Oct 2 20:38:31.078901 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 2 20:38:31.078920 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 20:38:31.078928 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Oct 2 20:38:31.078935 kernel: printk: bootconsole [pl11] enabled Oct 2 20:38:31.078941 kernel: efi: EFI v2.70 by EDK II Oct 2 20:38:31.078946 kernel: efi: ACPI 2.0=0x3fd8d018 SMBIOS=0x3fd6a000 SMBIOS 3.0=0x3fd68000 MEMATTR=0x3ef3f098 RNG=0x3fd8d998 MEMRESERVE=0x37eb7f98 Oct 2 20:38:31.078953 kernel: random: crng init done Oct 2 20:38:31.078958 kernel: ACPI: Early table checksum verification disabled Oct 2 20:38:31.078964 kernel: ACPI: RSDP 0x000000003FD8D018 000024 (v02 VRTUAL) Oct 2 20:38:31.078970 kernel: ACPI: XSDT 0x000000003FD8DF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.078976 kernel: ACPI: FACP 0x000000003FD8DC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.078982 kernel: ACPI: DSDT 0x000000003EBD6018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 20:38:31.078988 kernel: ACPI: DBG2 0x000000003FD8DB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.078994 kernel: ACPI: GTDT 0x000000003FD8DD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.079001 kernel: ACPI: OEM0 0x000000003FD8D098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.079007 kernel: ACPI: SPCR 0x000000003FD8DA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.079013 kernel: ACPI: APIC 0x000000003FD8D818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.079020 kernel: ACPI: SRAT 0x000000003FD8D198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.079026 kernel: ACPI: PPTT 0x000000003FD8D418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Oct 2 20:38:31.079032 kernel: ACPI: BGRT 0x000000003FD8DE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:31.079038 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Oct 2 20:38:31.079044 kernel: NUMA: Failed to initialise from firmware Oct 2 20:38:31.079050 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:38:31.079056 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Oct 2 20:38:31.079062 kernel: Zone ranges: Oct 2 20:38:31.079067 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Oct 2 20:38:31.079073 kernel: DMA32 empty Oct 2 20:38:31.079080 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:38:31.079086 kernel: Movable zone start for each node Oct 2 20:38:31.079092 kernel: Early memory node ranges Oct 2 20:38:31.079098 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Oct 2 20:38:31.079104 kernel: node 0: [mem 0x0000000000824000-0x000000003ec84fff] Oct 2 20:38:31.079109 kernel: node 0: [mem 0x000000003ec85000-0x000000003ecadfff] Oct 2 20:38:31.079115 kernel: node 0: [mem 0x000000003ecae000-0x000000003fd2dfff] Oct 2 20:38:31.079121 kernel: node 0: [mem 0x000000003fd2e000-0x000000003fd81fff] Oct 2 20:38:31.079127 kernel: node 0: [mem 0x000000003fd82000-0x000000003fd8dfff] Oct 2 20:38:31.079133 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fd91fff] Oct 2 20:38:31.079139 kernel: node 0: [mem 0x000000003fd92000-0x000000003fffffff] Oct 2 20:38:31.079145 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:38:31.079152 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:38:31.079161 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Oct 2 20:38:31.079167 kernel: psci: probing for conduit method from ACPI. Oct 2 20:38:31.079173 kernel: psci: PSCIv1.1 detected in firmware. Oct 2 20:38:31.079179 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 20:38:31.079186 kernel: psci: MIGRATE_INFO_TYPE not supported. Oct 2 20:38:31.079192 kernel: psci: SMC Calling Convention v1.4 Oct 2 20:38:31.079199 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Oct 2 20:38:31.079205 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Oct 2 20:38:31.079211 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 20:38:31.079218 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 20:38:31.079224 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 20:38:31.079230 kernel: Detected PIPT I-cache on CPU0 Oct 2 20:38:31.079236 kernel: CPU features: detected: GIC system register CPU interface Oct 2 20:38:31.079243 kernel: CPU features: detected: Hardware dirty bit management Oct 2 20:38:31.079249 kernel: CPU features: detected: Spectre-BHB Oct 2 20:38:31.079255 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 20:38:31.079262 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 20:38:31.079269 kernel: CPU features: detected: ARM erratum 1418040 Oct 2 20:38:31.079275 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Oct 2 20:38:31.079281 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Oct 2 20:38:31.079287 kernel: Policy zone: Normal Oct 2 20:38:31.079294 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:38:31.079301 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 20:38:31.085383 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 20:38:31.085393 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:38:31.085400 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 20:38:31.085412 kernel: software IO TLB: mapped [mem 0x000000003abd6000-0x000000003ebd6000] (64MB) Oct 2 20:38:31.085419 kernel: Memory: 3992068K/4194160K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 202092K reserved, 0K cma-reserved) Oct 2 20:38:31.085426 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 20:38:31.085432 kernel: trace event string verifier disabled Oct 2 20:38:31.085439 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 20:38:31.085446 kernel: rcu: RCU event tracing is enabled. Oct 2 20:38:31.085452 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 20:38:31.085459 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 20:38:31.085465 kernel: Tracing variant of Tasks RCU enabled. Oct 2 20:38:31.085471 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 20:38:31.085478 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 20:38:31.085486 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 20:38:31.085492 kernel: GICv3: 960 SPIs implemented Oct 2 20:38:31.085499 kernel: GICv3: 0 Extended SPIs implemented Oct 2 20:38:31.085505 kernel: GICv3: Distributor has no Range Selector support Oct 2 20:38:31.085511 kernel: Root IRQ handler: gic_handle_irq Oct 2 20:38:31.085517 kernel: GICv3: 16 PPIs implemented Oct 2 20:38:31.085524 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Oct 2 20:38:31.085530 kernel: ITS: No ITS available, not enabling LPIs Oct 2 20:38:31.085537 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:38:31.085543 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 2 20:38:31.085550 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 2 20:38:31.085556 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 2 20:38:31.085564 kernel: Console: colour dummy device 80x25 Oct 2 20:38:31.085571 kernel: printk: console [tty1] enabled Oct 2 20:38:31.085578 kernel: ACPI: Core revision 20210730 Oct 2 20:38:31.085584 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 2 20:38:31.085591 kernel: pid_max: default: 32768 minimum: 301 Oct 2 20:38:31.085597 kernel: LSM: Security Framework initializing Oct 2 20:38:31.085604 kernel: SELinux: Initializing. Oct 2 20:38:31.085610 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:38:31.085617 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:38:31.085625 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Oct 2 20:38:31.085631 kernel: Hyper-V: Host Build 10.0.22477.1341-1-0 Oct 2 20:38:31.085638 kernel: rcu: Hierarchical SRCU implementation. Oct 2 20:38:31.085645 kernel: Remapping and enabling EFI services. Oct 2 20:38:31.085651 kernel: smp: Bringing