit: type=1334 audit(1696274440.688:92): prog-id=13 op=LOAD Oct 2 19:20:41.185640 kernel: audit: type=1334 audit(1696274440.692:93): prog-id=14 op=LOAD Oct 2 19:20:41.185648 kernel: audit: type=1334 audit(1696274440.692:94): prog-id=4 op=UNLOAD Oct 2 19:20:41.185659 kernel: audit: type=1334 audit(1696274440.693:95): prog-id=5 op=UNLOAD Oct 2 19:20:41.185668 kernel: audit: type=1334 audit(1696274440.699:96): prog-id=15 op=LOAD Oct 2 19:20:41.185679 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:20:41.185690 kernel: audit: type=1334 audit(1696274440.699:97): prog-id=12 op=UNLOAD Oct 2 19:20:41.185700 kernel: audit: type=1334 audit(1696274440.704:98): prog-id=16 op=LOAD Oct 2 19:20:41.185710 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:20:41.185723 kernel: audit: type=1334 audit(1696274440.708:99): prog-id=17 op=LOAD Oct 2 19:20:41.185731 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:20:41.185743 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:20:41.185762 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:20:41.185775 systemd[1]: Created slice system-getty.slice. Oct 2 19:20:41.185789 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:20:41.185801 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:20:41.185811 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:20:41.185821 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:20:41.185833 systemd[1]: Created slice user.slice. Oct 2 19:20:41.185845 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:20:41.185855 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:20:41.185866 systemd[1]: Set up automount boot.automount. Oct 2 19:20:41.185877 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:20:41.185890 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:20:41.185900 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:20:41.185912 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:20:41.185922 systemd[1]: Reached target integritysetup.target. Oct 2 19:20:41.185934 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:20:41.185945 systemd[1]: Reached target remote-fs.target. Oct 2 19:20:41.185957 systemd[1]: Reached target slices.target. Oct 2 19:20:41.185971 systemd[1]: Reached target swap.target. Oct 2 19:20:41.185981 systemd[1]: Reached target torcx.target. Oct 2 19:20:41.185991 systemd[1]: Reached target veritysetup.target. Oct 2 19:20:41.186002 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:20:41.186014 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:20:41.186024 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:20:41.186038 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:20:41.186049 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:20:41.186061 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:20:41.186070 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:20:41.186083 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:20:41.186096 systemd[1]: Mounting media.mount... Oct 2 19:20:41.186106 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:20:41.186117 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:20:41.186129 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:20:41.186141 systemd[1]: Mounting tmp.mount... Oct 2 19:20:41.186152 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:20:41.186168 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:20:41.186186 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:20:41.186207 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:20:41.186226 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:20:41.186244 systemd[1]: Starting modprobe@drm.service... Oct 2 19:20:41.186262 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:20:41.186285 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:20:41.186306 systemd[1]: Starting modprobe@loop.service... Oct 2 19:20:41.186326 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:20:41.186347 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:20:41.186365 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:20:41.186384 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:20:41.186403 kernel: fuse: init (API version 7.34) Oct 2 19:20:41.186422 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:20:41.186439 kernel: loop: module loaded Oct 2 19:20:41.186461 systemd[1]: Stopped systemd-journald.service. Oct 2 19:20:41.186481 systemd[1]: Starting systemd-journald.service... Oct 2 19:20:41.186502 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:20:41.186520 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:20:41.186541 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:20:41.186561 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:20:41.186582 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:20:41.186601 systemd[1]: Stopped verity-setup.service. Oct 2 19:20:41.186620 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:20:41.186644 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:20:41.186666 systemd-journald[1127]: Journal started Oct 2 19:20:41.186729 systemd-journald[1127]: Runtime Journal (/run/log/journal/9ead38b163234b8ebb6b4c42e15fc866) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:20:36.865000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:20:37.104000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:20:37.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:20:37.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:20:37.109000 audit: BPF prog-id=10 op=LOAD Oct 2 19:20:37.109000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:20:37.109000 audit: BPF prog-id=11 op=LOAD Oct 2 19:20:37.109000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:20:40.682000 audit: BPF prog-id=12 op=LOAD Oct 2 19:20:40.682000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:20:40.688000 audit: BPF prog-id=13 op=LOAD Oct 2 19:20:40.692000 audit: BPF prog-id=14 op=LOAD Oct 2 19:20:40.692000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:20:40.693000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:20:40.699000 audit: BPF prog-id=15 op=LOAD Oct 2 19:20:40.699000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:20:40.704000 audit: BPF prog-id=16 op=LOAD Oct 2 19:20:40.708000 audit: BPF prog-id=17 op=LOAD Oct 2 19:20:40.718000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:20:40.718000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:20:40.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:40.753000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:20:40.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:40.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.117000 audit: BPF prog-id=18 op=LOAD Oct 2 19:20:41.117000 audit: BPF prog-id=19 op=LOAD Oct 2 19:20:41.117000 audit: BPF prog-id=20 op=LOAD Oct 2 19:20:41.117000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:20:41.117000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:20:41.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.181000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:20:41.181000 audit[1127]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffc5f2d7610 a2=4000 a3=7ffc5f2d76ac items=0 ppid=1 pid=1127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:41.181000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:20:40.682128 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:20:37.541509 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:20:40.720339 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:20:37.541830 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:20:37.541849 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:20:37.541882 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:20:37.541892 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:20:37.541935 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:20:37.541947 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:20:37.542124 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:20:37.542165 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:20:37.542180 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:20:37.542535 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:20:37.542566 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:20:37.542583 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:20:37.542597 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:20:37.542612 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:20:37.542624 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:20:40.174522 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:40.174801 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:40.174933 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:40.175099 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:40.175148 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:20:40.175203 /usr/lib/systemd/system-generators/torcx-generator[1018]: time="2023-10-02T19:20:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:20:41.198771 systemd[1]: Started systemd-journald.service. Oct 2 19:20:41.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.201207 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:20:41.203579 systemd[1]: Mounted media.mount. Oct 2 19:20:41.205480 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:20:41.207739 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:20:41.210196 systemd[1]: Mounted tmp.mount. Oct 2 19:20:41.212219 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:20:41.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.215016 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:20:41.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.217657 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:20:41.218072 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:20:41.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.221136 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:20:41.221405 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:20:41.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.224268 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:20:41.224552 systemd[1]: Finished modprobe@drm.service. Oct 2 19:20:41.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.227302 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:20:41.227572 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:20:41.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.230440 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:20:41.230725 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:20:41.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.233416 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:20:41.233691 systemd[1]: Finished modprobe@loop.service. Oct 2 19:20:41.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.238232 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:20:41.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.241142 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:20:41.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.244170 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:20:41.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.247384 systemd[1]: Reached target network-pre.target. Oct 2 19:20:41.251522 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:20:41.259766 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:20:41.265766 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:20:41.273325 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:20:41.277436 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:20:41.280132 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:20:41.281514 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:20:41.283962 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:20:41.285400 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:20:41.289177 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:20:41.303703 systemd-journald[1127]: Time spent on flushing to /var/log/journal/9ead38b163234b8ebb6b4c42e15fc866 is 37.392ms for 1146 entries. Oct 2 19:20:41.303703 systemd-journald[1127]: System Journal (/var/log/journal/9ead38b163234b8ebb6b4c42e15fc866) is 8.0M, max 2.6G, 2.6G free. Oct 2 19:20:41.369237 systemd-journald[1127]: Received client request to flush runtime journal. Oct 2 19:20:41.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.298341 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:20:41.301044 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:20:41.370459 udevadm[1142]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:20:41.309928 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:20:41.318648 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:20:41.321867 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:20:41.326320 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:20:41.330548 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:20:41.371112 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:20:41.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.469127 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:20:41.473981 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:20:41.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.576405 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:20:41.960250 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:20:41.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:41.963000 audit: BPF prog-id=21 op=LOAD Oct 2 19:20:41.963000 audit: BPF prog-id=22 op=LOAD Oct 2 19:20:41.963000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:20:41.963000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:20:41.964969 systemd[1]: Starting systemd-udevd.service... Oct 2 19:20:41.983103 systemd-udevd[1146]: Using default interface naming scheme 'v252'. Oct 2 19:20:42.047347 systemd[1]: Started systemd-udevd.service. Oct 2 19:20:42.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:42.050000 audit: BPF prog-id=23 op=LOAD Oct 2 19:20:42.053858 systemd[1]: Starting systemd-networkd.service... Oct 2 19:20:42.081000 audit: BPF prog-id=24 op=LOAD Oct 2 19:20:42.081000 audit: BPF prog-id=25 op=LOAD Oct 2 19:20:42.081000 audit: BPF prog-id=26 op=LOAD Oct 2 19:20:42.083434 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:20:42.111520 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:20:42.133651 systemd[1]: Started systemd-userdbd.service. Oct 2 19:20:42.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:42.208049 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:20:42.248732 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 19:20:42.248868 kernel: hv_vmbus: registering driver hv_utils Oct 2 19:20:42.216000 audit[1150]: AVC avc: denied { confidentiality } for pid=1150 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:20:42.262300 kernel: hv_vmbus: registering driver hv_balloon Oct 2 19:20:42.262375 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 19:20:42.216000 audit[1150]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a1194e1fe0 a1=f884 a2=7fa974028bc5 a3=5 items=10 ppid=1146 pid=1150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:42.216000 audit: CWD cwd="/" Oct 2 19:20:42.216000 audit: PATH item=0 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=1 name=(null) inode=14719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=2 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=3 name=(null) inode=14720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=4 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=5 name=(null) inode=14721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=6 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=7 name=(null) inode=14722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=8 name=(null) inode=14718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PATH item=9 name=(null) inode=14723 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:42.216000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:20:42.296811 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 19:20:42.304051 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 19:20:42.304148 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 19:20:42.304168 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 19:20:42.261684 systemd-networkd[1152]: lo: Link UP Oct 2 19:20:42.390352 systemd-journald[1127]: Time jumped backwards, rotating. Oct 2 19:20:42.390483 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 19:20:42.390513 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 19:20:42.390535 kernel: Console: switching to colour dummy device 80x25 Oct 2 19:20:42.390555 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:20:42.390578 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1160) Oct 2 19:20:42.390608 kernel: mlx5_core 4759:00:02.0 enP18265s1: Link up Oct 2 19:20:42.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:42.261694 systemd-networkd[1152]: lo: Gained carrier Oct 2 19:20:42.262366 systemd-networkd[1152]: Enumeration completed Oct 2 19:20:42.262746 systemd[1]: Started systemd-networkd.service. Oct 2 19:20:42.272281 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:20:42.317816 systemd-networkd[1152]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:20:42.431543 kernel: hv_netvsc 000d3aba-6e5a-000d-3aba-6e5a000d3aba eth0: Data path switched to VF: enP18265s1 Oct 2 19:20:42.433902 systemd-networkd[1152]: enP18265s1: Link UP Oct 2 19:20:42.434042 systemd-networkd[1152]: eth0: Link UP Oct 2 19:20:42.434047 systemd-networkd[1152]: eth0: Gained carrier Oct 2 19:20:42.439831 systemd-networkd[1152]: enP18265s1: Gained carrier Oct 2 19:20:42.457478 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:20:42.480649 systemd-networkd[1152]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:20:42.499479 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Oct 2 19:20:42.541887 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:20:42.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:42.546860 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:20:42.651124 lvm[1224]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:20:42.676586 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:20:42.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:42.679378 systemd[1]: Reached target cryptsetup.target. Oct 2 19:20:42.685035 systemd[1]: Starting lvm2-activation.service... Oct 2 19:20:42.691501 lvm[1225]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:20:42.711558 systemd[1]: Finished lvm2-activation.service. Oct 2 19:20:42.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:42.714600 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:20:42.717120 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:20:42.717157 systemd[1]: Reached target local-fs.target. Oct 2 19:20:42.719604 systemd[1]: Reached target machines.target. Oct 2 19:20:42.722993 systemd[1]: Starting ldconfig.service... Oct 2 19:20:42.729162 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:20:42.729273 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:20:42.730573 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:20:42.734315 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:20:42.738343 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:20:42.741060 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:20:42.741152 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:20:42.742625 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:20:42.756759 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1227 (bootctl) Oct 2 19:20:42.758244 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:20:42.763433 systemd-tmpfiles[1230]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:20:42.770683 systemd-tmpfiles[1230]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:20:43.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:43.021432 systemd-tmpfiles[1230]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:20:43.605717 systemd-networkd[1152]: eth0: Gained IPv6LL Oct 2 19:20:43.611303 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:20:43.921070 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:20:43.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.123278 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:20:44.125184 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:20:44.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.202243 systemd-fsck[1237]: fsck.fat 4.2 (2021-01-31) Oct 2 19:20:44.202243 systemd-fsck[1237]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:20:44.202699 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:20:44.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.207963 systemd[1]: Mounting boot.mount... Oct 2 19:20:44.220604 systemd[1]: Mounted boot.mount. Oct 2 19:20:44.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.235383 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:20:44.314152 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:20:44.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.319094 systemd[1]: Starting audit-rules.service... Oct 2 19:20:44.322924 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:20:44.327413 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:20:44.331000 audit: BPF prog-id=27 op=LOAD Oct 2 19:20:44.332960 systemd[1]: Starting systemd-resolved.service... Oct 2 19:20:44.335000 audit: BPF prog-id=28 op=LOAD Oct 2 19:20:44.337221 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:20:44.341085 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:20:44.401346 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:20:44.401000 audit[1249]: SYSTEM_BOOT pid=1249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.407390 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:20:44.411790 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:20:44.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.434915 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:20:44.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.439433 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:20:44.