up secondary CPUs ... Oct 2 20:38:31.085658 kernel: Detected PIPT I-cache on CPU1 Oct 2 20:38:31.085665 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Oct 2 20:38:31.085671 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:38:31.085678 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 2 20:38:31.085686 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 20:38:31.085692 kernel: SMP: Total of 2 processors activated. Oct 2 20:38:31.085699 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 20:38:31.085706 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Oct 2 20:38:31.085713 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 2 20:38:31.085719 kernel: CPU features: detected: CRC32 instructions Oct 2 20:38:31.085726 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 2 20:38:31.085732 kernel: CPU features: detected: LSE atomic instructions Oct 2 20:38:31.085739 kernel: CPU features: detected: Privileged Access Never Oct 2 20:38:31.085747 kernel: CPU: All CPU(s) started at EL1 Oct 2 20:38:31.085753 kernel: alternatives: patching kernel code Oct 2 20:38:31.085764 kernel: devtmpfs: initialized Oct 2 20:38:31.085773 kernel: KASLR enabled Oct 2 20:38:31.085780 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 20:38:31.085786 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 20:38:31.085793 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 20:38:31.085800 kernel: SMBIOS 3.1.0 present. Oct 2 20:38:31.085807 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/16/2022 Oct 2 20:38:31.085814 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 20:38:31.085822 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 20:38:31.085829 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 20:38:31.085836 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 20:38:31.085843 kernel: audit: initializing netlink subsys (disabled) Oct 2 20:38:31.085850 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Oct 2 20:38:31.085857 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 20:38:31.085864 kernel: cpuidle: using governor menu Oct 2 20:38:31.085872 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 20:38:31.085879 kernel: ASID allocator initialised with 32768 entries Oct 2 20:38:31.085886 kernel: ACPI: bus type PCI registered Oct 2 20:38:31.085893 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 20:38:31.085900 kernel: Serial: AMBA PL011 UART driver Oct 2 20:38:31.085907 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 20:38:31.085914 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 20:38:31.085921 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 20:38:31.085928 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 20:38:31.085936 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 20:38:31.085943 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 20:38:31.085950 kernel: ACPI: Added _OSI(Module Device) Oct 2 20:38:31.085957 kernel: ACPI: Added _OSI(Processor Device) Oct 2 20:38:31.085964 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 20:38:31.085971 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 20:38:31.085977 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 20:38:31.085984 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 20:38:31.085991 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 20:38:31.085999 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 20:38:31.086006 kernel: ACPI: Interpreter enabled Oct 2 20:38:31.086013 kernel: ACPI: Using GIC for interrupt routing Oct 2 20:38:31.086020 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Oct 2 20:38:31.086027 kernel: printk: console [ttyAMA0] enabled Oct 2 20:38:31.086033 kernel: printk: bootconsole [pl11] disabled Oct 2 20:38:31.086041 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Oct 2 20:38:31.086047 kernel: iommu: Default domain type: Translated Oct 2 20:38:31.086054 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 20:38:31.086062 kernel: vgaarb: loaded Oct 2 20:38:31.086069 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 20:38:31.086076 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 20:38:31.086083 kernel: PTP clock support registered Oct 2 20:38:31.086090 kernel: Registered efivars operations Oct 2 20:38:31.086097 kernel: No ACPI PMU IRQ for CPU0 Oct 2 20:38:31.086104 kernel: No ACPI PMU IRQ for CPU1 Oct 2 20:38:31.086110 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 20:38:31.086117 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 20:38:31.086126 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 20:38:31.086133 kernel: pnp: PnP ACPI init Oct 2 20:38:31.086140 kernel: pnp: PnP ACPI: found 0 devices Oct 2 20:38:31.086147 kernel: NET: Registered PF_INET protocol family Oct 2 20:38:31.086154 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:38:31.086161 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 20:38:31.086168 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 20:38:31.086175 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 20:38:31.086182 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 20:38:31.086190 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 20:38:31.086197 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:38:31.086204 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:38:31.086211 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 20:38:31.086218 kernel: PCI: CLS 0 bytes, default 64 Oct 2 20:38:31.086225 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Oct 2 20:38:31.086232 kernel: kvm [1]: HYP mode not available Oct 2 20:38:31.086239 kernel: Initialise system trusted keyrings Oct 2 20:38:31.086246 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 20:38:31.086254 kernel: Key type asymmetric registered Oct 2 20:38:31.086261 kernel: Asymmetric key parser 'x509' registered Oct 2 20:38:31.086268 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 20:38:31.086274 kernel: io scheduler mq-deadline registered Oct 2 20:38:31.086281 kernel: io scheduler kyber registered Oct 2 20:38:31.086288 kernel: io scheduler bfq registered Oct 2 20:38:31.086295 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 20:38:31.086313 kernel: thunder_xcv, ver 1.0 Oct 2 20:38:31.086321 kernel: thunder_bgx, ver 1.0 Oct 2 20:38:31.086329 kernel: nicpf, ver 1.0 Oct 2 20:38:31.086336 kernel: nicvf, ver 1.0 Oct 2 20:38:31.086529 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 20:38:31.086592 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T20:38:30 UTC (1696279110) Oct 2 20:38:31.086601 kernel: efifb: probing for efifb Oct 2 20:38:31.086609 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 20:38:31.086616 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 20:38:31.086623 kernel: efifb: scrolling: redraw Oct 2 20:38:31.086631 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 20:38:31.086638 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:38:31.086645 kernel: fb0: EFI VGA frame buffer device Oct 2 20:38:31.086652 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Oct 2 20:38:31.086659 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 20:38:31.086666 kernel: NET: Registered PF_INET6 protocol family Oct 2 20:38:31.086673 kernel: Segment Routing with IPv6 Oct 2 20:38:31.086680 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 20:38:31.086687 kernel: NET: Registered PF_PACKET protocol family Oct 2 20:38:31.086695 kernel: Key type dns_resolver registered Oct 2 20:38:31.086702 kernel: registered taskstats version 1 Oct 2 20:38:31.086709 kernel: Loading compiled-in X.509 certificates Oct 2 20:38:31.086716 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 20:38:31.086723 kernel: Key type .fscrypt registered Oct 2 20:38:31.086730 kernel: Key type fscrypt-provisioning registered Oct 2 20:38:31.086737 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 20:38:31.086744 kernel: ima: Allocated hash algorithm: sha1 Oct 2 20:38:31.086750 kernel: ima: No architecture policies found Oct 2 20:38:31.086759 kernel: Freeing unused kernel memory: 34560K Oct 2 20:38:31.086766 kernel: Run /init as init process Oct 2 20:38:31.086772 kernel: with arguments: Oct 2 20:38:31.086779 kernel: /init Oct 2 20:38:31.086786 kernel: with environment: Oct 2 20:38:31.086792 kernel: HOME=/ Oct 2 20:38:31.086799 kernel: TERM=linux Oct 2 20:38:31.086806 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 20:38:31.086815 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:38:31.086825 systemd[1]: Detected virtualization microsoft. Oct 2 20:38:31.086833 systemd[1]: Detected architecture arm64. Oct 2 20:38:31.086839 systemd[1]: Running in initrd. Oct 2 20:38:31.086846 systemd[1]: No hostname configured, using default hostname. Oct 2 20:38:31.086853 systemd[1]: Hostname set to . Oct 2 20:38:31.086861 systemd[1]: Initializing machine ID from random generator. Oct 2 20:38:31.086868 systemd[1]: Queued start job for default target initrd.target. Oct 2 20:38:31.086877 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:38:31.086883 systemd[1]: Reached target cryptsetup.target. Oct 2 20:38:31.086891 systemd[1]: Reached target paths.target. Oct 2 20:38:31.086897 systemd[1]: Reached target slices.target. Oct 2 20:38:31.086904 systemd[1]: Reached target swap.target. Oct 2 20:38:31.086911 systemd[1]: Reached target timers.target. Oct 2 20:38:31.086919 systemd[1]: Listening on iscsid.socket. Oct 2 20:38:31.086926 systemd[1]: Listening on iscsiuio.socket. Oct 2 20:38:31.086934 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 20:38:31.086941 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 20:38:31.086949 systemd[1]: Listening on systemd-journald.socket. Oct 2 20:38:31.086956 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:38:31.086963 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:38:31.086970 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:38:31.086977 systemd[1]: Reached target sockets.target. Oct 2 20:38:31.086984 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:38:31.086991 systemd[1]: Finished network-cleanup.service. Oct 2 20:38:31.087000 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 20:38:31.087007 systemd[1]: Starting systemd-journald.service... Oct 2 20:38:31.087014 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:38:31.087021 systemd[1]: Starting systemd-resolved.service... Oct 2 20:38:31.087028 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 20:38:31.087040 systemd-journald[276]: Journal started Oct 2 20:38:31.087082 systemd-journald[276]: Runtime Journal (/run/log/journal/a39e6020d6ac48deae773398f18f725f) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:38:31.062222 systemd-modules-load[277]: Inserted module 'overlay' Oct 2 20:38:31.134101 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 20:38:31.134125 kernel: Bridge firewalling registered Oct 2 20:38:31.134143 systemd[1]: Started systemd-journald.service. Oct 2 20:38:31.134155 kernel: audit: type=1130 audit(1696279111.117:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.097278 systemd-resolved[278]: Positive Trust Anchors: Oct 2 20:38:31.175838 kernel: audit: type=1130 audit(1696279111.138:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.175863 kernel: SCSI subsystem initialized Oct 2 20:38:31.175872 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 20:38:31.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.097286 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:38:31.209029 kernel: audit: type=1130 audit(1696279111.179:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.209050 kernel: device-mapper: uevent: version 1.0.3 Oct 2 20:38:31.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.097327 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:38:31.267759 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 20:38:31.267782 kernel: audit: type=1130 audit(1696279111.213:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.100292 systemd-resolved[278]: Defaulting to hostname 'linux'. Oct 2 20:38:31.291717 kernel: audit: type=1130 audit(1696279111.272:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.109310 systemd-modules-load[277]: Inserted module 'br_netfilter' Oct 2 20:38:31.317491 kernel: audit: type=1130 audit(1696279111.296:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.134131 systemd[1]: Started systemd-resolved.service. Oct 2 20:38:31.138653 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:38:31.180360 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 20:38:31.389694 kernel: audit: type=1130 audit(1696279111.362:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.213512 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 20:38:31.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.272577 systemd-modules-load[277]: Inserted module 'dm_multipath' Oct 2 20:38:31.436502 kernel: audit: type=1130 audit(1696279111.389:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.436525 kernel: audit: type=1130 audit(1696279111.414:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.288517 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:38:31.296561 systemd[1]: Reached target nss-lookup.target. Oct 2 20:38:31.453527 dracut-cmdline[298]: dracut-dracut-053 Oct 2 20:38:31.325687 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 20:38:31.332146 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:38:31.468320 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:38:31.336491 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:38:31.354486 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:38:31.380533 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:38:31.389921 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 20:38:31.419626 systemd[1]: Starting dracut-cmdline.service... Oct 2 20:38:31.607332 kernel: Loading iSCSI transport class v2.0-870. Oct 2 20:38:31.618328 kernel: iscsi: registered transport (tcp) Oct 2 20:38:31.639415 kernel: iscsi: registered transport (qla4xxx) Oct 2 20:38:31.639433 kernel: QLogic iSCSI HBA Driver Oct 2 20:38:31.723318 systemd[1]: Finished dracut-cmdline.service. Oct 2 20:38:31.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:31.729287 systemd[1]: Starting dracut-pre-udev.service... Oct 2 20:38:31.796324 kernel: raid6: neonx8 gen() 13809 MB/s Oct 2 20:38:31.813315 kernel: raid6: neonx8 xor() 10835 MB/s Oct 2 20:38:31.835316 kernel: raid6: neonx4 gen() 13545 MB/s Oct 2 20:38:31.855320 kernel: raid6: neonx4 xor() 11312 MB/s Oct 2 20:38:31.875314 kernel: raid6: neonx2 gen() 13103 MB/s Oct 2 20:38:31.896316 kernel: raid6: neonx2 xor() 10242 MB/s Oct 2 20:38:31.916316 kernel: raid6: neonx1 gen() 10530 MB/s Oct 2 20:38:31.936315 kernel: raid6: neonx1 xor() 8789 MB/s Oct 2 20:38:31.957320 kernel: raid6: int64x8 gen() 6297 MB/s Oct 2 20:38:31.977314 kernel: raid6: int64x8 xor() 3551 MB/s Oct 2 20:38:31.997314 kernel: raid6: int64x4 gen() 7209 MB/s Oct 2 20:38:32.018319 kernel: raid6: int64x4 xor() 3852 MB/s Oct 2 20:38:32.038315 kernel: raid6: int64x2 gen() 6152 MB/s Oct 2 20:38:32.058318 kernel: raid6: int64x2 xor() 3323 MB/s Oct 2 20:38:32.079318 kernel: raid6: int64x1 gen() 5046 MB/s Oct 2 20:38:32.103599 kernel: raid6: int64x1 xor() 2647 MB/s Oct 2 20:38:32.103616 kernel: raid6: using algorithm neonx8 gen() 13809 MB/s Oct 2 20:38:32.103632 kernel: raid6: .... xor() 10835 MB/s, rmw enabled Oct 2 20:38:32.107723 kernel: raid6: using neon recovery algorithm Oct 2 20:38:32.128647 kernel: xor: measuring software checksum speed Oct 2 20:38:32.128658 kernel: 8regs : 17319 MB/sec Oct 2 20:38:32.132730 kernel: 32regs : 20765 MB/sec Oct 2 20:38:32.138307 kernel: arm64_neon : 27816 MB/sec Oct 2 20:38:32.138317 kernel: xor: using function: arm64_neon (27816 MB/sec) Oct 2 20:38:32.198321 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 20:38:32.217019 systemd[1]: Finished dracut-pre-udev.service. Oct 2 20:38:32.