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:44.441934 systemd[1]: Reached target time-set.target. Oct 2 19:20:44.470984 augenrules[1264]: No rules Oct 2 19:20:44.470000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:20:44.470000 audit[1264]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe232b50c0 a2=420 a3=0 items=0 ppid=1243 pid=1264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:44.470000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:20:44.471419 systemd[1]: Finished audit-rules.service. Oct 2 19:20:44.486346 systemd-resolved[1247]: Positive Trust Anchors: Oct 2 19:20:44.486359 systemd-resolved[1247]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:20:44.486398 systemd-resolved[1247]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:20:44.515999 systemd-resolved[1247]: Using system hostname 'ci-3510.3.0-a-78385808f2'. Oct 2 19:20:44.517546 systemd[1]: Started systemd-resolved.service. Oct 2 19:20:44.520265 systemd[1]: Reached target network.target. Oct 2 19:20:44.522498 systemd[1]: Reached target network-online.target. Oct 2 19:20:44.524916 systemd[1]: Reached target nss-lookup.target. Oct 2 19:20:44.608266 systemd-timesyncd[1248]: Contacted time server 85.91.1.164:123 (0.flatcar.pool.ntp.org). Oct 2 19:20:44.608342 systemd-timesyncd[1248]: Initial clock synchronization to Mon 2023-10-02 19:20:44.607675 UTC. Oct 2 19:20:45.954740 ldconfig[1226]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:20:45.966587 systemd[1]: Finished ldconfig.service. Oct 2 19:20:45.970270 systemd[1]: Starting systemd-update-done.service... Oct 2 19:20:45.982879 systemd[1]: Finished systemd-update-done.service. Oct 2 19:20:45.986977 systemd[1]: Reached target sysinit.target. Oct 2 19:20:45.990128 systemd[1]: Started motdgen.path. Oct 2 19:20:45.992293 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:20:45.995639 systemd[1]: Started logrotate.timer. Oct 2 19:20:45.997957 systemd[1]: Started mdadm.timer. Oct 2 19:20:46.000137 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:20:46.002729 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:20:46.002768 systemd[1]: Reached target paths.target. Oct 2 19:20:46.004772 systemd[1]: Reached target timers.target. Oct 2 19:20:46.007075 systemd[1]: Listening on dbus.socket. Oct 2 19:20:46.010166 systemd[1]: Starting docker.socket... Oct 2 19:20:46.019222 systemd[1]: Listening on sshd.socket. Oct 2 19:20:46.021663 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:20:46.022132 systemd[1]: Listening on docker.socket. Oct 2 19:20:46.024508 systemd[1]: Reached target sockets.target. Oct 2 19:20:46.026836 systemd[1]: Reached target basic.target. Oct 2 19:20:46.029279 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:20:46.029314 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:20:46.030417 systemd[1]: Starting containerd.service... Oct 2 19:20:46.033550 systemd[1]: Starting dbus.service... Oct 2 19:20:46.036559 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:20:46.044371 systemd[1]: Starting extend-filesystems.service... Oct 2 19:20:46.047984 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:20:46.049194 systemd[1]: Starting motdgen.service... Oct 2 19:20:46.052552 systemd[1]: Started nvidia.service. Oct 2 19:20:46.055856 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:20:46.059222 systemd[1]: Starting prepare-critools.service... Oct 2 19:20:46.062570 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:20:46.065937 systemd[1]: Starting sshd-keygen.service... Oct 2 19:20:46.070817 systemd[1]: Starting systemd-logind.service... Oct 2 19:20:46.072825 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:20:46.072902 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:20:46.073402 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:20:46.074280 systemd[1]: Starting update-engine.service... Oct 2 19:20:46.078164 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:20:46.093623 jq[1274]: false Oct 2 19:20:46.082709 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:20:46.098490 jq[1284]: true Oct 2 19:20:46.082938 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:20:46.085731 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:20:46.085972 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:20:46.119018 tar[1287]: ./ Oct 2 19:20:46.119018 tar[1287]: ./loopback Oct 2 19:20:46.124240 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:20:46.124447 systemd[1]: Finished motdgen.service. Oct 2 19:20:46.136226 tar[1289]: crictl Oct 2 19:20:46.163552 jq[1293]: true Oct 2 19:20:46.186317 extend-filesystems[1275]: Found sda Oct 2 19:20:46.186850 dbus-daemon[1273]: [system] SELinux support is enabled Oct 2 19:20:46.186995 systemd[1]: Started dbus.service. Oct 2 19:20:46.194547 extend-filesystems[1275]: Found sda1 Oct 2 19:20:46.196118 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:20:46.196144 systemd[1]: Reached target system-config.target. Oct 2 19:20:46.198859 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:20:46.198885 systemd[1]: Reached target user-config.target. Oct 2 19:20:46.207529 extend-filesystems[1275]: Found sda2 Oct 2 19:20:46.209750 extend-filesystems[1275]: Found sda3 Oct 2 19:20:46.212159 extend-filesystems[1275]: Found usr Oct 2 19:20:46.216904 extend-filesystems[1275]: Found sda4 Oct 2 19:20:46.216904 extend-filesystems[1275]: Found sda6 Oct 2 19:20:46.216904 extend-filesystems[1275]: Found sda7 Oct 2 19:20:46.216904 extend-filesystems[1275]: Found sda9 Oct 2 19:20:46.216904 extend-filesystems[1275]: Checking size of /dev/sda9 Oct 2 19:20:46.231942 systemd-logind[1282]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:20:46.249849 extend-filesystems[1275]: Old size kept for /dev/sda9 Oct 2 19:20:46.253914 extend-filesystems[1275]: Found sr0 Oct 2 19:20:46.255837 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:20:46.256000 systemd[1]: Finished extend-filesystems.service. Oct 2 19:20:46.258799 systemd-logind[1282]: New seat seat0. Oct 2 19:20:46.265362 systemd[1]: Started systemd-logind.service. Oct 2 19:20:46.307314 env[1294]: time="2023-10-02T19:20:46.307255568Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:20:46.365004 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:20:46.374910 bash[1330]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:20:46.375627 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:20:46.382326 tar[1287]: ./bandwidth Oct 2 19:20:46.413180 env[1294]: time="2023-10-02T19:20:46.412501078Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:20:46.413180 env[1294]: time="2023-10-02T19:20:46.412713072Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414176 env[1294]: time="2023-10-02T19:20:46.414130231Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414176 env[1294]: time="2023-10-02T19:20:46.414173930Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414496 env[1294]: time="2023-10-02T19:20:46.414449622Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414561 env[1294]: time="2023-10-02T19:20:46.414496321Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414561 env[1294]: time="2023-10-02T19:20:46.414515820Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:20:46.414561 env[1294]: time="2023-10-02T19:20:46.414529020Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414672 env[1294]: time="2023-10-02T19:20:46.414627117Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:46.414933 env[1294]: time="2023-10-02T19:20:46.414902410Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:46.415165 env[1294]: time="2023-10-02T19:20:46.415138703Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:20:46.415219 env[1294]: time="2023-10-02T19:20:46.415167302Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:20:46.415262 env[1294]: time="2023-10-02T19:20:46.415236600Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:20:46.415262 env[1294]: time="2023-10-02T19:20:46.415254100Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:20:46.424255 update_engine[1283]: I1002 19:20:46.423621 1283 main.cc:92] Flatcar Update Engine starting Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439343515Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439402413Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439425713Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439534910Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439556109Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439638407Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439661106Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439681105Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439700405Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439722904Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439741304Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439761303Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.439908199Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:20:46.442179 env[1294]: time="2023-10-02T19:20:46.440009896Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440428584Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440487682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440508182Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440571180Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440590380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440607979Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440680977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440699276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440716776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440734175Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440763775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440784774Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440934870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440954369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.442726 env[1294]: time="2023-10-02T19:20:46.440972369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.443213 env[1294]: time="2023-10-02T19:20:46.440989268Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:20:46.443213 env[1294]: time="2023-10-02T19:20:46.441011768Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:20:46.443213 env[1294]: time="2023-10-02T19:20:46.441027967Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:20:46.443213 env[1294]: time="2023-10-02T19:20:46.441061666Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:20:46.443213 env[1294]: time="2023-10-02T19:20:46.441111065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:20:46.443378 env[1294]: time="2023-10-02T19:20:46.441784046Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:20:46.443378 env[1294]: time="2023-10-02T19:20:46.441863743Z" level=info msg="Connect containerd service" Oct 2 19:20:46.443378 env[1294]: time="2023-10-02T19:20:46.441902342Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:20:46.443378 env[1294]: time="2023-10-02T19:20:46.442959412Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:20:46.462372 update_engine[1283]: I1002 19:20:46.451056 1283 update_check_scheduler.cc:74] Next update check in 8m37s Oct 2 19:20:46.451258 systemd[1]: Started update-engine.service. Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.444505668Z" level=info msg="Start subscribing containerd event" Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.444570966Z" level=info msg="Start recovering state" Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.444655164Z" level=info msg="Start event monitor" Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.444682163Z" level=info msg="Start snapshots syncer" Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.444699263Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.444710962Z" level=info msg="Start streaming server" Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.452209649Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.452251948Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:20:46.462523 env[1294]: time="2023-10-02T19:20:46.452298647Z" level=info msg="containerd successfully booted in 0.158311s" Oct 2 19:20:46.454093 systemd[1]: Started containerd.service. Oct 2 19:20:46.458559 systemd[1]: Started locksmithd.service. Oct 2 19:20:46.513090 tar[1287]: ./ptp Oct 2 19:20:46.605416 tar[1287]: ./vlan Oct 2 19:20:46.654855 tar[1287]: ./host-device Oct 2 19:20:46.698565 tar[1287]: ./tuning Oct 2 19:20:46.737691 tar[1287]: ./vrf Oct 2 19:20:46.778972 tar[1287]: ./sbr Oct 2 19:20:46.817880 tar[1287]: ./tap Oct 2 19:20:46.863524 tar[1287]: ./dhcp Oct 2 19:20:47.021933 tar[1287]: ./static Oct 2 19:20:47.055195 tar[1287]: ./firewall Oct 2 19:20:47.120726 tar[1287]: ./macvlan Oct 2 19:20:47.192669 tar[1287]: ./dummy Oct 2 19:20:47.237023 tar[1287]: ./bridge Oct 2 19:20:47.319951 systemd[1]: Finished prepare-critools.service. Oct 2 19:20:47.334270 tar[1287]: ./ipvlan Oct 2 19:20:47.378747 tar[1287]: ./portmap Oct 2 19:20:47.420880 tar[1287]: ./host-local Oct 2 19:20:47.480396 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:20:47.811480 locksmithd[1361]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:20:48.113132 sshd_keygen[1298]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:20:48.133009 systemd[1]: Finished sshd-keygen.service. Oct 2 19:20:48.137273 systemd[1]: Starting issuegen.service... Oct 2 19:20:48.141049 systemd[1]: Started waagent.service. Oct 2 19:20:48.148582 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:20:48.148770 systemd[1]: Finished issuegen.service. Oct 2 19:20:48.155087 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:20:48.166394 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:20:48.170978 systemd[1]: Started getty@tty1.service. Oct 2 19:20:48.174671 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:20:48.177410 systemd[1]: Reached target getty.target. Oct 2 19:20:48.179786 systemd[1]: Reached target multi-user.target. Oct 2 19:20:48.183580 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:20:48.200306 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:20:48.200465 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:20:48.203651 systemd[1]: Startup finished in 645ms (firmware) + 7.198s (loader) + 959ms (kernel) + 13.956s (initrd) + 11.591s (userspace) = 34.351s. Oct 2 19:20:48.352749 login[1389]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 19:20:48.353124 login[1388]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:20:48.366803 systemd[1]: Created slice user-500.slice. Oct 2 19:20:48.368343 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:20:48.371036 systemd-logind[1282]: New session 1 of user core. Oct 2 19:20:48.384063 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:20:48.385860 systemd[1]: Starting user@500.service... Oct 2 19:20:48.389332 (systemd)[1392]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:48.494344 systemd[1392]: Queued start job for default target default.target. Oct 2 19:20:48.494942 systemd[1392]: Reached target paths.target. Oct 2 19:20:48.494971 systemd[1392]: Reached target sockets.target. Oct 2 19:20:48.494988 systemd[1392]: Reached target timers.target. Oct 2 19:20:48.495004 systemd[1392]: Reached target basic.target. Oct 2 19:20:48.495063 systemd[1392]: Reached target default.target. Oct 2 19:20:48.495099 systemd[1392]: Startup finished in 98ms. Oct 2 19:20:48.495139 systemd[1]: Started user@500.service. Oct 2 19:20:48.496524 systemd[1]: Started session-1.scope. Oct 2 19:20:49.354788 login[1389]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:20:49.360932 systemd[1]: Started session-2.scope. Oct 2 19:20:49.362528 systemd-logind[1282]: New session 2 of user core. Oct 2 19:20:50.225489 waagent[1383]: 2023-10-02T19:20:50.225374Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 19:20:50.241553 waagent[1383]: 2023-10-02T19:20:50.227769Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 19:20:50.241553 waagent[1383]: 2023-10-02T19:20:50.228769Z INFO Daemon Daemon Python: 3.9.16 Oct 2 19:20:50.241553 waagent[1383]: 2023-10-02T19:20:50.229997Z INFO Daemon Daemon Run daemon Oct 2 19:20:50.241553 waagent[1383]: 2023-10-02T19:20:50.231357Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 19:20:50.249031 waagent[1383]: 2023-10-02T19:20:50.248915Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:20:50.256438 waagent[1383]: 2023-10-02T19:20:50.256345Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:20:50.261403 waagent[1383]: 2023-10-02T19:20:50.261340Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:20:50.264053 waagent[1383]: 2023-10-02T19:20:50.263994Z INFO Daemon Daemon Using waagent for provisioning Oct 2 19:20:50.267367 waagent[1383]: 2023-10-02T19:20:50.267304Z INFO Daemon Daemon Activate resource disk Oct 2 19:20:50.270289 waagent[1383]: 2023-10-02T19:20:50.270229Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 19:20:50.280622 waagent[1383]: 2023-10-02T19:20:50.280556Z INFO Daemon Daemon Found device: None Oct 2 19:20:50.283271 waagent[1383]: 2023-10-02T19:20:50.283210Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 19:20:50.287842 waagent[1383]: 2023-10-02T19:20:50.287783Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 19:20:50.294169 waagent[1383]: 2023-10-02T19:20:50.294107Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:20:50.297241 waagent[1383]: 2023-10-02T19:20:50.297184Z INFO Daemon Daemon Running default provisioning handler Oct 2 19:20:50.307566 waagent[1383]: 2023-10-02T19:20:50.307438Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:20:50.315987 waagent[1383]: 2023-10-02T19:20:50.315887Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:20:50.321846 waagent[1383]: 2023-10-02T19:20:50.321780Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:20:50.325856 waagent[1383]: 2023-10-02T19:20:50.323289Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 19:20:50.372526 waagent[1383]: 2023-10-02T19:20:50.370754Z INFO Daemon Daemon Successfully mounted dvd Oct 2 19:20:50.401003 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 19:20:50.410044 waagent[1383]: 2023-10-02T19:20:50.409926Z INFO Daemon Daemon Detect protocol endpoint Oct 2 19:20:50.413831 waagent[1383]: 2023-10-02T19:20:50.413755Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:20:50.416728 waagent[1383]: 2023-10-02T19:20:50.416659Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 19:20:50.420343 waagent[1383]: 2023-10-02T19:20:50.420276Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 19:20:50.423306 waagent[1383]: 2023-10-02T19:20:50.423242Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 19:20:50.426150 waagent[1383]: 2023-10-02T19:20:50.426089Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 19:20:50.465897 waagent[1383]: 2023-10-02T19:20:50.465815Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 19:20:50.474365 waagent[1383]: 2023-10-02T19:20:50.467909Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 19:20:50.474365 waagent[1383]: 2023-10-02T19:20:50.468802Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 19:20:52.363491 waagent[1383]: 2023-10-02T19:20:52.363306Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 19:20:52.373614 waagent[1383]: 2023-10-02T19:20:52.373537Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 19:20:52.379094 waagent[1383]: 2023-10-02T19:20:52.375016Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 19:20:52.448182 waagent[1383]: 2023-10-02T19:20:52.448052Z INFO Daemon Daemon Found private key matching thumbprint FCF794FE3A2D5606F4B865181B666F63EE440C44 Oct 2 19:20:52.459397 waagent[1383]: 2023-10-02T19:20:52.449468Z INFO Daemon Daemon Certificate with thumbprint B6B998DC75ACBEEB5D73F7CDECEF9F32557195F3 has no matching private key. Oct 2 19:20:52.459397 waagent[1383]: 2023-10-02T19:20:52.450537Z INFO Daemon Daemon Fetch goal state completed Oct 2 19:20:52.472518 waagent[1383]: 2023-10-02T19:20:52.472431Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 88bb4dab-6622-4a94-90da-8c2364472ac8 New eTag: 5993256845740033776] Oct 2 19:20:52.480710 waagent[1383]: 2023-10-02T19:20:52.474326Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:20:52.486234 waagent[1383]: 2023-10-02T19:20:52.486179Z INFO Daemon Daemon Starting provisioning Oct 2 19:20:52.494658 waagent[1383]: 2023-10-02T19:20:52.487632Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 19:20:52.494658 waagent[1383]: 2023-10-02T19:20:52.488764Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-78385808f2] Oct 2 19:20:52.497782 waagent[1383]: 2023-10-02T19:20:52.497680Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-78385808f2] Oct 2 19:20:52.506648 waagent[1383]: 2023-10-02T19:20:52.499342Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 19:20:52.506648 waagent[1383]: 2023-10-02T19:20:52.500420Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 19:20:52.513635 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 19:20:52.513896 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 19:20:52.513969 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 19:20:52.514334 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:20:52.519513 systemd-networkd[1152]: eth0: DHCPv6 lease lost Oct 2 19:20:52.520805 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:20:52.520969 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:20:52.523280 systemd[1]: Starting systemd-networkd.service... Oct 2 19:20:52.554517 systemd-networkd[1435]: enP18265s1: Link UP Oct 2 19:20:52.554525 systemd-networkd[1435]: enP18265s1: Gained carrier Oct 2 19:20:52.555916 systemd-networkd[1435]: eth0: Link UP Oct 2 19:20:52.555924 systemd-networkd[1435]: eth0: Gained carrier Oct 2 19:20:52.556366 systemd-networkd[1435]: lo: Link UP Oct 2 19:20:52.556376 systemd-networkd[1435]: lo: Gained carrier Oct 2 19:20:52.556708 systemd-networkd[1435]: eth0: Gained IPv6LL Oct 2 19:20:52.557407 systemd-networkd[1435]: Enumeration completed Oct 2 19:20:52.557646 systemd[1]: Started systemd-networkd.service. Oct 2 19:20:52.563827 waagent[1383]: 2023-10-02T19:20:52.559195Z INFO Daemon Daemon Create user account if not exists Oct 2 19:20:52.562640 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:20:52.569203 waagent[1383]: 2023-10-02T19:20:52.566879Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 19:20:52.569203 waagent[1383]: 2023-10-02T19:20:52.568115Z INFO Daemon Daemon Configure sudoer Oct 2 19:20:52.569567 waagent[1383]: 2023-10-02T19:20:52.569509Z INFO Daemon Daemon Configure sshd Oct 2 19:20:52.570569 waagent[1383]: 2023-10-02T19:20:52.570519Z INFO Daemon Daemon Deploy ssh public key. Oct 2 19:20:52.573556 systemd-networkd[1435]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:20:52.615549 systemd-networkd[1435]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:20:52.618685 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:21:22.928078 waagent[1383]: 2023-10-02T19:21:22.927967Z INFO Daemon Daemon Provisioning complete Oct 2 19:21:22.943898 waagent[1383]: 2023-10-02T19:21:22.943820Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 19:21:22.951362 waagent[1383]: 2023-10-02T19:21:22.945557Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 19:21:22.951362 waagent[1383]: 2023-10-02T19:21:22.947209Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 19:21:23.212902 waagent[1447]: 2023-10-02T19:21:23.212731Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 19:21:23.213644 waagent[1447]: 2023-10-02T19:21:23.213579Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:21:23.213797 waagent[1447]: 2023-10-02T19:21:23.213743Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:21:23.224651 waagent[1447]: 2023-10-02T19:21:23.224578Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 19:21:23.224813 waagent[1447]: 2023-10-02T19:21:23.224761Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 19:21:23.287501 waagent[1447]: 2023-10-02T19:21:23.287344Z INFO ExtHandler ExtHandler Found private key matching thumbprint FCF794FE3A2D5606F4B865181B666F63EE440C44 Oct 2 19:21:23.287752 waagent[1447]: 2023-10-02T19:21:23.287688Z INFO ExtHandler ExtHandler Certificate with thumbprint B6B998DC75ACBEEB5D73F7CDECEF9F32557195F3 has no matching private key. Oct 2 19:21:23.287991 waagent[1447]: 2023-10-02T19:21:23.287941Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 19:21:23.305299 waagent[1447]: 2023-10-02T19:21:23.305234Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: e274643e-8e30-44fb-afd2-222018b02cda New eTag: 5993256845740033776] Oct 2 19:21:23.305904 waagent[1447]: 2023-10-02T19:21:23.305844Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:21:23.351050 waagent[1447]: 2023-10-02T19:21:23.350912Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:21:23.360292 waagent[1447]: 2023-10-02T19:21:23.360204Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1447 Oct 2 19:21:23.363795 waagent[1447]: 2023-10-02T19:21:23.363724Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:21:23.365030 waagent[1447]: 2023-10-02T19:21:23.364971Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:21:23.389065 waagent[1447]: 2023-10-02T19:21:23.389002Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:21:23.389490 waagent[1447]: 2023-10-02T19:21:23.389410Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:21:23.397788 waagent[1447]: 2023-10-02T19:21:23.397730Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:21:23.398281 waagent[1447]: 2023-10-02T19:21:23.398222Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:21:23.399363 waagent[1447]: 2023-10-02T19:21:23.399295Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 19:21:23.400618 waagent[1447]: 2023-10-02T19:21:23.400558Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:21:23.401673 waagent[1447]: 2023-10-02T19:21:23.401614Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:21:23.401836 waagent[1447]: 2023-10-02T19:21:23.401784Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:21:23.402089 waagent[1447]: 2023-10-02T19:21:23.402034Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:21:23.402863 waagent[1447]: 2023-10-02T19:21:23.402809Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:21:23.403043 waagent[1447]: 2023-10-02T19:21:23.402977Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:21:23.403197 waagent[1447]: 2023-10-02T19:21:23.403134Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:21:23.403750 waagent[1447]: 2023-10-02T19:21:23.403696Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:21:23.404325 waagent[1447]: 2023-10-02T19:21:23.404271Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:21:23.404548 waagent[1447]: 2023-10-02T19:21:23.404496Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:21:23.404729 waagent[1447]: 2023-10-02T19:21:23.404680Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:21:23.405093 waagent[1447]: 2023-10-02T19:21:23.405043Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:21:23.406053 waagent[1447]: 2023-10-02T19:21:23.406002Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:21:23.406053 waagent[1447]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:21:23.406053 waagent[1447]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:21:23.406053 waagent[1447]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:21:23.406053 waagent[1447]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:21:23.406053 waagent[1447]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:21:23.406053 waagent[1447]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:21:23.412000 waagent[1447]: 2023-10-02T19:21:23.411912Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:21:23.416408 waagent[1447]: 2023-10-02T19:21:23.411678Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:21:23.416408 waagent[1447]: 2023-10-02T19:21:23.414358Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:21:23.423878 waagent[1447]: 2023-10-02T19:21:23.423825Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 