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.224000 audit: BPF prog-id=7 op=LOAD Oct 2 20:38:32.225000 audit: BPF prog-id=8 op=LOAD Oct 2 20:38:32.225820 systemd[1]: Starting systemd-udevd.service... Oct 2 20:38:32.246734 systemd-udevd[475]: Using default interface naming scheme 'v252'. Oct 2 20:38:32.253413 systemd[1]: Started systemd-udevd.service. Oct 2 20:38:32.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.264743 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 20:38:32.292750 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Oct 2 20:38:32.342699 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 20:38:32.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.348239 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:38:32.391846 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:38:32.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.456326 kernel: hv_vmbus: Vmbus version:5.3 Oct 2 20:38:32.481548 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 20:38:32.481609 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 20:38:32.481618 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 20:38:32.481627 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 20:38:32.490275 kernel: scsi host1: storvsc_host_t Oct 2 20:38:32.490482 kernel: scsi host0: storvsc_host_t Oct 2 20:38:32.497257 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 20:38:32.497329 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 20:38:32.516115 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 20:38:32.516189 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 20:38:32.531877 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 20:38:32.548605 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 20:38:32.548828 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 20:38:32.548839 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 20:38:32.555325 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 20:38:32.555465 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 20:38:32.563759 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 20:38:32.563914 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 20:38:32.563994 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 20:38:32.577337 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:32.583325 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 20:38:32.701333 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (538) Oct 2 20:38:32.703653 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 20:38:32.730441 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:38:32.767218 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 20:38:32.783701 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 20:38:32.789979 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 20:38:32.805227 systemd[1]: Starting disk-uuid.service... Oct 2 20:38:32.830359 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:33.854328 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:33.854481 disk-uuid[589]: The operation has completed successfully. Oct 2 20:38:33.931159 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 20:38:33.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.931250 systemd[1]: Finished disk-uuid.service. Oct 2 20:38:33.940791 systemd[1]: Starting verity-setup.service... Oct 2 20:38:33.981375 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 20:38:34.079539 systemd[1]: Found device dev-mapper-usr.device. Oct 2 20:38:34.089757 systemd[1]: Finished verity-setup.service. Oct 2 20:38:34.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.095274 systemd[1]: Mounting sysusr-usr.mount... Oct 2 20:38:34.156459 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 20:38:34.156649 systemd[1]: Mounted sysusr-usr.mount. Oct 2 20:38:34.161592 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 20:38:34.162331 systemd[1]: Starting ignition-setup.service... Oct 2 20:38:34.170242 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 20:38:34.211601 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:38:34.211653 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:38:34.216331 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:38:34.255030 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 20:38:34.317535 systemd[1]: Finished ignition-setup.service. Oct 2 20:38:34.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.327740 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 20:38:34.359990 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 20:38:34.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.368000 audit: BPF prog-id=9 op=LOAD Oct 2 20:38:34.369448 systemd[1]: Starting systemd-networkd.service... Oct 2 20:38:34.397928 systemd-networkd[866]: lo: Link UP Oct 2 20:38:34.397943 systemd-networkd[866]: lo: Gained carrier Oct 2 20:38:34.398328 systemd-networkd[866]: Enumeration completed Oct 2 20:38:34.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.398433 systemd[1]: Started systemd-networkd.service. Oct 2 20:38:34.401673 systemd-networkd[866]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:38:34.406003 systemd-networkd[866]: eth0: Link UP Oct 2 20:38:34.411258 systemd[1]: Reached target network.target. Oct 2 20:38:34.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.422866 systemd[1]: Starting iscsiuio.service... Oct 2 20:38:34.435249 systemd[1]: Started iscsiuio.service. Oct 2 20:38:34.446376 systemd[1]: Starting iscsid.service... Oct 2 20:38:34.461810 iscsid[871]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:38:34.461810 iscsid[871]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 20:38:34.461810 iscsid[871]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 20:38:34.461810 iscsid[871]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 20:38:34.461810 iscsid[871]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:38:34.461810 iscsid[871]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 20:38:34.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.458336 systemd[1]: Started iscsid.service. Oct 2 20:38:34.472238 systemd[1]: Starting dracut-initqueue.service... Oct 2 20:38:34.529539 systemd[1]: Finished dracut-initqueue.service. Oct 2 20:38:34.533988 systemd[1]: Reached target remote-fs-pre.target. Oct 2 20:38:34.538608 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:38:34.550097 systemd[1]: Reached target remote-fs.target. Oct 2 20:38:34.559319 systemd[1]: Starting dracut-pre-mount.service... Oct 2 20:38:34.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.586727 systemd[1]: Finished dracut-pre-mount.service. Oct 2 20:38:35.302118 ignition[843]: Ignition 2.14.0 Oct 2 20:38:35.302129 ignition[843]: Stage: fetch-offline Oct 2 20:38:35.302180 ignition[843]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:35.302205 ignition[843]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:35.328589 ignition[843]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:35.328757 ignition[843]: parsed url from cmdline: "" Oct 2 20:38:35.335485 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 20:38:35.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:35.328761 ignition[843]: no config URL provided Oct 2 20:38:35.369554 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 20:38:35.369578 kernel: audit: type=1130 audit(1696279115.339:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:35.349218 systemd[1]: Starting ignition-fetch.service... Oct 2 20:38:35.328767 ignition[843]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:38:35.328775 ignition[843]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:38:35.328782 ignition[843]: failed to fetch config: resource requires networking Oct 2 20:38:35.334599 ignition[843]: Ignition finished successfully Oct 2 20:38:35.362360 ignition[890]: Ignition 2.14.0 Oct 2 20:38:35.362366 ignition[890]: Stage: fetch Oct 2 20:38:35.362484 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:35.362502 ignition[890]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:35.365347 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:35.365478 ignition[890]: parsed url from cmdline: "" Oct 2 20:38:35.365481 ignition[890]: no config URL provided Oct 2 20:38:35.365486 ignition[890]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:38:35.365496 ignition[890]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:38:35.365527 ignition[890]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 20:38:35.383829 ignition[890]: GET error: Get "http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text": dial tcp 169.254.169.254:80: connect: network is unreachable Oct 2 20:38:35.584419 ignition[890]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #2 Oct 2 20:38:35.584555 ignition[890]: GET error: Get "http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text": dial tcp 169.254.169.254:80: connect: network is unreachable Oct 2 20:38:35.985116 ignition[890]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #3 Oct 2 20:38:35.985257 ignition[890]: GET error: Get "http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text": dial tcp 169.254.169.254:80: connect: network is unreachable Oct 2 20:38:36.326315 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:38:36.326257 systemd-networkd[866]: eth0: Gained carrier Oct 2 20:38:36.343366 systemd-networkd[866]: eth0: DHCPv4 address 10.200.20.45/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:38:36.785360 ignition[890]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #4 Oct 2 20:38:36.802938 ignition[890]: GET result: OK Oct 2 20:38:36.803049 ignition[890]: config has been read from IMDS userdata Oct 2 20:38:36.803111 ignition[890]: parsing config with SHA512: b2e821db855908925d8189579adb3dbb1dfd786acf8755425f7cae76533ebef6cbfc15d9559ad4e4eb00a572fa01fb9f100d28cfc6cf6c61c98ff2db089f1f1f Oct 2 20:38:36.819640 unknown[890]: fetched base config from "system" Oct 2 20:38:36.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:36.820109 ignition[890]: fetch: fetch complete Oct 2 20:38:36.849853 kernel: audit: type=1130 audit(1696279116.829:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:36.819649 unknown[890]: fetched base config from "system" Oct 2 20:38:36.820114 ignition[890]: fetch: fetch passed Oct 2 20:38:36.819654 unknown[890]: fetched user config from "azure" Oct 2 20:38:36.820152 ignition[890]: Ignition finished successfully Oct 2 20:38:36.825795 systemd[1]: Finished ignition-fetch.service. Oct 2 20:38:36.866587 ignition[896]: Ignition 2.14.0 Oct 2 20:38:36.836256 systemd[1]: Starting ignition-kargs.service... Oct 2 20:38:36.866593 ignition[896]: Stage: kargs Oct 2 20:38:36.882559 systemd[1]: Finished ignition-kargs.service. Oct 2 20:38:36.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:36.866732 ignition[896]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:36.923011 kernel: audit: type=1130 audit(1696279116.889:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:36.911963 systemd[1]: Starting ignition-disks.service... Oct 2 20:38:36.866762 ignition[896]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:36.877460 ignition[896]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:36.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:36.934393 systemd[1]: Finished ignition-disks.service. Oct 2 20:38:36.964037 kernel: audit: type=1130 audit(1696279116.938:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:36.878582 ignition[896]: kargs: kargs passed Oct 2 20:38:36.939190 systemd[1]: Reached target initrd-root-device.target. Oct 2 20:38:36.878630 ignition[896]: Ignition finished successfully Oct 2 20:38:36.961415 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:38:36.925738 ignition[902]: Ignition 2.14.0 Oct 2 20:38:36.968857 systemd[1]: Reached target local-fs.target. Oct 2 20:38:36.925745 ignition[902]: Stage: disks Oct 2 20:38:36.976896 systemd[1]: Reached target sysinit.target. Oct 2 20:38:36.925939 ignition[902]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:36.986041 systemd[1]: Reached target basic.target. Oct 2 20:38:36.925969 ignition[902]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:36.995062 systemd[1]: Starting systemd-fsck-root.service... Oct 2 20:38:36.931632 ignition[902]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:36.932699 ignition[902]: disks: disks passed Oct 2 20:38:36.932750 ignition[902]: Ignition finished successfully Oct 2 20:38:37.065380 systemd-fsck[910]: ROOT: clean, 603/7326000 files, 481067/7359488 blocks Oct 2 20:38:37.075978 systemd[1]: Finished systemd-fsck-root.service. Oct 2 20:38:37.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.102916 systemd[1]: Mounting sysroot.mount... Oct 2 20:38:37.113263 kernel: audit: type=1130 audit(1696279117.080:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.128321 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 20:38:37.128675 systemd[1]: Mounted sysroot.mount. Oct 2 20:38:37.132413 systemd[1]: Reached target initrd-root-fs.target. Oct 2 20:38:37.149059 systemd[1]: Mounting sysroot-usr.mount... Oct 2 20:38:37.153597 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 20:38:37.163117 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 20:38:37.163149 systemd[1]: Reached target ignition-diskful.target. Oct 2 20:38:37.169020 systemd[1]: Mounted sysroot-usr.mount. Oct 2 20:38:37.196411 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:38:37.223615 kernel: hv_netvsc 002248c1-daf4-0022-48c1-daf4002248c1 eth0: VF slot 1 added Oct 2 20:38:37.223766 kernel: hv_vmbus: registering driver hv_pci Oct 2 20:38:37.202063 systemd[1]: Starting initrd-setup-root.service... Oct 2 20:38:37.253404 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (920) Oct 2 20:38:37.253425 kernel: hv_pci 8011d992-d29c-4c6d-9dc4-dae29cd30efa: PCI VMBus probing: Using version 0x10004 Oct 2 20:38:37.253560 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:38:37.255087 initrd-setup-root[925]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 20:38:37.291908 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:38:37.291932 kernel: hv_pci 8011d992-d29c-4c6d-9dc4-dae29cd30efa: PCI host bridge to bus d29c:00 Oct 2 20:38:37.292071 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:38:37.292080 kernel: pci_bus d29c:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Oct 2 20:38:37.292171 kernel: pci_bus d29c:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 20:38:37.354438 systemd-networkd[866]: eth0: Gained IPv6LL Oct 2 20:38:37.491325 kernel: pci d29c:00:02.0: [15b3:1018] type 00 class 0x020000 Oct 2 20:38:37.495078 initrd-setup-root[946]: cut: /sysroot/etc/group: No such file or directory Oct 2 20:38:37.507718 kernel: pci d29c:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:38:37.523361 initrd-setup-root[959]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 20:38:37.523493 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:38:37.550322 kernel: pci d29c:00:02.0: enabling Extended Tags Oct 2 20:38:37.555384 initrd-setup-root[967]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 20:38:37.579081 kernel: pci d29c:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at d29c:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Oct 2 20:38:37.579256 kernel: pci_bus d29c:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 20:38:37.589083 kernel: pci d29c:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:38:37.630337 kernel: mlx5_core d29c:00:02.0: firmware version: 16.31.2424 Oct 2 20:38:37.740426 systemd[1]: Finished initrd-setup-root.service. Oct 2 20:38:37.