19:21:23.425734 waagent[1447]: 2023-10-02T19:21:23.425685Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:21:23.426034 waagent[1447]: 2023-10-02T19:21:23.425978Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1435' Oct 2 19:21:23.427860 waagent[1447]: 2023-10-02T19:21:23.427805Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 19:21:23.459502 waagent[1447]: 2023-10-02T19:21:23.457702Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:21:23.459502 waagent[1447]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:21:23.459502 waagent[1447]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:21:23.459502 waagent[1447]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:ba:6e:5a brd ff:ff:ff:ff:ff:ff Oct 2 19:21:23.459502 waagent[1447]: 3: enP18265s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:ba:6e:5a brd ff:ff:ff:ff:ff:ff\ altname enP18265p0s2 Oct 2 19:21:23.459502 waagent[1447]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:21:23.459502 waagent[1447]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:21:23.459502 waagent[1447]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:21:23.459502 waagent[1447]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:21:23.459502 waagent[1447]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:21:23.459502 waagent[1447]: 2: eth0 inet6 fe80::20d:3aff:feba:6e5a/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:21:23.480611 waagent[1447]: 2023-10-02T19:21:23.480433Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 19:21:23.574073 waagent[1447]: 2023-10-02T19:21:23.573941Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Oct 2 19:21:23.577178 waagent[1447]: 2023-10-02T19:21:23.577061Z INFO EnvHandler ExtHandler Firewall rules: Oct 2 19:21:23.577178 waagent[1447]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:21:23.577178 waagent[1447]: pkts bytes target prot opt in out source destination Oct 2 19:21:23.577178 waagent[1447]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:21:23.577178 waagent[1447]: pkts bytes target prot opt in out source destination Oct 2 19:21:23.577178 waagent[1447]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:21:23.577178 waagent[1447]: pkts bytes target prot opt in out source destination Oct 2 19:21:23.577178 waagent[1447]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:21:23.577178 waagent[1447]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:21:23.578605 waagent[1447]: 2023-10-02T19:21:23.578547Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 19:21:23.915935 waagent[1447]: 2023-10-02T19:21:23.915856Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.3 -- exiting Oct 2 19:21:23.950752 waagent[1383]: 2023-10-02T19:21:23.950618Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 19:21:23.956573 waagent[1383]: 2023-10-02T19:21:23.956506Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.3 to be the latest agent Oct 2 19:21:24.938924 waagent[1487]: 2023-10-02T19:21:24.938812Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.3) Oct 2 19:21:24.939654 waagent[1487]: 2023-10-02T19:21:24.939586Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 19:21:24.939800 waagent[1487]: 2023-10-02T19:21:24.939747Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 19:21:24.949214 waagent[1487]: 2023-10-02T19:21:24.949116Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:21:24.949633 waagent[1487]: 2023-10-02T19:21:24.949577Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:21:24.949795 waagent[1487]: 2023-10-02T19:21:24.949748Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:21:24.961208 waagent[1487]: 2023-10-02T19:21:24.961134Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 19:21:24.969155 waagent[1487]: 2023-10-02T19:21:24.969091Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 19:21:24.970048 waagent[1487]: 2023-10-02T19:21:24.969988Z INFO ExtHandler Oct 2 19:21:24.970198 waagent[1487]: 2023-10-02T19:21:24.970147Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: bd014336-7e17-4fcd-9534-92eaefbf21fc eTag: 5993256845740033776 source: Fabric] Oct 2 19:21:24.970897 waagent[1487]: 2023-10-02T19:21:24.970839Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 19:21:24.972007 waagent[1487]: 2023-10-02T19:21:24.971950Z INFO ExtHandler Oct 2 19:21:24.972149 waagent[1487]: 2023-10-02T19:21:24.972094Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 19:21:24.982154 waagent[1487]: 2023-10-02T19:21:24.982100Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 19:21:24.982612 waagent[1487]: 2023-10-02T19:21:24.982563Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:21:25.002864 waagent[1487]: 2023-10-02T19:21:25.002791Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 19:21:25.065238 waagent[1487]: 2023-10-02T19:21:25.065100Z INFO ExtHandler Downloaded certificate {'thumbprint': 'FCF794FE3A2D5606F4B865181B666F63EE440C44', 'hasPrivateKey': True} Oct 2 19:21:25.066241 waagent[1487]: 2023-10-02T19:21:25.066165Z INFO ExtHandler Downloaded certificate {'thumbprint': 'B6B998DC75ACBEEB5D73F7CDECEF9F32557195F3', 'hasPrivateKey': False} Oct 2 19:21:25.067224 waagent[1487]: 2023-10-02T19:21:25.067162Z INFO ExtHandler Fetch goal state completed Oct 2 19:21:25.089133 waagent[1487]: 2023-10-02T19:21:25.089054Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.3 running as process 1487 Oct 2 19:21:25.092383 waagent[1487]: 2023-10-02T19:21:25.092314Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:21:25.093855 waagent[1487]: 2023-10-02T19:21:25.093793Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:21:25.098850 waagent[1487]: 2023-10-02T19:21:25.098796Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:21:25.099209 waagent[1487]: 2023-10-02T19:21:25.099153Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:21:25.107083 waagent[1487]: 2023-10-02T19:21:25.107030Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:21:25.107546 waagent[1487]: 2023-10-02T19:21:25.107491Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:21:25.120208 waagent[1487]: 2023-10-02T19:21:25.120111Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Oct 2 19:21:25.122869 waagent[1487]: 2023-10-02T19:21:25.122771Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Oct 2 19:21:25.128198 waagent[1487]: 2023-10-02T19:21:25.128138Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 19:21:25.129581 waagent[1487]: 2023-10-02T19:21:25.129523Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:21:25.130140 waagent[1487]: 2023-10-02T19:21:25.130086Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:21:25.130305 waagent[1487]: 2023-10-02T19:21:25.130256Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:21:25.130853 waagent[1487]: 2023-10-02T19:21:25.130800Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:21:25.131325 waagent[1487]: 2023-10-02T19:21:25.131268Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:21:25.131830 waagent[1487]: 2023-10-02T19:21:25.131775Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:21:25.132121 waagent[1487]: 2023-10-02T19:21:25.132068Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:21:25.132121 waagent[1487]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:21:25.132121 waagent[1487]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:21:25.132121 waagent[1487]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:21:25.132121 waagent[1487]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:21:25.132121 waagent[1487]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:21:25.132121 waagent[1487]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:21:25.132640 waagent[1487]: 2023-10-02T19:21:25.132579Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:21:25.132908 waagent[1487]: 2023-10-02T19:21:25.132856Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:21:25.135681 waagent[1487]: 2023-10-02T19:21:25.135567Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:21:25.136848 waagent[1487]: 2023-10-02T19:21:25.136776Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:21:25.139322 waagent[1487]: 2023-10-02T19:21:25.139276Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:21:25.139440 waagent[1487]: 2023-10-02T19:21:25.139198Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:21:25.141955 waagent[1487]: 2023-10-02T19:21:25.141727Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:21:25.142243 waagent[1487]: 2023-10-02T19:21:25.142141Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:21:25.147073 waagent[1487]: 2023-10-02T19:21:25.146853Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:21:25.161537 waagent[1487]: 2023-10-02T19:21:25.161476Z INFO ExtHandler ExtHandler Downloading agent manifest Oct 2 19:21:25.165365 waagent[1487]: 2023-10-02T19:21:25.165311Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:21:25.165365 waagent[1487]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:21:25.165365 waagent[1487]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:21:25.165365 waagent[1487]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:ba:6e:5a brd ff:ff:ff:ff:ff:ff Oct 2 19:21:25.165365 waagent[1487]: 3: enP18265s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:ba:6e:5a brd ff:ff:ff:ff:ff:ff\ altname enP18265p0s2 Oct 2 19:21:25.165365 waagent[1487]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:21:25.165365 waagent[1487]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:21:25.165365 waagent[1487]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:21:25.165365 waagent[1487]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:21:25.165365 waagent[1487]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:21:25.165365 waagent[1487]: 2: eth0 inet6 fe80::20d:3aff:feba:6e5a/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:21:25.204836 waagent[1487]: 2023-10-02T19:21:25.204725Z INFO ExtHandler ExtHandler Oct 2 19:21:25.205126 waagent[1487]: 2023-10-02T19:21:25.205081Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 0a806584-6189-4ae1-8d01-8a67c447a2fa correlation 0403e694-17c5-45ac-aecf-0949f62e3014 created: 2023-10-02T19:20:03.064636Z] Oct 2 19:21:25.206078 waagent[1487]: 2023-10-02T19:21:25.206007Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 19:21:25.207873 waagent[1487]: 2023-10-02T19:21:25.207815Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Oct 2 19:21:25.236950 waagent[1487]: 2023-10-02T19:21:25.236885Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 19:21:25.267269 waagent[1487]: 2023-10-02T19:21:25.267143Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.3 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 3A9D7F79-51EC-463F-AA04-369E6A4648DC;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 19:21:25.269263 waagent[1487]: 2023-10-02T19:21:25.269201Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 19:21:25.269263 waagent[1487]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:21:25.269263 waagent[1487]: pkts bytes target prot opt in out source destination Oct 2 19:21:25.269263 waagent[1487]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:21:25.269263 waagent[1487]: pkts bytes target prot opt in out source destination Oct 2 19:21:25.269263 waagent[1487]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:21:25.269263 waagent[1487]: pkts bytes target prot opt in out source destination Oct 2 19:21:25.269263 waagent[1487]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 19:21:25.269263 waagent[1487]: 7 704 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:21:25.269263 waagent[1487]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:21:30.313391 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Oct 2 19:21:31.717804 update_engine[1283]: I1002 19:21:31.717633 1283 update_attempter.cc:505] Updating boot flags... Oct 2 19:22:09.922375 systemd[1]: Created slice system-sshd.slice. Oct 2 19:22:09.924655 systemd[1]: Started sshd@0-10.200.8.15:22-10.200.12.6:51194.service. Oct 2 19:22:10.606446 sshd[1568]: Accepted publickey for core from 10.200.12.6 port 51194 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:10.607901 sshd[1568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:10.611513 systemd-logind[1282]: New session 3 of user core. Oct 2 19:22:10.613059 systemd[1]: Started session-3.scope. Oct 2 19:22:11.171105 systemd[1]: Started sshd@1-10.200.8.15:22-10.200.12.6:51200.service. Oct 2 19:22:12.144840 sshd[1573]: Accepted publickey for core from 10.200.12.6 port 51200 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:12.146534 sshd[1573]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:12.151383 systemd[1]: Started session-4.scope. Oct 2 19:22:12.152008 systemd-logind[1282]: New session 4 of user core. Oct 2 19:22:12.586555 sshd[1573]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:12.589227 systemd[1]: sshd@1-10.200.8.15:22-10.200.12.6:51200.service: Deactivated successfully. Oct 2 19:22:12.590054 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:22:12.590837 systemd-logind[1282]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:22:12.591574 systemd-logind[1282]: Removed session 4. Oct 2 19:22:12.689813 systemd[1]: Started sshd@2-10.200.8.15:22-10.200.12.6:51208.service. Oct 2 19:22:13.470556 sshd[1579]: Accepted publickey for core from 10.200.12.6 port 51208 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:13.472206 sshd[1579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:13.477759 systemd[1]: Started session-5.scope. Oct 2 19:22:13.478342 systemd-logind[1282]: New session 5 of user core. Oct 2 19:22:13.904685 sshd[1579]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:13.907926 systemd[1]: sshd@2-10.200.8.15:22-10.200.12.6:51208.service: Deactivated successfully. Oct 2 19:22:13.908835 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:22:13.909492 systemd-logind[1282]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:22:13.910210 systemd-logind[1282]: Removed session 5. Oct 2 19:22:14.012558 systemd[1]: Started sshd@3-10.200.8.15:22-10.200.12.6:51214.service. Oct 2 19:22:14.645073 sshd[1585]: Accepted publickey for core from 10.200.12.6 port 51214 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:14.646750 sshd[1585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:14.652430 systemd[1]: Started session-6.scope. Oct 2 19:22:14.653190 systemd-logind[1282]: New session 6 of user core. Oct 2 19:22:15.090195 sshd[1585]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:15.093778 systemd[1]: sshd@3-10.200.8.15:22-10.200.12.6:51214.service: Deactivated successfully. Oct 2 19:22:15.094793 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:22:15.095566 systemd-logind[1282]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:22:15.096446 systemd-logind[1282]: Removed session 6. Oct 2 19:22:15.195159 systemd[1]: Started sshd@4-10.200.8.15:22-10.200.12.6:51224.service. Oct 2 19:22:15.823559 sshd[1591]: Accepted publickey for core from 10.200.12.6 port 51224 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:15.825230 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:15.830951 systemd[1]: Started session-7.scope. Oct 2 19:22:15.831680 systemd-logind[1282]: New session 7 of user core. Oct 2 19:22:16.231386 sudo[1594]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:22:16.231675 sudo[1594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:22:16.241658 dbus-daemon[1273]: \xd0\xfdf\xb6\x8cU: received setenforce notice (enforcing=1401210672) Oct 2 19:22:16.243428 sudo[1594]: pam_unix(sudo:session): session closed for user root Oct 2 19:22:16.347995 sshd[1591]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:16.351638 systemd[1]: sshd@4-10.200.8.15:22-10.200.12.6:51224.service: Deactivated successfully. Oct 2 19:22:16.352635 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:22:16.353267 systemd-logind[1282]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:22:16.354075 systemd-logind[1282]: Removed session 7. Oct 2 19:22:16.453480 systemd[1]: Started sshd@5-10.200.8.15:22-10.200.12.6:51232.service. Oct 2 19:22:17.096203 sshd[1598]: Accepted publickey for core from 10.200.12.6 port 51232 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:17.097949 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:17.102854 systemd[1]: Started session-8.scope. Oct 2 19:22:17.103450 systemd-logind[1282]: New session 8 of user core. Oct 2 19:22:17.439539 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:22:17.439801 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:22:17.442569 sudo[1602]: pam_unix(sudo:session): session closed for user root Oct 2 19:22:17.447126 sudo[1601]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:22:17.447383 sudo[1601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:22:17.456229 systemd[1]: Stopping audit-rules.service... Oct 2 19:22:17.457000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:22:17.460732 auditctl[1605]: No rules Oct 2 19:22:17.460913 kernel: kauditd_printk_skb: 88 callbacks suppressed Oct 2 19:22:17.460946 kernel: audit: type=1305 audit(1696274537.457:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:22:17.461221 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:22:17.461376 systemd[1]: Stopped audit-rules.service. Oct 2 19:22:17.462840 systemd[1]: Starting audit-rules.service... Oct 2 19:22:17.457000 audit[1605]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb7332f80 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:17.484648 augenrules[1622]: No rules Oct 2 19:22:17.485524 kernel: audit: type=1300 audit(1696274537.457:171): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb7332f80 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:17.485526 systemd[1]: Finished audit-rules.service. Oct 2 19:22:17.486525 sudo[1601]: pam_unix(sudo:session): session closed for user root Oct 2 19:22:17.457000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:22:17.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.493477 kernel: audit: type=1327 audit(1696274537.457:171): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:22:17.493524 kernel: audit: type=1131 audit(1696274537.460:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.514865 kernel: audit: type=1130 audit(1696274537.485:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.486000 audit[1601]: USER_END pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.515478 kernel: audit: type=1106 audit(1696274537.486:174): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.486000 audit[1601]: CRED_DISP pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.544188 kernel: audit: type=1104 audit(1696274537.486:175): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.586593 sshd[1598]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:17.587000 audit[1598]: USER_END pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:17.587000 audit[1598]: CRED_DISP pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:17.589938 systemd[1]: sshd@5-10.200.8.15:22-10.200.12.6:51232.service: Deactivated successfully. Oct 2 19:22:17.590783 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:22:17.591720 systemd-logind[1282]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:22:17.592489 systemd-logind[1282]: Removed session 8. Oct 2 19:22:17.617974 kernel: audit: type=1106 audit(1696274537.587:176): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:17.618077 kernel: audit: type=1104 audit(1696274537.587:177): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:17.618106 kernel: audit: type=1131 audit(1696274537.589:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.12.6:51232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.12.6:51232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:17.691998 systemd[1]: Started sshd@6-10.200.8.15:22-10.200.12.6:54616.service. Oct 2 19:22:17.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:54616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:18.319000 audit[1628]: USER_ACCT pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:18.319949 sshd[1628]: Accepted publickey for core from 10.200.12.6 port 54616 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:18.320000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:18.320000 audit[1628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd6684630 a2=3 a3=0 items=0 ppid=1 pid=1628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:18.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:18.321657 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:18.326972 systemd[1]: Started session-9.scope. Oct 2 19:22:18.327576 systemd-logind[1282]: New session 9 of user core. Oct 2 19:22:18.331000 audit[1628]: USER_START pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:18.332000 audit[1630]: CRED_ACQ pid=1630 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:18.663000 audit[1631]: USER_ACCT pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:18.663805 sudo[1631]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:22:18.663000 audit[1631]: CRED_REFR pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:18.664137 sudo[1631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:22:18.665000 audit[1631]: USER_START pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:19.262689 systemd[1]: Reloading. Oct 2 19:22:19.345264 /usr/lib/systemd/system-generators/torcx-generator[1660]: time="2023-10-02T19:22:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:22:19.345725 /usr/lib/systemd/system-generators/torcx-generator[1660]: time="2023-10-02T19:22:19Z" level=info msg="torcx already run" Oct 2 19:22:19.432626 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:22:19.432646 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:22:19.450580 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit: BPF prog-id=35 op=LOAD Oct 2 19:22:19.518000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.518000 audit: BPF prog-id=36 op=LOAD Oct 2 19:22:19.518000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit: BPF prog-id=37 op=LOAD Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit: BPF prog-id=38 op=LOAD Oct 2 19:22:19.519000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:22:19.519000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit: BPF prog-id=39 op=LOAD Oct 2 19:22:19.520000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit: BPF prog-id=40 op=LOAD Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.520000 audit: BPF prog-id=41 op=LOAD Oct 2 19:22:19.520000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:22:19.520000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit: BPF prog-id=42 op=LOAD Oct 2 19:22:19.524000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.524000 audit: BPF prog-id=43 op=LOAD Oct 2 19:22:19.524000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit: BPF prog-id=44 op=LOAD Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.527000 audit: BPF prog-id=45 op=LOAD Oct 2 19:22:19.527000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:22:19.527000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.528000 audit: BPF prog-id=46 op=LOAD Oct 2 19:22:19.528000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit: BPF prog-id=47 op=LOAD Oct 2 19:22:19.530000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit: BPF prog-id=48 op=LOAD Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:19.530000 audit: BPF prog-id=49 op=LOAD Oct 2 19:22:19.530000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:22:19.530000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:22:19.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:19.542145 systemd[1]: Started kubelet.service. Oct 2 19:22:19.556312 systemd[1]: Starting coreos-metadata.service... Oct 2 19:22:19.621922 coreos-metadata[1730]: Oct 02 19:22:19.621 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 19:22:19.624810 coreos-metadata[1730]: Oct 02 19:22:19.624 INFO Fetch successful Oct 2 19:22:19.624930 coreos-metadata[1730]: Oct 02 19:22:19.624 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Oct 2 19:22:19.626509 coreos-metadata[1730]: Oct 02 19:22:19.626 INFO Fetch successful Oct 2 19:22:19.626745 coreos-metadata[1730]: Oct 02 19:22:19.626 INFO Fetching http://168.63.129.16/machine/b64dcc41-46b1-4ff4-bd7c-a1cf9a7a9e69/a48ec0d2%2D89f7%2D4865%2D8c9f%2D67022afcb7e0.%5Fci%2D3510.3.0%2Da%2D78385808f2?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Oct 2 19:22:19.628497 coreos-metadata[1730]: Oct 02 19:22:19.628 INFO Fetch successful Oct 2 19:22:19.628904 kubelet[1723]: E1002 19:22:19.628857 1723 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:22:19.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:22:19.633662 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:22:19.633773 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:22:19.663820 coreos-metadata[1730]: Oct 02 19:22:19.663 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Oct 2 19:22:19.676201 coreos-metadata[1730]: Oct 02 19:22:19.676 INFO Fetch successful Oct 2 19:22:19.684785 systemd[1]: Finished coreos-metadata.service. Oct 2 19:22:19.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:20.610475 systemd[1]: Stopped kubelet.service. Oct 2 19:22:20.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:20.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:20.626969 systemd[1]: Reloading. Oct 2 19:22:20.685786 /usr/lib/systemd/system-generators/torcx-generator[1789]: time="2023-10-02T19:22:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:22:20.692299 /usr/lib/systemd/system-generators/torcx-generator[1789]: time="2023-10-02T19:22:20Z" level=info msg="torcx already run" Oct 2 19:22:20.794710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:22:20.794729 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:22:20.812802 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:22:20.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.878000 audit: BPF prog-id=50 op=LOAD Oct 2 19:22:20.878000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.879000 audit: BPF prog-id=51 op=LOAD Oct 2 19:22:20.879000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit: BPF prog-id=52 op=LOAD Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit: BPF prog-id=53 op=LOAD Oct 2 19:22:20.880000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:22:20.880000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit: BPF prog-id=54 op=LOAD Oct 2 19:22:20.881000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit: BPF prog-id=55 op=LOAD Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.881000 audit: BPF prog-id=56 op=LOAD Oct 2 19:22:20.881000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:22:20.881000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit: BPF prog-id=57 op=LOAD Oct 2 19:22:20.884000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.884000 audit: BPF prog-id=58 op=LOAD Oct 2 19:22:20.884000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.886000 audit: BPF prog-id=59 op=LOAD Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit: BPF prog-id=60 op=LOAD Oct 2 19:22:20.887000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:22:20.887000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.888000 audit: BPF prog-id=61 op=LOAD Oct 2 19:22:20.888000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit: BPF prog-id=62 op=LOAD Oct 2 19:22:20.889000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit: BPF prog-id=63 op=LOAD Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:20.890000 audit: BPF prog-id=64 op=LOAD Oct 2 19:22:20.890000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:22:20.890000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:22:20.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:20.906975 systemd[1]: Started kubelet.service. Oct 2 19:22:20.956782 kubelet[1852]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:22:20.957151 kubelet[1852]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:22:20.957190 kubelet[1852]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:22:20.957308 kubelet[1852]: I1002 19:22:20.957274 1852 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:22:21.177298 kubelet[1852]: I1002 19:22:21.177262 1852 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:22:21.177298 kubelet[1852]: I1002 19:22:21.177289 1852 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:22:21.177570 kubelet[1852]: I1002 19:22:21.177552 1852 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:22:21.179673 kubelet[1852]: I1002 19:22:21.179647 1852 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:22:21.182666 kubelet[1852]: I1002 19:22:21.182639 1852 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:22:21.182895 kubelet[1852]: I1002 19:22:21.182875 1852 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:22:21.182987 kubelet[1852]: I1002 19:22:21.182971 1852 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:22:21.183111 kubelet[1852]: I1002 19:22:21.182998 1852 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:22:21.183111 kubelet[1852]: I1002 19:22:21.183014 1852 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:22:21.183206 kubelet[1852]: I1002 19:22:21.183123 1852 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:22:21.186365 kubelet[1852]: I1002 19:22:21.186349 1852 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:22:21.186499 kubelet[1852]: I1002 19:22:21.186483 1852 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:22:21.186606 kubelet[1852]: I1002 19:22:21.186596 1852 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:22:21.186693 kubelet[1852]: I1002 19:22:21.186683 1852 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:22:21.187107 kubelet[1852]: E1002 19:22:21.187089 1852 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:21.187523 kubelet[1852]: E1002 19:22:21.187387 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:21.187646 kubelet[1852]: I1002 19:22:21.187612 1852 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:22:21.187953 kubelet[1852]: W1002 19:22:21.187935 1852 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:22:21.188434 kubelet[1852]: I1002 19:22:21.188414 1852 server.go:1168] "Started kubelet" Oct 2 19:22:21.190367 kubelet[1852]: E1002 19:22:21.190351 1852 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:22:21.190504 kubelet[1852]: E1002 19:22:21.190492 1852 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:22:21.190000 audit[1852]: AVC avc: denied { mac_admin } for pid=1852 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:21.190000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:22:21.190000 audit[1852]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d4a810 a1=c0008d8db0 a2=c000d4a7e0 a3=25 items=0 ppid=1 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.190000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:22:21.190924 kubelet[1852]: I1002 19:22:21.190562 1852 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:22:21.190000 audit[1852]: AVC avc: denied { mac_admin } for pid=1852 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:21.190000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:22:21.190000 audit[1852]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c303a0 a1=c000bfc2e8 a2=c00085eff0 a3=25 items=0 ppid=1 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.190000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:22:21.191338 kubelet[1852]: I1002 19:22:21.191280 1852 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:22:21.191478 kubelet[1852]: I1002 19:22:21.190607 1852 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:22:21.193388 kubelet[1852]: I1002 19:22:21.190642 1852 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:22:21.193514 kubelet[1852]: I1002 19:22:21.193498 1852 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:22:21.193970 kubelet[1852]: I1002 19:22:21.193954 1852 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:22:21.197000 audit[1862]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.197000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdca2c5c40 a2=0 a3=7ffdca2c5c2c items=0 ppid=1852 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:22:21.200000 audit[1863]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.200000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffca25ef2d0 a2=0 a3=7ffca25ef2bc items=0 ppid=1852 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:22:21.202149 kubelet[1852]: E1002 19:22:21.201882 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b53d129e52", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 188390482, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 188390482, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.202437 kubelet[1852]: I1002 19:22:21.202168 1852 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:22:21.202615 kubelet[1852]: I1002 19:22:21.202186 1852 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:22:21.205273 kubelet[1852]: W1002 19:22:21.205249 1852 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:22:21.205361 kubelet[1852]: E1002 19:22:21.205289 1852 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:22:21.205361 kubelet[1852]: W1002 19:22:21.205351 1852 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:22:21.205454 kubelet[1852]: E1002 19:22:21.205366 1852 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:22:21.205529 kubelet[1852]: E1002 19:22:21.205423 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b53d3273fe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 190476798, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 190476798, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.205622 kubelet[1852]: E1002 19:22:21.205546 1852 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 2 19:22:21.206480 kubelet[1852]: W1002 19:22:21.206446 1852 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:22:21.206555 kubelet[1852]: E1002 19:22:21.206488 1852 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:22:21.209000 audit[1865]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.209000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcb94a2ae0 a2=0 a3=7ffcb94a2acc items=0 ppid=1852 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:22:21.213000 audit[1867]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.213000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfcee8340 a2=0 a3=7ffcfcee832c items=0 ppid=1852 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:22:21.229000 audit[1870]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.229000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe0769beb0 a2=0 a3=7ffe0769be9c items=0 ppid=1852 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:22:21.230434 kubelet[1852]: I1002 19:22:21.230411 1852 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:22:21.231000 audit[1872]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:21.231000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe941818a0 a2=0 a3=7ffe9418188c items=0 ppid=1852 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:22:21.233000 audit[1875]: NETFILTER_CFG table=mangle:12 family=2 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.233000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff75710b10 a2=0 a3=7fff75710afc items=0 ppid=1852 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:22:21.234448 kubelet[1852]: I1002 19:22:21.234429 1852 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:22:21.236079 kubelet[1852]: I1002 19:22:21.236058 1852 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:22:21.236154 kubelet[1852]: I1002 19:22:21.236090 1852 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:22:21.236154 kubelet[1852]: E1002 19:22:21.236150 1852 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:22:21.237000 audit[1878]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:21.237000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb5a7e140 a2=0 a3=7ffeb5a7e12c items=0 ppid=1852 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:22:21.239380 kubelet[1852]: W1002 19:22:21.239236 1852 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:22:21.239380 kubelet[1852]: E1002 19:22:21.239264 1852 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:22:21.239000 audit[1880]: NETFILTER_CFG table=nat:14 family=2 entries=2 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.240183 kubelet[1852]: E1002 19:22:21.240041 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540146141", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238837569, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238837569, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.240717 kubelet[1852]: I1002 19:22:21.240699 1852 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:22:21.240833 kubelet[1852]: I1002 19:22:21.240719 1852 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:22:21.240833 kubelet[1852]: I1002 19:22:21.240757 1852 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:22:21.241160 kubelet[1852]: E1002 19:22:21.241036 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b54014865d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238847069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238847069, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.239000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdaf6a0520 a2=0 a3=7ffdaf6a050c items=0 ppid=1852 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:22:21.241000 audit[1879]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:21.241000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd006506e0 a2=0 a3=7ffd006506cc items=0 ppid=1852 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:22:21.242105 kubelet[1852]: E1002 19:22:21.242026 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540149dcd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238853069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238853069, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.242000 audit[1883]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:21.242000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdab679640 a2=0 a3=7ffdab67962c items=0 ppid=1852 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:22:21.243000 audit[1882]: NETFILTER_CFG table=filter:17 family=10 entries=2 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:21.243000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0f8f2320 a2=0 a3=7ffe0f8f230c items=0 ppid=1852 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:22:21.246270 kubelet[1852]: I1002 19:22:21.246255 1852 policy_none.go:49] "None policy: Start" Oct 2 19:22:21.246912 kubelet[1852]: I1002 19:22:21.246896 1852 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:22:21.246982 kubelet[1852]: I1002 19:22:21.246946 1852 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:22:21.259396 systemd[1]: Created slice kubepods.slice. Oct 2 19:22:21.263446 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:22:21.266356 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:22:21.272093 kubelet[1852]: I1002 19:22:21.272070 1852 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:22:21.271000 audit[1852]: AVC avc: denied { mac_admin } for pid=1852 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:21.271000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:22:21.271000 audit[1852]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f250e0 a1=c000f1bd10 a2=c000f250b0 a3=25 items=0 ppid=1 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:21.271000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:22:21.272422 kubelet[1852]: I1002 19:22:21.272165 1852 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:22:21.272422 kubelet[1852]: I1002 19:22:21.272351 1852 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:22:21.274164 kubelet[1852]: E1002 19:22:21.274144 1852 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.15\" not found" Oct 2 19:22:21.276272 kubelet[1852]: E1002 19:22:21.276202 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b5423f9dcd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 275225549, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 275225549, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.303472 kubelet[1852]: I1002 19:22:21.303428 1852 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Oct 2 19:22:21.304761 kubelet[1852]: E1002 19:22:21.304728 1852 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.15" Oct 2 19:22:21.305485 kubelet[1852]: E1002 19:22:21.305410 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540146141", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238837569, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 303384165, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b540146141" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.306390 kubelet[1852]: E1002 19:22:21.306329 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b54014865d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238847069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 303396165, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b54014865d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.307270 kubelet[1852]: E1002 19:22:21.307221 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540149dcd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238853069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 303401166, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b540149dcd" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.406756 kubelet[1852]: E1002 19:22:21.406712 1852 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 2 19:22:21.508506 kubelet[1852]: I1002 19:22:21.505913 1852 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Oct 2 19:22:21.508506 kubelet[1852]: E1002 19:22:21.507597 1852 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.15" Oct 2 19:22:21.508506 kubelet[1852]: E1002 19:22:21.507666 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540146141", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238837569, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 505857322, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b540146141" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.509219 kubelet[1852]: E1002 19:22:21.509122 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b54014865d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238847069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 505871022, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b54014865d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.510488 kubelet[1852]: E1002 19:22:21.510374 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540149dcd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238853069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 505876522, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b540149dcd" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.808786 kubelet[1852]: E1002 19:22:21.808658 1852 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 2 19:22:21.909065 kubelet[1852]: I1002 19:22:21.909021 1852 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Oct 2 19:22:21.910608 kubelet[1852]: E1002 19:22:21.910517 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540146141", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238837569, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 908956620, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b540146141" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.911102 kubelet[1852]: E1002 19:22:21.911080 1852 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.15" Oct 2 19:22:21.913630 kubelet[1852]: E1002 19:22:21.912234 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b54014865d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238847069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 908983020, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b54014865d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:21.914091 kubelet[1852]: E1002 19:22:21.914032 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.178a60b540149dcd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 238853069, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 22, 21, 908988020, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.178a60b540149dcd" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:22:22.179298 kubelet[1852]: I1002 19:22:22.179239 1852 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:22:22.188671 kubelet[1852]: E1002 19:22:22.188597 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:22.565191 kubelet[1852]: E1002 19:22:22.565067 1852 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.15" not found Oct 2 19:22:22.612478 kubelet[1852]: E1002 19:22:22.612431 1852 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.15\" not found" node="10.200.8.15" Oct 2 19:22:22.712219 kubelet[1852]: I1002 19:22:22.712174 1852 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Oct 2 19:22:22.716159 kubelet[1852]: I1002 19:22:22.716130 1852 kubelet_node_status.go:73] "Successfully registered node" node="10.200.8.15" Oct 2 19:22:22.831876 kubelet[1852]: I1002 19:22:22.831685 1852 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:22:22.832426 env[1294]: time="2023-10-02T19:22:22.832384069Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:22:22.833048 kubelet[1852]: I1002 19:22:22.833022 1852 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:22:22.924586 sudo[1631]: pam_unix(sudo:session): session closed for user root Oct 2 19:22:22.924000 audit[1631]: USER_END pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:22.928820 kernel: kauditd_printk_skb: 409 callbacks suppressed Oct 2 19:22:22.928867 kernel: audit: type=1106 audit(1696274542.924:553): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:22.924000 audit[1631]: CRED_DISP pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:22.955815 kernel: audit: type=1104 audit(1696274542.924:554): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:22:23.024242 sshd[1628]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:23.025000 audit[1628]: USER_END pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.027864 systemd[1]: sshd@6-10.200.8.15:22-10.200.12.6:54616.service: Deactivated successfully. Oct 2 19:22:23.028901 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:22:23.030819 systemd-logind[1282]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:22:23.032059 systemd-logind[1282]: Removed session 9. Oct 2 19:22:23.025000 audit[1628]: CRED_DISP pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.061571 kernel: audit: type=1106 audit(1696274543.025:555): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.061638 kernel: audit: type=1104 audit(1696274543.025:556): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.061656 kernel: audit: type=1131 audit(1696274543.025:557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:54616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:23.