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.750213 systemd[1]: Starting ignition-mount.service... Oct 2 20:38:37.774681 kernel: audit: type=1130 audit(1696279117.749:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.775070 systemd[1]: Starting sysroot-boot.service... Oct 2 20:38:37.783441 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 20:38:37.783556 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 20:38:37.815329 kernel: mlx5_core d29c:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Oct 2 20:38:37.830006 systemd[1]: Finished sysroot-boot.service. Oct 2 20:38:37.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.854235 ignition[997]: INFO : Ignition 2.14.0 Oct 2 20:38:37.854235 ignition[997]: INFO : Stage: mount Oct 2 20:38:37.854235 ignition[997]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:37.854235 ignition[997]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:37.854235 ignition[997]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:37.854235 ignition[997]: INFO : mount: mount passed Oct 2 20:38:37.854235 ignition[997]: INFO : Ignition finished successfully Oct 2 20:38:37.926128 kernel: audit: type=1130 audit(1696279117.836:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.926154 kernel: audit: type=1130 audit(1696279117.864:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.860112 systemd[1]: Finished ignition-mount.service. Oct 2 20:38:37.930783 coreos-metadata[919]: Oct 02 20:38:37.930 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:38:37.939773 coreos-metadata[919]: Oct 02 20:38:37.933 INFO Fetch successful Oct 2 20:38:37.968668 coreos-metadata[919]: Oct 02 20:38:37.968 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:38:37.982175 coreos-metadata[919]: Oct 02 20:38:37.982 INFO Fetch successful Oct 2 20:38:37.987522 coreos-metadata[919]: Oct 02 20:38:37.983 INFO wrote hostname ci-3510.3.0-a-35b8781a58 to /sysroot/etc/hostname Oct 2 20:38:37.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:37.985785 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 20:38:38.029401 kernel: audit: type=1130 audit(1696279117.992:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.018034 systemd[1]: Starting ignition-files.service... Oct 2 20:38:38.035030 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:38:38.055478 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1008) Oct 2 20:38:38.066752 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:38:38.066785 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:38:38.066795 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:38:38.075581 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:38:38.095749 ignition[1027]: INFO : Ignition 2.14.0 Oct 2 20:38:38.099910 ignition[1027]: INFO : Stage: files Oct 2 20:38:38.099910 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:38.099910 ignition[1027]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:38.123715 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:38.123715 ignition[1027]: DEBUG : files: compiled without relabeling support, skipping Oct 2 20:38:38.123715 ignition[1027]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 20:38:38.123715 ignition[1027]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 20:38:38.164355 kernel: hv_netvsc 002248c1-daf4-0022-48c1-daf4002248c1 eth0: VF registering: eth1 Oct 2 20:38:38.164507 kernel: mlx5_core d29c:00:02.0 eth1: joined to eth0 Oct 2 20:38:38.166148 ignition[1027]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 20:38:38.180207 ignition[1027]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 20:38:38.188959 kernel: mlx5_core d29c:00:02.0 enP53916s1: renamed from eth1 Oct 2 20:38:38.188166 unknown[1027]: wrote ssh authorized keys file for user: core Oct 2 20:38:38.194240 ignition[1027]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 20:38:38.194240 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 20:38:38.194240 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Oct 2 20:38:38.225942 systemd-networkd[866]: eth1: Interface name change detected, renamed to enP53916s1. Oct 2 20:38:38.298225 systemd-networkd[866]: enP53916s1: Link UP Oct 2 20:38:38.302291 kernel: mlx5_core d29c:00:02.0 enP53916s1: Link up Oct 2 20:38:38.384326 kernel: hv_netvsc 002248c1-daf4-0022-48c1-daf4002248c1 eth0: Data path switched to VF: enP53916s1 Oct 2 20:38:38.384353 systemd-networkd[866]: enP53916s1: Gained carrier Oct 2 20:38:38.492614 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 20:38:38.731249 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Oct 2 20:38:38.747944 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 20:38:38.747944 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-arm64.tar.gz" Oct 2 20:38:38.747944 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-arm64.tar.gz: attempt #1 Oct 2 20:38:38.817129 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 20:38:38.898125 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: ebd055e9b2888624d006decd582db742131ed815d059d529ba21eaf864becca98a84b20a10eec91051b9d837c6855d28d5042bf5e9a454f4540aec6b82d37e96 Oct 2 20:38:38.914818 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-arm64.tar.gz" Oct 2 20:38:38.914818 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:38:38.914818 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubeadm: attempt #1 Oct 2 20:38:39.027570 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 20:38:39.828708 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: daab8965a4f617d1570d04c031ab4d55fff6aa13a61f0e4045f2338947f9fb0ee3a80fdee57cfe86db885390595460342181e1ec52b89f127ef09c393ae3db7f Oct 2 20:38:39.845701 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:38:39.845701 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:38:39.845701 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubelet: attempt #1 Oct 2 20:38:39.886133 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 20:38:40.802382 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 7b872a34d86e8aa75455a62a20f5cf16426de2ae54ffb8e0250fead920838df818201b8512c2f8bf4c939e5b21babab371f3a48803e2e861da9e6f8cdd022324 Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:38:40.819383 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:38:40.902585 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1030) Oct 2 20:38:40.879796 systemd[1]: mnt-oem3444640808.mount: Deactivated successfully. Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3444640808" Oct 2 20:38:40.908316 ignition[1027]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3444640808": device or resource busy Oct 2 20:38:40.908316 ignition[1027]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3444640808", trying btrfs: device or resource busy Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3444640808" Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3444640808" Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem3444640808" Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem3444640808" Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(e): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem415869548" Oct 2 20:38:40.908316 ignition[1027]: CRITICAL : files: createFilesystemsFiles: createFiles: op(d): op(e): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem415869548": device or resource busy Oct 2 20:38:40.908316 ignition[1027]: ERROR : files: createFilesystemsFiles: createFiles: op(d): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem415869548", trying btrfs: device or resource busy Oct 2 20:38:40.908316 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem415869548" Oct 2 20:38:41.217282 kernel: audit: type=1130 audit(1696279120.936:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.217325 kernel: audit: type=1130 audit(1696279121.014:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.217336 kernel: audit: type=1131 audit(1696279121.014:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.217345 kernel: audit: type=1130 audit(1696279121.045:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.217355 kernel: audit: type=1130 audit(1696279121.139:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.217364 kernel: audit: type=1131 audit(1696279121.139:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:40.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.217517 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(f): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem415869548" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(10): [started] unmounting "/mnt/oem415869548" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(10): [finished] unmounting "/mnt/oem415869548" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(11): [started] processing unit "waagent.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(11): [finished] processing unit "waagent.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:38:41.217517 ignition[1027]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Oct 2 20:38:41.507272 kernel: audit: type=1130 audit(1696279121.284:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.507300 kernel: audit: type=1130 audit(1696279121.331:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.507325 kernel: audit: type=1131 audit(1696279121.331:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.507336 kernel: audit: type=1131 audit(1696279121.419:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:40.920556 systemd[1]: Finished ignition-files.service. Oct 2 20:38:41.515819 ignition[1027]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: op(1a): [started] setting preset to enabled for "nvidia.service" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: op(1a): [finished] setting preset to enabled for "nvidia.service" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:38:41.515819 ignition[1027]: INFO : files: files passed Oct 2 20:38:41.515819 ignition[1027]: INFO : Ignition finished successfully Oct 2 20:38:41.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:40.939604 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 20:38:41.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.631076 initrd-setup-root-after-ignition[1054]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 20:38:41.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:40.983224 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 20:38:41.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:40.984167 systemd[1]: Starting ignition-quench.service... Oct 2 20:38:41.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.009245 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 20:38:41.009342 systemd[1]: Finished ignition-quench.service. Oct 2 20:38:41.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.014802 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 20:38:41.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.059538 systemd[1]: Reached target ignition-complete.target. Oct 2 20:38:41.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.095506 systemd[1]: Starting initrd-parse-etc.service... Oct 2 20:38:41.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.741468 ignition[1067]: INFO : Ignition 2.14.0 Oct 2 20:38:41.741468 ignition[1067]: INFO : Stage: umount Oct 2 20:38:41.741468 ignition[1067]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:41.741468 ignition[1067]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:41.741468 ignition[1067]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:41.741468 ignition[1067]: INFO : umount: umount passed Oct 2 20:38:41.741468 ignition[1067]: INFO : Ignition finished successfully Oct 2 20:38:41.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.129188 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 20:38:41.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.129320 systemd[1]: Finished initrd-parse-etc.service. Oct 2 20:38:41.139712 systemd[1]: Reached target initrd-fs.target. Oct 2 20:38:41.172090 systemd[1]: Reached target initrd.target. Oct 2 20:38:41.205264 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 20:38:41.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.215871 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 20:38:41.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.872000 audit: BPF prog-id=6 op=UNLOAD Oct 2 20:38:41.273522 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 20:38:41.285580 systemd[1]: Starting initrd-cleanup.service... Oct 2 20:38:41.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.321014 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 20:38:41.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.321114 systemd[1]: Finished initrd-cleanup.service. Oct 2 20:38:41.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.331566 systemd[1]: Stopped target nss-lookup.target. Oct 2 20:38:41.381547 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 20:38:41.397513 systemd[1]: Stopped target timers.target. Oct 2 20:38:41.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.408531 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 20:38:41.408595 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 20:38:41.447423 systemd[1]: Stopped target initrd.target. Oct 2 20:38:41.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.462465 systemd[1]: Stopped target basic.target. Oct 2 20:38:41.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.473876 systemd[1]: Stopped target ignition-complete.target. Oct 2 20:38:41.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.486635 systemd[1]: Stopped target ignition-diskful.target. Oct 2 20:38:41.499414 systemd[1]: Stopped target initrd-root-device.target. Oct 2 20:38:41.512025 systemd[1]: Stopped target remote-fs.target. Oct 2 20:38:41.521022 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 20:38:42.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.533282 systemd[1]: Stopped target sysinit.target. Oct 2 20:38:42.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.544424 systemd[1]: Stopped target local-fs.target. Oct 2 20:38:42.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.555850 systemd[1]: Stopped target local-fs-pre.target. Oct 2 20:38:42.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:42.