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:54616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:23.189304 kubelet[1852]: E1002 19:22:23.189248 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:23.189304 kubelet[1852]: I1002 19:22:23.189268 1852 apiserver.go:52] "Watching apiserver" Oct 2 19:22:23.191813 kubelet[1852]: I1002 19:22:23.191764 1852 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:22:23.192135 kubelet[1852]: I1002 19:22:23.192109 1852 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:22:23.199025 systemd[1]: Created slice kubepods-besteffort-podffde29d0_61c1_4fc1_b204_1b060e4db139.slice. Oct 2 19:22:23.203842 systemd[1]: Created slice kubepods-besteffort-poda7aac703_1393_49ea_861f_a3bd4ac1f892.slice. Oct 2 19:22:23.205031 kubelet[1852]: I1002 19:22:23.205006 1852 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:22:23.214641 kubelet[1852]: I1002 19:22:23.214610 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-policysync\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.214759 kubelet[1852]: I1002 19:22:23.214673 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-cni-net-dir\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.214759 kubelet[1852]: I1002 19:22:23.214712 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-flexvol-driver-host\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.214759 kubelet[1852]: I1002 19:22:23.214743 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a7aac703-1393-49ea-861f-a3bd4ac1f892-xtables-lock\") pod \"kube-proxy-tfdbp\" (UID: \"a7aac703-1393-49ea-861f-a3bd4ac1f892\") " pod="kube-system/kube-proxy-tfdbp" Oct 2 19:22:23.214887 kubelet[1852]: I1002 19:22:23.214779 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-xtables-lock\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.214887 kubelet[1852]: I1002 19:22:23.214815 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ffde29d0-61c1-4fc1-b204-1b060e4db139-node-certs\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.214887 kubelet[1852]: I1002 19:22:23.214848 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-var-lib-calico\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.214887 kubelet[1852]: I1002 19:22:23.214883 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-cni-log-dir\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.215034 kubelet[1852]: I1002 19:22:23.214920 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vwr29\" (UniqueName: \"kubernetes.io/projected/a7aac703-1393-49ea-861f-a3bd4ac1f892-kube-api-access-vwr29\") pod \"kube-proxy-tfdbp\" (UID: \"a7aac703-1393-49ea-861f-a3bd4ac1f892\") " pod="kube-system/kube-proxy-tfdbp" Oct 2 19:22:23.215034 kubelet[1852]: I1002 19:22:23.214954 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ffde29d0-61c1-4fc1-b204-1b060e4db139-tigera-ca-bundle\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.215034 kubelet[1852]: I1002 19:22:23.215008 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a7aac703-1393-49ea-861f-a3bd4ac1f892-kube-proxy\") pod \"kube-proxy-tfdbp\" (UID: \"a7aac703-1393-49ea-861f-a3bd4ac1f892\") " pod="kube-system/kube-proxy-tfdbp" Oct 2 19:22:23.215145 kubelet[1852]: I1002 19:22:23.215044 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-lib-modules\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.215145 kubelet[1852]: I1002 19:22:23.215082 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-var-run-calico\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.215145 kubelet[1852]: I1002 19:22:23.215119 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ffde29d0-61c1-4fc1-b204-1b060e4db139-cni-bin-dir\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.215260 kubelet[1852]: I1002 19:22:23.215154 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gkddb\" (UniqueName: \"kubernetes.io/projected/ffde29d0-61c1-4fc1-b204-1b060e4db139-kube-api-access-gkddb\") pod \"calico-node-r8jn4\" (UID: \"ffde29d0-61c1-4fc1-b204-1b060e4db139\") " pod="calico-system/calico-node-r8jn4" Oct 2 19:22:23.215260 kubelet[1852]: I1002 19:22:23.215189 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a7aac703-1393-49ea-861f-a3bd4ac1f892-lib-modules\") pod \"kube-proxy-tfdbp\" (UID: \"a7aac703-1393-49ea-861f-a3bd4ac1f892\") " pod="kube-system/kube-proxy-tfdbp" Oct 2 19:22:23.215260 kubelet[1852]: I1002 19:22:23.215206 1852 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:22:23.318425 kubelet[1852]: E1002 19:22:23.318376 1852 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:22:23.318425 kubelet[1852]: W1002 19:22:23.318410 1852 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:22:23.318425 kubelet[1852]: E1002 19:22:23.318438 1852 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:22:23.334955 kubelet[1852]: E1002 19:22:23.328685 1852 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:22:23.334955 kubelet[1852]: W1002 19:22:23.328705 1852 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:22:23.334955 kubelet[1852]: E1002 19:22:23.328728 1852 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:22:23.336101 kubelet[1852]: E1002 19:22:23.336080 1852 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:22:23.336280 kubelet[1852]: W1002 19:22:23.336265 1852 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:22:23.336374 kubelet[1852]: E1002 19:22:23.336364 1852 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:22:23.336894 kubelet[1852]: E1002 19:22:23.336876 1852 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:22:23.336894 kubelet[1852]: W1002 19:22:23.336889 1852 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:22:23.337003 kubelet[1852]: E1002 19:22:23.336914 1852 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:22:23.512712 env[1294]: time="2023-10-02T19:22:23.512566087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tfdbp,Uid:a7aac703-1393-49ea-861f-a3bd4ac1f892,Namespace:kube-system,Attempt:0,}" Oct 2 19:22:23.514547 env[1294]: time="2023-10-02T19:22:23.512589587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r8jn4,Uid:ffde29d0-61c1-4fc1-b204-1b060e4db139,Namespace:calico-system,Attempt:0,}" Oct 2 19:22:24.190286 kubelet[1852]: E1002 19:22:24.190229 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:24.507755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4287634555.mount: Deactivated successfully. Oct 2 19:22:24.527712 env[1294]: time="2023-10-02T19:22:24.527653943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.530622 env[1294]: time="2023-10-02T19:22:24.530580164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.541513 env[1294]: time="2023-10-02T19:22:24.541475343Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.544954 env[1294]: time="2023-10-02T19:22:24.544915967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.550522 env[1294]: time="2023-10-02T19:22:24.550488707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.553611 env[1294]: time="2023-10-02T19:22:24.553574529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.556520 env[1294]: time="2023-10-02T19:22:24.556491650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.559568 env[1294]: time="2023-10-02T19:22:24.559537672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:24.621639 env[1294]: time="2023-10-02T19:22:24.618626995Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:22:24.621639 env[1294]: time="2023-10-02T19:22:24.618705996Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:22:24.621639 env[1294]: time="2023-10-02T19:22:24.618724996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:22:24.621639 env[1294]: time="2023-10-02T19:22:24.618878297Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0 pid=1907 runtime=io.containerd.runc.v2 Oct 2 19:22:24.622383 env[1294]: time="2023-10-02T19:22:24.619344401Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:22:24.622383 env[1294]: time="2023-10-02T19:22:24.619389001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:22:24.622383 env[1294]: time="2023-10-02T19:22:24.619398701Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:22:24.622383 env[1294]: time="2023-10-02T19:22:24.619892805Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2ecbd3a17f2d4be32067764394731bdbc7cb1b44a62653231ee92fee31a9f43 pid=1909 runtime=io.containerd.runc.v2 Oct 2 19:22:24.644251 systemd[1]: Started cri-containerd-3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0.scope. Oct 2 19:22:24.653779 systemd[1]: Started cri-containerd-a2ecbd3a17f2d4be32067764394731bdbc7cb1b44a62653231ee92fee31a9f43.scope. Oct 2 19:22:24.685801 kernel: audit: type=1400 audit(1696274544.671:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.721490 kernel: audit: type=1400 audit(1696274544.671:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.721598 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:22:24.721618 kernel: audit: type=1400 audit(1696274544.671:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.721657 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.671000 audit: BPF prog-id=65 op=LOAD Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1907 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366616331373564313334346365393565653865643539356264393630 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1907 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366616331373564313334346365393565653865643539356264393630 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.685000 audit: BPF prog-id=66 op=LOAD Oct 2 19:22:24.685000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000110600 items=0 ppid=1907 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366616331373564313334346365393565653865643539356264393630 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit: BPF prog-id=67 op=LOAD Oct 2 19:22:24.686000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000110648 items=0 ppid=1907 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366616331373564313334346365393565653865643539356264393630 Oct 2 19:22:24.686000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:22:24.686000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.686000 audit: BPF prog-id=68 op=LOAD Oct 2 19:22:24.686000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000110a58 items=0 ppid=1907 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366616331373564313334346365393565653865643539356264393630 Oct 2 19:22:24.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.729000 audit: BPF prog-id=69 op=LOAD Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1909 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656362643361313766326434626533323036373736343339343733 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1909 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656362643361313766326434626533323036373736343339343733 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit: BPF prog-id=70 op=LOAD Oct 2 19:22:24.730000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd200 items=0 ppid=1909 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656362643361313766326434626533323036373736343339343733 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit: BPF prog-id=71 op=LOAD Oct 2 19:22:24.730000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd248 items=0 ppid=1909 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656362643361313766326434626533323036373736343339343733 Oct 2 19:22:24.730000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:22:24.730000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:24.730000 audit: BPF prog-id=72 op=LOAD Oct 2 19:22:24.730000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dd658 items=0 ppid=1909 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:24.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656362643361313766326434626533323036373736343339343733 Oct 2 19:22:24.748326 env[1294]: time="2023-10-02T19:22:24.748280525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r8jn4,Uid:ffde29d0-61c1-4fc1-b204-1b060e4db139,Namespace:calico-system,Attempt:0,} returns sandbox id \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\"" Oct 2 19:22:24.750881 env[1294]: time="2023-10-02T19:22:24.750840143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:22:24.752097 env[1294]: time="2023-10-02T19:22:24.752066852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tfdbp,Uid:a7aac703-1393-49ea-861f-a3bd4ac1f892,Namespace:kube-system,Attempt:0,} returns sandbox id \"a2ecbd3a17f2d4be32067764394731bdbc7cb1b44a62653231ee92fee31a9f43\"" Oct 2 19:22:25.191218 kubelet[1852]: E1002 19:22:25.191177 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:26.191407 kubelet[1852]: E1002 19:22:26.191358 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:27.192303 kubelet[1852]: E1002 19:22:27.192264 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:28.120667 env[1294]: time="2023-10-02T19:22:28.120605867Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:28.127270 env[1294]: time="2023-10-02T19:22:28.127223110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:28.132715 env[1294]: time="2023-10-02T19:22:28.132673046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:28.137152 env[1294]: time="2023-10-02T19:22:28.137113375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:28.137877 env[1294]: time="2023-10-02T19:22:28.137843980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:22:28.140087 env[1294]: time="2023-10-02T19:22:28.139539191Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:22:28.140396 env[1294]: time="2023-10-02T19:22:28.140360496Z" level=info msg="CreateContainer within sandbox \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:22:28.172489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2115493483.mount: Deactivated successfully. Oct 2 19:22:28.178836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1026000019.mount: Deactivated successfully. Oct 2 19:22:28.193413 kubelet[1852]: E1002 19:22:28.193355 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:28.198323 env[1294]: time="2023-10-02T19:22:28.198274076Z" level=info msg="CreateContainer within sandbox \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a\"" Oct 2 19:22:28.199072 env[1294]: time="2023-10-02T19:22:28.199031081Z" level=info msg="StartContainer for \"27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a\"" Oct 2 19:22:28.219363 systemd[1]: Started cri-containerd-27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a.scope. Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.243498 kernel: kauditd_printk_skb: 111 callbacks suppressed Oct 2 19:22:28.243567 kernel: audit: type=1400 audit(1696274548.235:593): avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1907 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:28.276687 kernel: audit: type=1300 audit(1696274548.235:593): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1907 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:28.276779 kernel: audit: type=1327 audit(1696274548.235:593): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626665643666306136656130336165323263636437313166376465 Oct 2 19:22:28.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626665643666306136656130336165323263636437313166376465 Oct 2 19:22:28.298827 env[1294]: time="2023-10-02T19:22:28.297911628Z" level=info msg="StartContainer for \"27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a\" returns successfully" Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.313261 systemd[1]: cri-containerd-27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a.scope: Deactivated successfully. Oct 2 19:22:28.327063 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.327159 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.327186 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.353551 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.477112 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.477232 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.477283 kernel: audit: type=1400 audit(1696274548.235:594): avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit: BPF prog-id=73 op=LOAD Oct 2 19:22:28.235000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002bfee0 items=0 ppid=1907 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:28.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626665643666306136656130336165323263636437313166376465 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit: BPF prog-id=74 op=LOAD Oct 2 19:22:28.235000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002bff28 items=0 ppid=1907 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:28.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626665643666306136656130336165323263636437313166376465 Oct 2 19:22:28.235000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:22:28.235000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:28.235000 audit: BPF prog-id=75 op=LOAD Oct 2 19:22:28.235000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002bffb8 items=0 ppid=1907 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:28.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626665643666306136656130336165323263636437313166376465 Oct 2 19:22:28.379000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:22:28.524100 env[1294]: time="2023-10-02T19:22:28.524038908Z" level=info msg="shim disconnected" id=27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a Oct 2 19:22:28.524100 env[1294]: time="2023-10-02T19:22:28.524096709Z" level=warning msg="cleaning up after shim disconnected" id=27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a namespace=k8s.io Oct 2 19:22:28.524404 env[1294]: time="2023-10-02T19:22:28.524111009Z" level=info msg="cleaning up dead shim" Oct 2 19:22:28.532654 env[1294]: time="2023-10-02T19:22:28.532614965Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:22:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2026 runtime=io.containerd.runc.v2\n" Oct 2 19:22:29.169910 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-27bfed6f0a6ea03ae22ccd711f7de6fc226203caa442bcea36ac9067955fc19a-rootfs.mount: Deactivated successfully. Oct 2 19:22:29.193758 kubelet[1852]: E1002 19:22:29.193706 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:29.288407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount800984864.mount: Deactivated successfully. Oct 2 19:22:29.830124 env[1294]: time="2023-10-02T19:22:29.830067041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:29.836250 env[1294]: time="2023-10-02T19:22:29.836190980Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:29.842901 env[1294]: time="2023-10-02T19:22:29.842849723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:29.846556 env[1294]: time="2023-10-02T19:22:29.846515646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:29.846940 env[1294]: time="2023-10-02T19:22:29.846908549Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:22:29.848213 env[1294]: time="2023-10-02T19:22:29.848182857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:22:29.849067 env[1294]: time="2023-10-02T19:22:29.849042162Z" level=info msg="CreateContainer within sandbox \"a2ecbd3a17f2d4be32067764394731bdbc7cb1b44a62653231ee92fee31a9f43\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:22:29.889651 env[1294]: time="2023-10-02T19:22:29.889597922Z" level=info msg="CreateContainer within sandbox \"a2ecbd3a17f2d4be32067764394731bdbc7cb1b44a62653231ee92fee31a9f43\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"dc0009f649f3ed2d4a73455b622c25fef2773dabf2ac876f71e333e32e9752a3\"" Oct 2 19:22:29.890288 env[1294]: time="2023-10-02T19:22:29.890221226Z" level=info msg="StartContainer for \"dc0009f649f3ed2d4a73455b622c25fef2773dabf2ac876f71e333e32e9752a3\"" Oct 2 19:22:29.912261 systemd[1]: Started cri-containerd-dc0009f649f3ed2d4a73455b622c25fef2773dabf2ac876f71e333e32e9752a3.scope. Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=1909 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303030396636343966336564326434613733343535623632326332 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.927000 audit: BPF prog-id=76 op=LOAD Oct 2 19:22:29.927000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c00032dc10 items=0 ppid=1909 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303030396636343966336564326434613733343535623632326332 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.928000 audit: BPF prog-id=77 op=LOAD Oct 2 19:22:29.928000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c00032dc58 items=0 ppid=1909 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303030396636343966336564326434613733343535623632326332 Oct 2 19:22:29.929000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:22:29.929000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { perfmon } for pid=2049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit[2049]: AVC avc: denied { bpf } for pid=2049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:29.929000 audit: BPF prog-id=78 op=LOAD Oct 2 19:22:29.929000 audit[2049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c00032dce8 items=0 ppid=1909 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303030396636343966336564326434613733343535623632326332 Oct 2 19:22:29.949279 env[1294]: time="2023-10-02T19:22:29.949232904Z" level=info msg="StartContainer for \"dc0009f649f3ed2d4a73455b622c25fef2773dabf2ac876f71e333e32e9752a3\" returns successfully" Oct 2 19:22:29.994000 audit[2101]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:29.994000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0d37e020 a2=0 a3=7fff0d37e00c items=0 ppid=2060 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:22:29.996000 audit[2102]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:29.996000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd506a1d40 a2=0 a3=7ffd506a1d2c items=0 ppid=2060 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:22:29.997000 audit[2103]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:29.997000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe85024370 a2=0 a3=7ffe8502435c items=0 ppid=2060 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:22:29.999000 audit[2104]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:29.999000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff4499b00 a2=0 a3=7ffff4499aec items=0 ppid=2060 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:29.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:22:30.000000 audit[2105]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.000000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc3dd56e0 a2=0 a3=7fffc3dd56cc items=0 ppid=2060 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:22:30.002000 audit[2106]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.002000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8641cd90 a2=0 a3=7ffe8641cd7c items=0 ppid=2060 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:22:30.099000 audit[2107]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.099000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe6169c760 a2=0 a3=7ffe6169c74c items=0 ppid=2060 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:22:30.103000 audit[2109]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.103000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd1433a2b0 a2=0 a3=7ffd1433a29c items=0 ppid=2060 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:22:30.106000 audit[2112]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.106000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd87499780 a2=0 a3=7ffd8749976c items=0 ppid=2060 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:22:30.107000 audit[2113]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.107000 audit[2113]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdad508bb0 a2=0 a3=7ffdad508b9c items=0 ppid=2060 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:22:30.110000 audit[2115]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.110000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4f203510 a2=0 a3=7ffe4f2034fc items=0 ppid=2060 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:22:30.111000 audit[2116]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.111000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4479aef0 a2=0 a3=7fff4479aedc items=0 ppid=2060 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:22:30.113000 audit[2118]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.113000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff25655200 a2=0 a3=7fff256551ec items=0 ppid=2060 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:22:30.117000 audit[2121]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.117000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd80cd5e40 a2=0 a3=7ffd80cd5e2c items=0 ppid=2060 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:22:30.118000 audit[2122]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.118000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6f68b6d0 a2=0 a3=7ffc6f68b6bc items=0 ppid=2060 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:22:30.120000 audit[2124]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.120000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd4aca090 a2=0 a3=7fffd4aca07c items=0 ppid=2060 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:22:30.121000 audit[2125]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.121000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd74fb6010 a2=0 a3=7ffd74fb5ffc items=0 ppid=2060 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:22:30.124000 audit[2127]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.124000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffff0be110 a2=0 a3=7fffff0be0fc items=0 ppid=2060 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:22:30.127000 audit[2130]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.127000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc98029950 a2=0 a3=7ffc9802993c items=0 ppid=2060 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:22:30.131000 audit[2133]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.131000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffedb2f510 a2=0 a3=7fffedb2f4fc items=0 ppid=2060 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:22:30.132000 audit[2134]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.132000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff02a687f0 a2=0 a3=7fff02a687dc items=0 ppid=2060 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:22:30.134000 audit[2136]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.134000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc82b5250 a2=0 a3=7ffdc82b523c items=0 ppid=2060 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:22:30.170000 audit[2141]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.170000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe7caac0d0 a2=0 a3=7ffe7caac0bc items=0 ppid=2060 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:22:30.176000 audit[2146]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.176000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb7865090 a2=0 a3=7ffdb786507c items=0 ppid=2060 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:22:30.179000 audit[2148]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:22:30.179000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffebadc2b90 a2=0 a3=7ffebadc2b7c items=0 ppid=2060 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:22:30.194453 kubelet[1852]: E1002 19:22:30.194380 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:30.200000 audit[2150]: NETFILTER_CFG table=filter:43 family=2 entries=6 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:22:30.200000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc494bf910 a2=0 a3=7ffc494bf8fc items=0 ppid=2060 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:22:30.231000 audit[2150]: NETFILTER_CFG table=nat:44 family=2 entries=54 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:22:30.231000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc494bf910 a2=0 a3=7ffc494bf8fc items=0 ppid=2060 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:22:30.253000 audit[2159]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.253000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc1a7676e0 a2=0 a3=7ffc1a7676cc items=0 ppid=2060 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:22:30.258000 audit[2161]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.258000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc15def730 a2=0 a3=7ffc15def71c items=0 ppid=2060 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:22:30.262000 audit[2164]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.262000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8e133780 a2=0 a3=7fff8e13376c items=0 ppid=2060 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:22:30.263000 audit[2165]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.263000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcaf66a50 a2=0 a3=7ffdcaf66a3c items=0 ppid=2060 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:22:30.265890 kubelet[1852]: I1002 19:22:30.265850 1852 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-tfdbp" podStartSLOduration=3.171363602 podCreationTimestamp="2023-10-02 19:22:22 +0000 UTC" firstStartedPulling="2023-10-02 19:22:24.752907258 +0000 UTC m=+3.841494223" lastFinishedPulling="2023-10-02 19:22:29.847346551 +0000 UTC m=+8.935933516" observedRunningTime="2023-10-02 19:22:30.265665594 +0000 UTC m=+9.354252559" watchObservedRunningTime="2023-10-02 19:22:30.265802895 +0000 UTC m=+9.354389960" Oct 2 19:22:30.266000 audit[2167]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.266000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd66f3e060 a2=0 a3=7ffd66f3e04c items=0 ppid=2060 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:22:30.267000 audit[2168]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.267000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff502ad6b0 a2=0 a3=7fff502ad69c items=0 ppid=2060 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:22:30.270000 audit[2170]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.270000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8c6fc270 a2=0 a3=7ffc8c6fc25c items=0 ppid=2060 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:22:30.273000 audit[2173]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.273000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc04373a50 a2=0 a3=7ffc04373a3c items=0 ppid=2060 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:22:30.275000 audit[2174]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.275000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd578ca1f0 a2=0 a3=7ffd578ca1dc items=0 ppid=2060 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:22:30.277000 audit[2176]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.277000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffceb5badd0 a2=0 a3=7ffceb5badbc items=0 ppid=2060 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:22:30.278000 audit[2177]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.278000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff327ea0c0 a2=0 a3=7fff327ea0ac items=0 ppid=2060 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:22:30.280000 audit[2179]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.280000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2b7ef5d0 a2=0 a3=7fff2b7ef5bc items=0 ppid=2060 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:22:30.284000 audit[2182]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.284000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff684101e0 a2=0 a3=7fff684101cc items=0 ppid=2060 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:22:30.287000 audit[2185]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.287000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce7df8e80 a2=0 a3=7ffce7df8e6c items=0 ppid=2060 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:22:30.289000 audit[2186]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.289000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc39786950 a2=0 a3=7ffc3978693c items=0 ppid=2060 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:22:30.291000 audit[2188]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.291000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffccb2b8020 a2=0 a3=7ffccb2b800c items=0 ppid=2060 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:22:30.294000 audit[2191]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.294000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeab9f3430 a2=0 a3=7ffeab9f341c items=0 ppid=2060 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:22:30.295000 audit[2192]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.295000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee870aaf0 a2=0 a3=7ffee870aadc items=0 ppid=2060 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:22:30.297000 audit[2194]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.297000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0d832a30 a2=0 a3=7ffd0d832a1c items=0 ppid=2060 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:22:30.301000 audit[2197]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.301000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc910e23b0 a2=0 a3=7ffc910e239c items=0 ppid=2060 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:22:30.302000 audit[2198]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.302000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe14573b30 a2=0 a3=7ffe14573b1c items=0 ppid=2060 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:22:30.304000 audit[2200]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:22:30.304000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffef9edafe0 a2=0 a3=7ffef9edafcc items=0 ppid=2060 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:22:30.307000 audit[2202]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:22:30.307000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd154121e0 a2=0 a3=7ffd154121cc items=0 ppid=2060 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.307000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:22:30.307000 audit[2202]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:22:30.307000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd154121e0 a2=0 a3=7ffd154121cc items=0 ppid=2060 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:30.307000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:22:31.195297 kubelet[1852]: E1002 19:22:31.195255 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:31.486241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4088562591.mount: Deactivated successfully. Oct 2 19:22:32.195880 kubelet[1852]: E1002 19:22:32.195833 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:33.196758 kubelet[1852]: E1002 19:22:33.196694 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:34.197084 kubelet[1852]: E1002 19:22:34.197024 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:34.825716 env[1294]: time="2023-10-02T19:22:34.825658957Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:34.830537 env[1294]: time="2023-10-02T19:22:34.830490885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:34.834354 env[1294]: time="2023-10-02T19:22:34.834319607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:34.837714 env[1294]: time="2023-10-02T19:22:34.837681727Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:34.838262 env[1294]: time="2023-10-02T19:22:34.838227830Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:22:34.840296 env[1294]: time="2023-10-02T19:22:34.840262441Z" level=info msg="CreateContainer within sandbox \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:22:34.876588 env[1294]: time="2023-10-02T19:22:34.876536850Z" level=info msg="CreateContainer within sandbox \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f\"" Oct 2 19:22:34.877297 env[1294]: time="2023-10-02T19:22:34.877264454Z" level=info msg="StartContainer for \"35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f\"" Oct 2 19:22:34.909291 systemd[1]: run-containerd-runc-k8s.io-35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f-runc.EwCL8p.mount: Deactivated successfully. Oct 2 19:22:34.911831 systemd[1]: Started cri-containerd-35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f.scope. Oct 2 19:22:34.948528 kernel: kauditd_printk_skb: 230 callbacks suppressed Oct 2 19:22:34.948691 kernel: audit: type=1400 audit(1696274554.928:657): avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=1907 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:34.969118 kernel: audit: type=1300 audit(1696274554.928:657): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=1907 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:34.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335383832303432303132663436633862663436373632316362373763 Oct 2 19:22:34.994634 kernel: audit: type=1327 audit(1696274554.928:657): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335383832303432303132663436633862663436373632316362373763 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.029671 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.029802 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.029822 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.030176 env[1294]: time="2023-10-02T19:22:35.030129630Z" level=info msg="StartContainer for \"35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f\" returns successfully" Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.043477 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.089056 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.089171 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:35.089192 kernel: audit: type=1400 audit(1696274554.928:658): avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.928000 audit: BPF prog-id=79 op=LOAD Oct 2 19:22:34.928000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0001bf260 items=0 ppid=1907 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:34.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335383832303432303132663436633862663436373632316362373763 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit: BPF prog-id=80 op=LOAD Oct 2 19:22:34.948000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0001bf2a8 items=0 ppid=1907 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:34.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335383832303432303132663436633862663436373632316362373763 Oct 2 19:22:34.948000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:22:34.948000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:34.948000 audit: BPF prog-id=81 op=LOAD Oct 2 19:22:34.948000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0001bf338 items=0 ppid=1907 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:34.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335383832303432303132663436633862663436373632316362373763 Oct 2 19:22:35.197892 kubelet[1852]: E1002 19:22:35.197845 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:36.198157 kubelet[1852]: E1002 19:22:36.197924 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:36.590550 env[1294]: time="2023-10-02T19:22:36.590386456Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:22:36.593185 systemd[1]: cri-containerd-35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f.scope: Deactivated successfully. Oct 2 19:22:36.597000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:22:36.607376 kubelet[1852]: I1002 19:22:36.606370 1852 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:22:36.614199 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f-rootfs.mount: Deactivated successfully. Oct 2 19:22:36.638080 kubelet[1852]: I1002 19:22:36.638045 1852 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:22:36.642929 systemd[1]: Created slice kubepods-besteffort-pod242cd26f_cde3_4d49_9191_c58609f92503.slice. Oct 2 19:22:36.800794 kubelet[1852]: I1002 19:22:36.800734 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/242cd26f-cde3-4d49-9191-c58609f92503-varrun\") pod \"csi-node-driver-c442c\" (UID: \"242cd26f-cde3-4d49-9191-c58609f92503\") " pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:36.801146 kubelet[1852]: I1002 19:22:36.800809 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cppv5\" (UniqueName: \"kubernetes.io/projected/242cd26f-cde3-4d49-9191-c58609f92503-kube-api-access-cppv5\") pod \"csi-node-driver-c442c\" (UID: \"242cd26f-cde3-4d49-9191-c58609f92503\") " pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:36.801146 kubelet[1852]: I1002 19:22:36.800849 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/242cd26f-cde3-4d49-9191-c58609f92503-etccalico\") pod \"csi-node-driver-c442c\" (UID: \"242cd26f-cde3-4d49-9191-c58609f92503\") " pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:36.801146 kubelet[1852]: I1002 19:22:36.800881 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/242cd26f-cde3-4d49-9191-c58609f92503-socket-dir\") pod \"csi-node-driver-c442c\" (UID: \"242cd26f-cde3-4d49-9191-c58609f92503\") " pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:36.801146 kubelet[1852]: I1002 19:22:36.800911 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/242cd26f-cde3-4d49-9191-c58609f92503-registration-dir\") pod \"csi-node-driver-c442c\" (UID: \"242cd26f-cde3-4d49-9191-c58609f92503\") " pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:36.801146 kubelet[1852]: I1002 19:22:36.800943 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/242cd26f-cde3-4d49-9191-c58609f92503-kubelet-dir\") pod \"csi-node-driver-c442c\" (UID: \"242cd26f-cde3-4d49-9191-c58609f92503\") " pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:36.949501 env[1294]: time="2023-10-02T19:22:36.949133637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c442c,Uid:242cd26f-cde3-4d49-9191-c58609f92503,Namespace:calico-system,Attempt:0,}" Oct 2 19:22:37.198693 kubelet[1852]: E1002 19:22:37.198627 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:38.199175 kubelet[1852]: E1002 19:22:38.199109 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:38.842322 env[1294]: time="2023-10-02T19:22:38.842263695Z" level=info msg="shim disconnected" id=35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f Oct 2 19:22:38.842322 env[1294]: time="2023-10-02T19:22:38.842318995Z" level=warning msg="cleaning up after shim disconnected" id=35882042012f46c8bf467621cb77c82ccc585d6fc7f55fe24afb00228eaf226f namespace=k8s.io Oct 2 19:22:38.842793 env[1294]: time="2023-10-02T19:22:38.842331695Z" level=info msg="cleaning up dead shim" Oct 2 19:22:38.855081 env[1294]: time="2023-10-02T19:22:38.855032062Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:22:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2258 runtime=io.containerd.runc.v2\n" Oct 2 19:22:38.900732 env[1294]: time="2023-10-02T19:22:38.900655904Z" level=error msg="Failed to destroy network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:22:38.902565 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5-shm.mount: Deactivated successfully. Oct 2 19:22:38.903694 env[1294]: time="2023-10-02T19:22:38.903647120Z" level=error msg="encountered an error cleaning up failed sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:22:38.903822 env[1294]: time="2023-10-02T19:22:38.903715521Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c442c,Uid:242cd26f-cde3-4d49-9191-c58609f92503,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:22:38.904053 kubelet[1852]: E1002 19:22:38.904018 1852 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:22:38.904146 kubelet[1852]: E1002 19:22:38.904091 1852 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:38.904146 kubelet[1852]: E1002 19:22:38.904124 1852 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-c442c" Oct 2 19:22:38.904228 kubelet[1852]: E1002 19:22:38.904195 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:22:39.200000 kubelet[1852]: E1002 19:22:39.199951 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:39.278611 env[1294]: time="2023-10-02T19:22:39.278532980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:22:39.278949 kubelet[1852]: I1002 19:22:39.278920 1852 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:22:39.279624 env[1294]: time="2023-10-02T19:22:39.279584686Z" level=info msg="StopPodSandbox for \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\"" Oct 2 19:22:39.305622 env[1294]: time="2023-10-02T19:22:39.305570421Z" level=error msg="StopPodSandbox for \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\" failed" error="failed to destroy network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:22:39.306198 kubelet[1852]: E1002 19:22:39.306048 1852 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:22:39.306198 kubelet[1852]: E1002 19:22:39.306112 1852 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5} Oct 2 19:22:39.306198 kubelet[1852]: E1002 19:22:39.306147 1852 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"242cd26f-cde3-4d49-9191-c58609f92503\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:22:39.306198 kubelet[1852]: E1002 19:22:39.306177 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"242cd26f-cde3-4d49-9191-c58609f92503\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:22:40.200309 kubelet[1852]: E1002 19:22:40.200245 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:41.187657 kubelet[1852]: E1002 19:22:41.187609 1852 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:41.200778 kubelet[1852]: E1002 19:22:41.200708 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:42.200909 kubelet[1852]: E1002 19:22:42.200858 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:43.201327 kubelet[1852]: E1002 19:22:43.201278 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:44.202358 kubelet[1852]: E1002 19:22:44.202297 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:44.444667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount117232756.mount: Deactivated successfully. Oct 2 19:22:44.531956 env[1294]: time="2023-10-02T19:22:44.531818663Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:44.536991 env[1294]: time="2023-10-02T19:22:44.536931287Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:44.539936 env[1294]: time="2023-10-02T19:22:44.539894601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:44.543682 env[1294]: time="2023-10-02T19:22:44.543639519Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:44.544035 env[1294]: time="2023-10-02T19:22:44.544002421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:22:44.546268 env[1294]: time="2023-10-02T19:22:44.546241331Z" level=info msg="CreateContainer within sandbox \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:22:44.577899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3568676083.mount: Deactivated successfully. Oct 2 19:22:44.596836 env[1294]: time="2023-10-02T19:22:44.596775970Z" level=info msg="CreateContainer within sandbox \"3fac175d1344ce95ee8ed595bd9603cfe8f25bfd3dc8673d0f4e30ce293e80f0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2\"" Oct 2 19:22:44.597543 env[1294]: time="2023-10-02T19:22:44.597402673Z" level=info msg="StartContainer for \"9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2\"" Oct 2 19:22:44.614997 systemd[1]: Started cri-containerd-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2.scope. Oct 2 19:22:44.652342 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:22:44.652564 kernel: audit: type=1400 audit(1696274564.632:664): avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1907 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:44.693594 kernel: audit: type=1300 audit(1696274564.632:664): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1907 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:44.693776 kernel: audit: type=1327 audit(1696274564.632:664): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313335383839343461323137373861336637656263366634646139 Oct 2 19:22:44.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313335383839343461323137373861336637656263366634646139 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.712166 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.712201 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.754585 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.754705 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.770478 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.785568 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.785722 kernel: audit: type=1400 audit(1696274564.632:665): avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.786627 env[1294]: time="2023-10-02T19:22:44.786583067Z" level=info msg="StartContainer for \"9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2\" returns successfully" Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.632000 audit: BPF prog-id=82 op=LOAD Oct 2 19:22:44.632000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000024220 items=0 ppid=1907 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:44.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313335383839343461323137373861336637656263366634646139 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit: BPF prog-id=83 op=LOAD Oct 2 19:22:44.673000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000024268 items=0 ppid=1907 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:44.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313335383839343461323137373861336637656263366634646139 Oct 2 19:22:44.673000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:22:44.673000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:44.673000 audit: BPF prog-id=84 op=LOAD Oct 2 19:22:44.673000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0000242f8 items=0 ppid=1907 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:44.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313335383839343461323137373861336637656263366634646139 Oct 2 19:22:44.882026 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:22:44.882160 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:22:45.203550 kubelet[1852]: E1002 19:22:45.203501 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:45.303775 kubelet[1852]: I1002 19:22:45.303511 1852 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-r8jn4" podStartSLOduration=3.509255499 podCreationTimestamp="2023-10-02 19:22:22 +0000 UTC" firstStartedPulling="2023-10-02 19:22:24.750133738 +0000 UTC m=+3.838720803" lastFinishedPulling="2023-10-02 19:22:44.544325522 +0000 UTC m=+23.632912587" observedRunningTime="2023-10-02 19:22:45.303414583 +0000 UTC m=+24.392001648" watchObservedRunningTime="2023-10-02 19:22:45.303447283 +0000 UTC m=+24.392034248" Oct 2 19:22:46.201000 audit[2450]: AVC avc: denied { write } for pid=2450 comm="tee" name="fd" dev="proc" ino=23054 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.201000 audit[2450]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff753ef96b a2=241 a3=1b6 items=1 ppid=2416 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.201000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:22:46.201000 audit: PATH item=0 name="/dev/fd/63" inode=23045 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.204559 kubelet[1852]: E1002 19:22:46.204519 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:46.204000 audit[2448]: AVC avc: denied { write } for pid=2448 comm="tee" name="fd" dev="proc" ino=22292 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.206000 audit[2454]: AVC avc: denied { write } for pid=2454 comm="tee" name="fd" dev="proc" ino=22295 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.207000 audit[2452]: AVC avc: denied { write } for pid=2452 comm="tee" name="fd" dev="proc" ino=22298 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.201000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.209000 audit[2458]: AVC avc: denied { write } for pid=2458 comm="tee" name="fd" dev="proc" ino=23058 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.211000 audit[2456]: AVC avc: denied { write } for pid=2456 comm="tee" name="fd" dev="proc" ino=23061 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.204000 audit[2448]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc4c9a97a a2=241 a3=1b6 items=1 ppid=2420 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.204000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:22:46.204000 audit: PATH item=0 name="/dev/fd/63" inode=23044 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.207000 audit[2452]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdd52797c a2=241 a3=1b6 items=1 ppid=2418 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.207000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:22:46.207000 audit: PATH item=0 name="/dev/fd/63" inode=22283 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.207000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.206000 audit[2454]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd01a1d97b a2=241 a3=1b6 items=1 ppid=2423 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.206000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:22:46.206000 audit: PATH item=0 name="/dev/fd/63" inode=22286 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.217000 audit[2464]: AVC avc: denied { write } for pid=2464 comm="tee" name="fd" dev="proc" ino=23064 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:22:46.211000 audit[2456]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcadc9497a a2=241 a3=1b6 items=1 ppid=2422 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.211000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:22:46.211000 audit: PATH item=0 name="/dev/fd/63" inode=23048 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.211000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.209000 audit[2458]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbe20796a a2=241 a3=1b6 items=1 ppid=2431 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.209000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:22:46.209000 audit: PATH item=0 name="/dev/fd/63" inode=23051 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.217000 audit[2464]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5a48b97a a2=241 a3=1b6 items=1 ppid=2424 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.217000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:22:46.217000 audit: PATH item=0 name="/dev/fd/63" inode=22289 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:22:46.217000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:22:46.538829 kernel: Initializing XFRM netlink socket Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit: BPF prog-id=85 op=LOAD Oct 2 19:22:46.667000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0b832370 a2=70 a3=7fe4be8c1000 items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.667000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.667000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit: BPF prog-id=86 op=LOAD Oct 2 19:22:46.667000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0b832370 a2=70 a3=6e items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.667000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.667000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc0b832320 a2=70 a3=7ffc0b832370 items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.667000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.667000 audit: BPF prog-id=87 op=LOAD Oct 2 19:22:46.667000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc0b832300 a2=70 a3=7ffc0b832370 items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.667000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.668000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0b8323e0 a2=70 a3=0 items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0b8323d0 a2=70 a3=0 items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc0b832410 a2=70 a3=0 items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.668000 audit: BPF prog-id=88 op=LOAD Oct 2 19:22:46.668000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc0b832330 a2=70 a3=ffffffff items=0 ppid=2421 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:22:46.671000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.671000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2f8dd310 a2=70 a3=fff80800 items=0 ppid=2421 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.671000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:22:46.672000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:46.672000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2f8dd1e0 a2=70 a3=3 items=0 ppid=2421 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.672000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:22:46.679000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:22:46.777000 audit[2605]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2605 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:46.778000 audit[2602]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2602 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:46.778000 audit[2602]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffebf797780 a2=0 a3=557d5c2ec000 items=0 ppid=2421 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.778000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:46.777000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe54349930 a2=0 a3=7ffe5434991c items=0 ppid=2421 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.777000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:46.779000 audit[2603]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:46.779000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcf1e74e10 a2=0 a3=55a817e0b000 items=0 ppid=2421 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.779000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:46.786000 audit[2607]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:46.786000 audit[2607]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffe60f9e60 a2=0 a3=5555c7913000 items=0 ppid=2421 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.786000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:47.205351 kubelet[1852]: E1002 19:22:47.205291 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:47.557405 systemd-networkd[1435]: vxlan.calico: Link UP Oct 2 19:22:47.557423 systemd-networkd[1435]: vxlan.calico: Gained carrier Oct 2 19:22:48.206374 kubelet[1852]: E1002 19:22:48.206317 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:48.836669 kubelet[1852]: I1002 19:22:48.836147 1852 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:22:48.841120 systemd[1]: Created slice kubepods-besteffort-pod4ff6e21b_2616_4585_b54f_56d488489294.slice. Oct 2 19:22:48.870872 kubelet[1852]: I1002 19:22:48.870810 1852 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7b9wj\" (UniqueName: \"kubernetes.io/projected/4ff6e21b-2616-4585-b54f-56d488489294-kube-api-access-7b9wj\") pod \"nginx-deployment-845c78c8b9-khb4j\" (UID: \"4ff6e21b-2616-4585-b54f-56d488489294\") " pod="default/nginx-deployment-845c78c8b9-khb4j" Oct 2 19:22:49.144564 env[1294]: time="2023-10-02T19:22:49.144504570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-khb4j,Uid:4ff6e21b-2616-4585-b54f-56d488489294,Namespace:default,Attempt:0,}" Oct 2 19:22:49.207141 kubelet[1852]: E1002 19:22:49.207096 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:49.304624 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:22:49.304778 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a9d3a5ace7: link becomes ready Oct 2 19:22:49.312112 systemd-networkd[1435]: cali2a9d3a5ace7: Link UP Oct 2 19:22:49.312443 systemd-networkd[1435]: cali2a9d3a5ace7: Gained carrier Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.231 [INFO][2637] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0 nginx-deployment-845c78c8b9- default 4ff6e21b-2616-4585-b54f-56d488489294 1232 0 2023-10-02 19:22:48 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 nginx-deployment-845c78c8b9-khb4j eth0 default [] [] [kns.default ksa.default.default] cali2a9d3a5ace7 [] []}} ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.231 [INFO][2637] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.260 [INFO][2649] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" HandleID="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.270 [INFO][2649] ipam_plugin.go 269: Auto assigning IP ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" HandleID="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a710), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"nginx-deployment-845c78c8b9-khb4j", "timestamp":"2023-10-02 19:22:49.260615472 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:22:49.327560 env[1294]: time="2023-10-02T19:22:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:22:49.327560 env[1294]: time="2023-10-02T19:22:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.270 [INFO][2649] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.272 [INFO][2649] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.275 [INFO][2649] ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.279 [INFO][2649] ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.280 [INFO][2649] ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.282 [INFO][2649] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.282 [INFO][2649] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.284 [INFO][2649] ipam.go 1682: Creating new handle: k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.287 [INFO][2649] ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.290 [INFO][2649] ipam.go 1216: Successfully claimed IPs: [192.168.44.65/26] block=192.168.44.64/26 handle="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.290 [INFO][2649] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.65/26] handle="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" host="10.200.8.15" Oct 2 19:22:49.327560 env[1294]: time="2023-10-02T19:22:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:22:49.327560 env[1294]: 2023-10-02 19:22:49.291 [INFO][2649] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.44.65/26] IPv6=[] ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" HandleID="k8s-pod-network.739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.328493 env[1294]: 2023-10-02 19:22:49.292 [INFO][2637] k8s.go 383: Populated endpoint ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"4ff6e21b-2616-4585-b54f-56d488489294", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 22, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-khb4j", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2a9d3a5ace7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:22:49.328493 env[1294]: 2023-10-02 19:22:49.292 [INFO][2637] k8s.go 384: Calico CNI using IPs: [192.168.44.65/32] ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.328493 env[1294]: 2023-10-02 19:22:49.292 [INFO][2637] dataplane_linux.go 68: Setting the host side veth name to cali2a9d3a5ace7 ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.328493 env[1294]: 2023-10-02 19:22:49.305 [INFO][2637] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.328493 env[1294]: 2023-10-02 19:22:49.312 [INFO][2637] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"4ff6e21b-2616-4585-b54f-56d488489294", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 22, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea", Pod:"nginx-deployment-845c78c8b9-khb4j", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2a9d3a5ace7", MAC:"2a:3f:7d:21:98:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:22:49.328493 env[1294]: 2023-10-02 19:22:49.319 [INFO][2637] k8s.go 489: Wrote updated endpoint to datastore ContainerID="739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea" Namespace="default" Pod="nginx-deployment-845c78c8b9-khb4j" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--khb4j-eth0" Oct 2 19:22:49.351420 env[1294]: time="2023-10-02T19:22:49.351324364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:22:49.351647 env[1294]: time="2023-10-02T19:22:49.351436664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:22:49.351647 env[1294]: time="2023-10-02T19:22:49.351502864Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:22:49.351752 env[1294]: time="2023-10-02T19:22:49.351703265Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea pid=2680 runtime=io.containerd.runc.v2 Oct 2 19:22:49.351000 audit[2679]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:49.351000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7fff3fbc8330 a2=0 a3=7fff3fbc831c items=0 ppid=2421 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:49.372915 systemd[1]: Started cri-containerd-739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea.scope. Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit: BPF prog-id=89 op=LOAD Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2680 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393732383433356535626462396364396332623534663237666261 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2680 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393732383433356535626462396364396332623534663237666261 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.385000 audit: BPF prog-id=90 op=LOAD Oct 2 19:22:49.385000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003dec40 items=0 ppid=2680 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393732383433356535626462396364396332623534663237666261 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit: BPF prog-id=91 op=LOAD Oct 2 19:22:49.386000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003dec88 items=0 ppid=2680 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393732383433356535626462396364396332623534663237666261 Oct 2 19:22:49.386000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:22:49.386000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:49.386000 audit: BPF prog-id=92 op=LOAD Oct 2 19:22:49.386000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003df098 items=0 ppid=2680 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393732383433356535626462396364396332623534663237666261 Oct 2 19:22:49.420753 env[1294]: time="2023-10-02T19:22:49.418007652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-khb4j,Uid:4ff6e21b-2616-4585-b54f-56d488489294,Namespace:default,Attempt:0,} returns sandbox id \"739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea\"" Oct 2 19:22:49.420753 env[1294]: time="2023-10-02T19:22:49.419883960Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:22:49.493795 systemd-networkd[1435]: vxlan.calico: Gained IPv6LL Oct 2 19:22:49.983046 systemd[1]: run-containerd-runc-k8s.io-739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea-runc.ZOWVeT.mount: Deactivated successfully. Oct 2 19:22:50.207996 kubelet[1852]: E1002 19:22:50.207941 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:50.238232 env[1294]: time="2023-10-02T19:22:50.237895778Z" level=info msg="StopPodSandbox for \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\"" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.278 [INFO][2728] k8s.go 576: Cleaning up netns ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.278 [INFO][2728] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" iface="eth0" netns="/var/run/netns/cni-63c11841-1678-fefe-c9c0-f6893c25e87f" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.278 [INFO][2728] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" iface="eth0" netns="/var/run/netns/cni-63c11841-1678-fefe-c9c0-f6893c25e87f" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.278 [INFO][2728] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" iface="eth0" netns="/var/run/netns/cni-63c11841-1678-fefe-c9c0-f6893c25e87f" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.278 [INFO][2728] k8s.go 583: Releasing IP address(es) ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.278 [INFO][2728] utils.go 196: Calico CNI releasing IP address ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.299 [INFO][2735] ipam_plugin.go 416: Releasing address using handleID ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" HandleID="k8s-pod-network.d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Workload="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.310777 env[1294]: time="2023-10-02T19:22:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:22:50.310777 env[1294]: time="2023-10-02T19:22:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.306 [WARNING][2735] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" HandleID="k8s-pod-network.d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Workload="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.306 [INFO][2735] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" HandleID="k8s-pod-network.d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Workload="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.310777 env[1294]: time="2023-10-02T19:22:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:22:50.310777 env[1294]: 2023-10-02 19:22:50.309 [INFO][2728] k8s.go 589: Teardown processing complete. ContainerID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:22:50.314079 env[1294]: time="2023-10-02T19:22:50.313035097Z" level=info msg="TearDown network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\" successfully" Oct 2 19:22:50.314079 env[1294]: time="2023-10-02T19:22:50.313070597Z" level=info msg="StopPodSandbox for \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\" returns successfully" Oct 2 19:22:50.314079 env[1294]: time="2023-10-02T19:22:50.313689100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c442c,Uid:242cd26f-cde3-4d49-9191-c58609f92503,Namespace:calico-system,Attempt:1,}" Oct 2 19:22:50.312666 systemd[1]: run-netns-cni\x2d63c11841\x2d1678\x2dfefe\x2dc9c0\x2df6893c25e87f.mount: Deactivated successfully. Oct 2 19:22:50.462870 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:22:50.463025 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic7816b98763: link becomes ready Oct 2 19:22:50.469065 systemd-networkd[1435]: calic7816b98763: Link UP Oct 2 19:22:50.469074 systemd-networkd[1435]: calic7816b98763: Gained carrier Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.390 [INFO][2742] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-csi--node--driver--c442c-eth0 csi-node-driver- calico-system 242cd26f-cde3-4d49-9191-c58609f92503 1244 0 2023-10-02 19:22:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 csi-node-driver-c442c eth0 default [] [] [kns.calico-system ksa.calico-system.default] calic7816b98763 [] []}} ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.390 [INFO][2742] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.419 [INFO][2756] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" HandleID="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Workload="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.429 [INFO][2756] ipam_plugin.go 269: Auto assigning IP ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" HandleID="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Workload="10.200.8.15-k8s-csi--node--driver--c442c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000515e20), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.15", "pod":"csi-node-driver-c442c", "timestamp":"2023-10-02 19:22:50.41971215 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:22:50.483903 env[1294]: time="2023-10-02T19:22:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:22:50.483903 env[1294]: time="2023-10-02T19:22:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.430 [INFO][2756] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.431 [INFO][2756] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.434 [INFO][2756] ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.438 [INFO][2756] ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.440 [INFO][2756] ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.442 [INFO][2756] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.442 [INFO][2756] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.443 [INFO][2756] ipam.go 1682: Creating new handle: k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.446 [INFO][2756] ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.450 [INFO][2756] ipam.go 1216: Successfully claimed IPs: [192.168.44.66/26] block=192.168.44.64/26 handle="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.450 [INFO][2756] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.66/26] handle="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" host="10.200.8.15" Oct 2 19:22:50.483903 env[1294]: time="2023-10-02T19:22:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:22:50.483903 env[1294]: 2023-10-02 19:22:50.450 [INFO][2756] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.44.66/26] IPv6=[] ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" HandleID="k8s-pod-network.892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Workload="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.484835 env[1294]: 2023-10-02 19:22:50.451 [INFO][2742] k8s.go 383: Populated endpoint ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--c442c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"242cd26f-cde3-4d49-9191-c58609f92503", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 22, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"csi-node-driver-c442c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic7816b98763", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:22:50.484835 env[1294]: 2023-10-02 19:22:50.452 [INFO][2742] k8s.go 384: Calico CNI using IPs: [192.168.44.66/32] ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.484835 env[1294]: 2023-10-02 19:22:50.452 [INFO][2742] dataplane_linux.go 68: Setting the host side veth name to calic7816b98763 ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.484835 env[1294]: 2023-10-02 19:22:50.463 [INFO][2742] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.484835 env[1294]: 2023-10-02 19:22:50.468 [INFO][2742] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--c442c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"242cd26f-cde3-4d49-9191-c58609f92503", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 22, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce", Pod:"csi-node-driver-c442c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic7816b98763", MAC:"da:1f:eb:5e:f7:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:22:50.484835 env[1294]: 2023-10-02 19:22:50.478 [INFO][2742] k8s.go 489: Wrote updated endpoint to datastore ContainerID="892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce" Namespace="calico-system" Pod="csi-node-driver-c442c" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--c442c-eth0" Oct 2 19:22:50.499000 audit[2777]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:50.506518 kernel: kauditd_printk_skb: 211 callbacks suppressed Oct 2 19:22:50.506604 kernel: audit: type=1325 audit(1696274570.499:714): table=filter:74 family=2 entries=40 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:22:50.512097 env[1294]: time="2023-10-02T19:22:50.512044542Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:22:50.512249 env[1294]: time="2023-10-02T19:22:50.512228543Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:22:50.512343 env[1294]: time="2023-10-02T19:22:50.512325043Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:22:50.512656 env[1294]: time="2023-10-02T19:22:50.512613345Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce pid=2784 runtime=io.containerd.runc.v2 Oct 2 19:22:50.499000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fffe87bad20 a2=0 a3=7fffe87bad0c items=0 ppid=2421 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.530633 systemd[1]: Started cri-containerd-892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce.scope. Oct 2 19:22:50.556017 kernel: audit: type=1300 audit(1696274570.499:714): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fffe87bad20 a2=0 a3=7fffe87bad0c items=0 ppid=2421 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.556155 kernel: audit: type=1327 audit(1696274570.499:714): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:50.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.586030 kernel: audit: type=1400 audit(1696274570.557:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.586167 kernel: audit: type=1400 audit(1696274570.557:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600580 kernel: audit: type=1400 audit(1696274570.557:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.621206 kernel: audit: type=1400 audit(1696274570.557:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.621326 kernel: audit: type=1400 audit(1696274570.557:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.627403 env[1294]: time="2023-10-02T19:22:50.627356732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c442c,Uid:242cd26f-cde3-4d49-9191-c58609f92503,Namespace:calico-system,Attempt:1,} returns sandbox id \"892db7e87eed8390b6f84edc0ec2adf5f81177ead43314cc8c5c90a9bea768ce\"" Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.646606 systemd-networkd[1435]: cali2a9d3a5ace7: Gained IPv6LL Oct 2 19:22:50.648543 kernel: audit: type=1400 audit(1696274570.557:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.648630 kernel: audit: type=1400 audit(1696274570.557:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit: BPF prog-id=93 op=LOAD Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2784 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326462376538376565643833393062366638346564633065633261 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2784 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326462376538376565643833393062366638346564633065633261 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit: BPF prog-id=94 op=LOAD Oct 2 19:22:50.600000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000200350 items=0 ppid=2784 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326462376538376565643833393062366638346564633065633261 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit: BPF prog-id=95 op=LOAD Oct 2 19:22:50.600000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000200398 items=0 ppid=2784 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326462376538376565643833393062366638346564633065633261 Oct 2 19:22:50.600000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:22:50.600000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:50.600000 audit: BPF prog-id=96 op=LOAD Oct 2 19:22:50.600000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002007a8 items=0 ppid=2784 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:50.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839326462376538376565643833393062366638346564633065633261 Oct 2 19:22:51.208902 kubelet[1852]: E1002 19:22:51.208868 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:51.798238 systemd-networkd[1435]: calic7816b98763: Gained IPv6LL Oct 2 19:22:52.209412 kubelet[1852]: E1002 19:22:52.209349 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:53.123774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount627956651.mount: Deactivated successfully. Oct 2 19:22:53.210520 kubelet[1852]: E1002 19:22:53.210446 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:54.089796 env[1294]: time="2023-10-02T19:22:54.089745898Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:54.097655 env[1294]: time="2023-10-02T19:22:54.097610229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:54.106471 env[1294]: time="2023-10-02T19:22:54.106416764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:54.110955 env[1294]: time="2023-10-02T19:22:54.110911482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:22:54.111619 env[1294]: time="2023-10-02T19:22:54.111583984Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:22:54.113013 env[1294]: time="2023-10-02T19:22:54.112670789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:22:54.113964 env[1294]: time="2023-10-02T19:22:54.113926394Z" level=info msg="CreateContainer within sandbox \"739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:22:54.145614 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount318057250.mount: Deactivated successfully. Oct 2 19:22:54.152045 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount305329001.mount: Deactivated successfully. Oct 2 19:22:54.164397 env[1294]: time="2023-10-02T19:22:54.164348994Z" level=info msg="CreateContainer within sandbox \"739728435e5bdb9cd9c2b54f27fba76e5a23783f36f850f4e3fa825524c7a6ea\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"cd054f905fddf5f2853861b4d3b7afaae154b745ebbe57cfbb37fc5d4e96c7b3\"" Oct 2 19:22:54.165075 env[1294]: time="2023-10-02T19:22:54.164986297Z" level=info msg="StartContainer for \"cd054f905fddf5f2853861b4d3b7afaae154b745ebbe57cfbb37fc5d4e96c7b3\"" Oct 2 19:22:54.186411 systemd[1]: Started cri-containerd-cd054f905fddf5f2853861b4d3b7afaae154b745ebbe57cfbb37fc5d4e96c7b3.scope. Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit: BPF prog-id=97 op=LOAD Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2680 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:54.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303534663930356664646635663238353338363162346433623761 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2680 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:54.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303534663930356664646635663238353338363162346433623761 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit: BPF prog-id=98 op=LOAD Oct 2 19:22:54.200000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003d0220 items=0 ppid=2680 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:54.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303534663930356664646635663238353338363162346433623761 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit: BPF prog-id=99 op=LOAD Oct 2 19:22:54.200000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003d0268 items=0 ppid=2680 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:54.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303534663930356664646635663238353338363162346433623761 Oct 2 19:22:54.200000 audit: BPF prog-id=99 op=UNLOAD Oct 2 19:22:54.200000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { perfmon } for pid=2837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit[2837]: AVC avc: denied { bpf } for pid=2837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:22:54.200000 audit: BPF prog-id=100 op=LOAD Oct 2 19:22:54.200000 audit[2837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d0678 items=0 ppid=2680 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:54.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303534663930356664646635663238353338363162346433623761 Oct 2 19:22:54.211527 kubelet[1852]: E1002 19:22:54.211427 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:54.222042 env[1294]: time="2023-10-02T19:22:54.221996723Z" level=info msg="StartContainer for \"cd054f905fddf5f2853861b4d3b7afaae154b745ebbe57cfbb37fc5d4e96c7b3\" returns successfully" Oct 2 19:22:54.409249 env[1294]: time="2023-10-02T19:22:54.409175368Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:22:54.412092 env[1294]: time="2023-10-02T19:22:54.412042779Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:22:54.412412 kubelet[1852]: E1002 19:22:54.412386 1852 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:22:54.412522 kubelet[1852]: E1002 19:22:54.412480 1852 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:22:54.412895 kubelet[1852]: E1002 19:22:54.412649 1852 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-cppv5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:22:54.413914 env[1294]: time="2023-10-02T19:22:54.413880986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:22:54.550585 kubelet[1852]: I1002 19:22:54.550525 1852 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-khb4j" podStartSLOduration=1.8576268 podCreationTimestamp="2023-10-02 19:22:48 +0000 UTC" firstStartedPulling="2023-10-02 19:22:49.419283357 +0000 UTC m=+28.507870322" lastFinishedPulling="2023-10-02 19:22:54.112129287 +0000 UTC m=+33.200716252" observedRunningTime="2023-10-02 19:22:54.328475547 +0000 UTC m=+33.417062512" watchObservedRunningTime="2023-10-02 19:22:54.55047273 +0000 UTC m=+33.639059695" Oct 2 19:22:54.710449 env[1294]: time="2023-10-02T19:22:54.710305065Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:22:54.715129 env[1294]: time="2023-10-02T19:22:54.715073684Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:22:54.715377 kubelet[1852]: E1002 19:22:54.715345 1852 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:22:54.715489 kubelet[1852]: E1002 19:22:54.715390 1852 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:22:54.715613 kubelet[1852]: E1002 19:22:54.715537 1852 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cppv5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:22:54.715740 kubelet[1852]: E1002 19:22:54.715642 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:22:55.212582 kubelet[1852]: E1002 19:22:55.212525 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:55.323620 kubelet[1852]: E1002 19:22:55.323583 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:22:56.213701 kubelet[1852]: E1002 19:22:56.213642 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:57.214657 kubelet[1852]: E1002 19:22:57.214590 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:58.214868 kubelet[1852]: E1002 19:22:58.214807 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:22:59.216040 kubelet[1852]: E1002 19:22:59.215974 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:00.216609 kubelet[1852]: E1002 19:23:00.216554 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:01.187305 kubelet[1852]: E1002 19:23:01.187243 1852 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:01.217478 kubelet[1852]: E1002 19:23:01.217415 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:02.217785 kubelet[1852]: E1002 19:23:02.217713 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:03.218579 kubelet[1852]: E1002 19:23:03.218522 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:04.219342 kubelet[1852]: E1002 19:23:04.219263 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:04.490914 systemd[1]: run-containerd-runc-k8s.io-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2-runc.rRnOya.mount: Deactivated successfully. Oct 2 19:23:05.220188 kubelet[1852]: E1002 19:23:05.220130 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:06.221096 kubelet[1852]: E1002 19:23:06.221033 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:07.222025 kubelet[1852]: E1002 19:23:07.221965 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:07.239047 env[1294]: time="2023-10-02T19:23:07.238995359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:23:07.541196 env[1294]: time="2023-10-02T19:23:07.540945455Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:23:07.543876 env[1294]: time="2023-10-02T19:23:07.543815265Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:23:07.544159 kubelet[1852]: E1002 19:23:07.544134 1852 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:23:07.544270 kubelet[1852]: E1002 19:23:07.544187 1852 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:23:07.544331 kubelet[1852]: E1002 19:23:07.544321 1852 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-cppv5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:23:07.545376 env[1294]: time="2023-10-02T19:23:07.545340170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:23:07.860264 env[1294]: time="2023-10-02T19:23:07.860092008Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:23:07.863564 env[1294]: time="2023-10-02T19:23:07.863499619Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:23:07.863903 kubelet[1852]: E1002 19:23:07.863877 1852 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:23:07.864030 kubelet[1852]: E1002 19:23:07.863932 1852 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:23:07.864096 kubelet[1852]: E1002 19:23:07.864063 1852 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cppv5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:23:07.864243 kubelet[1852]: E1002 19:23:07.864141 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:23:08.222650 kubelet[1852]: E1002 19:23:08.222582 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:09.223375 kubelet[1852]: E1002 19:23:09.223311 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:10.224211 kubelet[1852]: E1002 19:23:10.224147 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:11.224574 kubelet[1852]: E1002 19:23:11.224520 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:12.225060 kubelet[1852]: E1002 19:23:12.224999 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:13.225842 kubelet[1852]: E1002 19:23:13.225784 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:14.226649 kubelet[1852]: E1002 19:23:14.226608 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:14.501974 systemd[1]: run-containerd-runc-k8s.io-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2-runc.K3c4hA.mount: Deactivated successfully. Oct 2 19:23:15.227806 kubelet[1852]: E1002 19:23:15.227752 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:16.228001 kubelet[1852]: E1002 19:23:16.227941 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:16.783908 kubelet[1852]: E1002 19:23:16.783851 1852 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:37076->10.200.8.21:2379: read: connection timed out" Oct 2 19:23:17.228185 kubelet[1852]: E1002 19:23:17.228130 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:17.667874 kubelet[1852]: E1002 19:23:17.667756 1852 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"csi-node-driver-c442c.178a60bc17d907a5", GenerateName:"", Namespace:"calico-system", SelfLink:"", UID:"", ResourceVersion:"1248", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"calico-system", Name:"csi-node-driver-c442c", UID:"242cd26f-cde3-4d49-9191-c58609f92503", APIVersion:"v1", ResourceVersion:"1165", FieldPath:"spec.containers{calico-csi}"}, Reason:"Pulling", Message:"Pulling image \"ghcr.io/flatcar/calico/csi:v3.25.0\"", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 22, 50, 0, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 23, 7, 238312657, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:36878->10.200.8.21:2379: read: connection timed out' (will not retry!) Oct 2 19:23:17.672388 kubelet[1852]: I1002 19:23:17.672342 1852 status_manager.go:809] "Failed to get status for pod" podUID=242cd26f-cde3-4d49-9191-c58609f92503 pod="calico-system/csi-node-driver-c442c" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:36958->10.200.8.21:2379: read: connection timed out" Oct 2 19:23:18.228863 kubelet[1852]: E1002 19:23:18.228801 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:19.229352 kubelet[1852]: E1002 19:23:19.229291 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:20.229870 kubelet[1852]: E1002 19:23:20.229807 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:21.186931 kubelet[1852]: E1002 19:23:21.186868 1852 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:21.195130 env[1294]: time="2023-10-02T19:23:21.195054268Z" level=info msg="StopPodSandbox for \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\"" Oct 2 19:23:21.230063 kubelet[1852]: E1002 19:23:21.230012 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:22.230289 kubelet[1852]: E1002 19:23:22.230229 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:23.231115 kubelet[1852]: E1002 19:23:23.231056 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:23.238713 kubelet[1852]: E1002 19:23:23.238683 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:23:23.616895 env[1294]: time="2023-10-02T19:23:23.616366145Z" level=error msg="StopPodSandbox for \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\" failed" error="failed to destroy network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:39974->10.200.8.21:2379: read: connection timed out" Oct 2 19:23:23.617267 kubelet[1852]: E1002 19:23:23.616773 1852 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:39974->10.200.8.21:2379: read: connection timed out" podSandboxID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:23:23.617267 kubelet[1852]: E1002 19:23:23.616836 1852 kuberuntime_gc.go:180] "Failed to stop sandbox before removing" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:39974->10.200.8.21:2379: read: connection timed out" sandboxID="d210a843225134718347ce8b1612e7a7d938c95e549cfb6d862300d9598be8b5" Oct 2 19:23:24.231989 kubelet[1852]: E1002 19:23:24.231941 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:24.489829 systemd[1]: run-containerd-runc-k8s.io-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2-runc.4asIWR.mount: Deactivated successfully. Oct 2 19:23:25.232603 kubelet[1852]: E1002 19:23:25.232548 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:26.233724 kubelet[1852]: E1002 19:23:26.233668 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:26.785187 kubelet[1852]: E1002 19:23:26.785055 1852 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:27.234602 kubelet[1852]: E1002 19:23:27.234543 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:28.235541 kubelet[1852]: E1002 19:23:28.235488 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:29.236161 kubelet[1852]: E1002 19:23:29.236112 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:30.237203 kubelet[1852]: E1002 19:23:30.237140 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:31.237337 kubelet[1852]: E1002 19:23:31.237288 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:32.063059 kubelet[1852]: E1002 19:23:32.063004 1852 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:23:24Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:23:24Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:23:24Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:23:24Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35\\\",\\\"ghcr.io/flatcar/calico/cni:v3.25.0\\\"],\\\"sizeBytes\\\":87983986},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001\\\",\\\"ghcr.io/flatcar/calico/node:v3.25.0\\\"],\\\"sizeBytes\\\":87184979},{\\\"names\\\":[\\\"ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf\\\",\\\"ghcr.io/flatcar/nginx:latest\\\"],\\\"sizeBytes\\\":57036253},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef\\\",\\\"registry.k8s.io/kube-proxy:v1.27.6\\\"],\\\"sizeBytes\\\":23904234},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\\\"],\\\"sizeBytes\\\":7075092},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":301773}]}}\" for node \"10.200.8.15\": rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:36948->10.200.8.21:2379: read: connection timed out" Oct 2 19:23:32.238147 kubelet[1852]: E1002 19:23:32.238095 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:33.238707 kubelet[1852]: E1002 19:23:33.238672 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:34.239060 kubelet[1852]: E1002 19:23:34.239002 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:34.489411 systemd[1]: run-containerd-runc-k8s.io-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2-runc.YYE2uT.mount: Deactivated successfully. Oct 2 19:23:35.238916 env[1294]: time="2023-10-02T19:23:35.238863100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:23:35.239451 kubelet[1852]: E1002 19:23:35.239205 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:35.549373 env[1294]: time="2023-10-02T19:23:35.549191482Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:23:35.555280 env[1294]: time="2023-10-02T19:23:35.555221297Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:23:35.555619 kubelet[1852]: E1002 19:23:35.555588 1852 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:23:35.555729 kubelet[1852]: E1002 19:23:35.555632 1852 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:23:35.555785 kubelet[1852]: E1002 19:23:35.555752 1852 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-cppv5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:23:35.556665 env[1294]: time="2023-10-02T19:23:35.556634500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:23:35.856273 env[1294]: time="2023-10-02T19:23:35.856100054Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:23:35.859495 env[1294]: time="2023-10-02T19:23:35.859436663Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:23:35.859821 kubelet[1852]: E1002 19:23:35.859745 1852 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:23:35.859821 kubelet[1852]: E1002 19:23:35.859788 1852 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:23:35.859984 kubelet[1852]: E1002 19:23:35.859907 1852 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cppv5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-c442c_calico-system(242cd26f-cde3-4d49-9191-c58609f92503): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:23:35.859984 kubelet[1852]: E1002 19:23:35.859976 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:23:36.239423 kubelet[1852]: E1002 19:23:36.239365 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:36.786201 kubelet[1852]: E1002 19:23:36.785956 1852 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:37.239502 kubelet[1852]: E1002 19:23:37.239449 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:38.240424 kubelet[1852]: E1002 19:23:38.240360 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:39.241552 kubelet[1852]: E1002 19:23:39.241514 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:40.241699 kubelet[1852]: E1002 19:23:40.241639 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:41.187453 kubelet[1852]: E1002 19:23:41.187338 1852 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:41.242194 kubelet[1852]: E1002 19:23:41.242157 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:42.063932 kubelet[1852]: E1002 19:23:42.063788 1852 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.15\": Get \"https://10.200.8.17:6443/api/v1/nodes/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:42.242862 kubelet[1852]: E1002 19:23:42.242805 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:43.243278 kubelet[1852]: E1002 19:23:43.243241 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:44.244303 kubelet[1852]: E1002 19:23:44.244243 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:44.496203 systemd[1]: run-containerd-runc-k8s.io-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2-runc.btCfOC.mount: Deactivated successfully. Oct 2 19:23:45.244819 kubelet[1852]: E1002 19:23:45.244786 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:46.245576 kubelet[1852]: E1002 19:23:46.245517 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:46.787238 kubelet[1852]: E1002 19:23:46.787186 1852 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:47.246514 kubelet[1852]: E1002 19:23:47.246453 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:48.238197 kubelet[1852]: E1002 19:23:48.238163 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:23:48.246596 kubelet[1852]: E1002 19:23:48.246569 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:49.247342 kubelet[1852]: E1002 19:23:49.247307 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:50.247961 kubelet[1852]: E1002 19:23:50.247906 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:51.248327 kubelet[1852]: E1002 19:23:51.248294 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:52.064192 kubelet[1852]: E1002 19:23:52.064139 1852 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.15\": Get \"https://10.200.8.17:6443/api/v1/nodes/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:52.249479 kubelet[1852]: E1002 19:23:52.249415 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:53.250417 kubelet[1852]: E1002 19:23:53.250382 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:54.251097 kubelet[1852]: E1002 19:23:54.251041 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:54.489204 systemd[1]: run-containerd-runc-k8s.io-9313588944a21778a3f7ebc6f4da97bf7a0626ca2a42cbffee35d43fbf2fd7f2-runc.Ik1Q5Q.mount: Deactivated successfully. Oct 2 19:23:55.252166 kubelet[1852]: E1002 19:23:55.252130 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:56.252488 kubelet[1852]: E1002 19:23:56.252421 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:56.787735 kubelet[1852]: E1002 19:23:56.787687 1852 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:56.787735 kubelet[1852]: I1002 19:23:56.787742 1852 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Oct 2 19:23:57.253547 kubelet[1852]: E1002 19:23:57.253512 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:58.254347 kubelet[1852]: E1002 19:23:58.254305 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:23:59.254726 kubelet[1852]: E1002 19:23:59.254690 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:00.255146 kubelet[1852]: E1002 19:24:00.255081 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:01.187624 kubelet[1852]: E1002 19:24:01.187562 1852 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:01.238882 kubelet[1852]: E1002 19:24:01.238844 1852 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-c442c" podUID=242cd26f-cde3-4d49-9191-c58609f92503 Oct 2 19:24:01.255300 kubelet[1852]: E1002 19:24:01.255242 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:02.064996 kubelet[1852]: E1002 19:24:02.064938 1852 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.15\": Get \"https://10.200.8.17:6443/api/v1/nodes/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:24:02.255776 kubelet[1852]: E1002 19:24:02.255710 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:03.256266 kubelet[1852]: E1002 19:24:03.256227 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:04.256701 kubelet[1852]: E1002 19:24:04.256642 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:05.256978 kubelet[1852]: E1002 19:24:05.256943 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:06.257194 kubelet[1852]: E1002 19:24:06.257135 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:24:06.788390 kubelet[1852]: E1002 19:24:06.788339 1852 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.15?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Oct 2 19:24:07.258207 kubelet[1852]: E1002 19:24:07.258151 1852 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"