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.567509 systemd[1]: Stopped target swap.target. Oct 2 20:38:41.578479 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 20:38:41.578545 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 20:38:41.592990 systemd[1]: Stopped target cryptsetup.target. Oct 2 20:38:41.607124 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 20:38:41.607179 systemd[1]: Stopped dracut-initqueue.service. Oct 2 20:38:41.615916 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 20:38:41.615966 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 20:38:41.625775 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 20:38:41.625813 systemd[1]: Stopped ignition-files.service. Oct 2 20:38:41.635160 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 20:38:41.635203 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 20:38:41.648837 systemd[1]: Stopping ignition-mount.service... Oct 2 20:38:41.663974 systemd[1]: Stopping sysroot-boot.service... Oct 2 20:38:41.667939 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 20:38:41.668010 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 20:38:41.674125 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 20:38:41.674177 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 20:38:41.692623 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 20:38:41.692730 systemd[1]: Stopped ignition-mount.service. Oct 2 20:38:41.701440 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 20:38:41.701511 systemd[1]: Stopped ignition-disks.service. Oct 2 20:38:41.718226 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 20:38:41.718285 systemd[1]: Stopped ignition-kargs.service. Oct 2 20:38:41.728911 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 20:38:41.728962 systemd[1]: Stopped ignition-fetch.service. Oct 2 20:38:41.737858 systemd[1]: Stopped target network.target. Oct 2 20:38:41.742105 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 20:38:41.742161 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 20:38:41.751901 systemd[1]: Stopped target paths.target. Oct 2 20:38:41.759326 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 20:38:41.763343 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 20:38:41.771293 systemd[1]: Stopped target slices.target. Oct 2 20:38:41.790153 systemd[1]: Stopped target sockets.target. Oct 2 20:38:41.802264 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 20:38:41.802295 systemd[1]: Closed iscsid.socket. Oct 2 20:38:41.806329 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 20:38:41.806358 systemd[1]: Closed iscsiuio.socket. Oct 2 20:38:41.814545 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 20:38:41.814588 systemd[1]: Stopped ignition-setup.service. Oct 2 20:38:41.825141 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:38:41.835125 systemd[1]: Stopping systemd-resolved.service... Oct 2 20:38:41.839365 systemd-networkd[866]: eth0: DHCPv6 lease lost Oct 2 20:38:42.233000 audit: BPF prog-id=9 op=UNLOAD Oct 2 20:38:41.850048 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 20:38:41.850614 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 20:38:41.850715 systemd[1]: Stopped systemd-resolved.service. Oct 2 20:38:41.857746 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:38:41.857836 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:38:41.869144 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 20:38:41.869179 systemd[1]: Closed systemd-networkd.socket. Oct 2 20:38:41.877916 systemd[1]: Stopping network-cleanup.service... Oct 2 20:38:41.887881 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 20:38:41.887943 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 20:38:41.892912 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 20:38:41.892961 systemd[1]: Stopped systemd-sysctl.service. Oct 2 20:38:41.906471 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 20:38:41.906524 systemd[1]: Stopped systemd-modules-load.service. Oct 2 20:38:41.911347 systemd[1]: Stopping systemd-udevd.service... Oct 2 20:38:41.924412 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 20:38:41.929790 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 20:38:41.929956 systemd[1]: Stopped systemd-udevd.service. Oct 2 20:38:41.940325 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 20:38:41.940368 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 20:38:41.948398 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 20:38:41.948436 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 20:38:41.957960 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 20:38:41.958011 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 20:38:41.966137 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 20:38:41.966175 systemd[1]: Stopped dracut-cmdline.service. Oct 2 20:38:41.973996 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 20:38:41.974030 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 20:38:42.382216 kernel: hv_netvsc 002248c1-daf4-0022-48c1-daf4002248c1 eth0: Data path switched from VF: enP53916s1 Oct 2 20:38:41.986639 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 20:38:42.002669 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 20:38:42.002760 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 20:38:42.015652 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 20:38:42.015708 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 20:38:42.020086 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 20:38:42.020124 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 20:38:42.030042 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 20:38:42.030515 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 20:38:42.030615 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 20:38:42.450089 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 20:38:42.450189 systemd[1]: Stopped network-cleanup.service. Oct 2 20:38:42.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:42.487458 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 20:38:42.487560 systemd[1]: Stopped sysroot-boot.service. Oct 2 20:38:42.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:42.497369 systemd[1]: Reached target initrd-switch-root.target. Oct 2 20:38:42.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:42.506589 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 20:38:42.506652 systemd[1]: Stopped initrd-setup-root.service. Oct 2 20:38:42.512168 systemd[1]: Starting initrd-switch-root.service... Oct 2 20:38:42.531463 systemd[1]: Switching root. Oct 2 20:38:42.562115 iscsid[871]: iscsid shutting down. Oct 2 20:38:42.565716 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Oct 2 20:38:42.565764 systemd-journald[276]: Journal stopped Oct 2 20:38:54.980009 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 20:38:54.980030 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 20:38:54.980040 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 20:38:54.980050 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 20:38:54.980058 kernel: SELinux: policy capability open_perms=1 Oct 2 20:38:54.980066 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 20:38:54.980075 kernel: SELinux: policy capability always_check_network=0 Oct 2 20:38:54.980083 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 20:38:54.980090 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 20:38:54.980099 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 20:38:54.980108 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 20:38:54.980117 systemd[1]: Successfully loaded SELinux policy in 155.122ms. Oct 2 20:38:54.980126 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 14.204ms. Oct 2 20:38:54.980136 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:38:54.980147 systemd[1]: Detected virtualization microsoft. Oct 2 20:38:54.980156 systemd[1]: Detected architecture arm64. Oct 2 20:38:54.980164 systemd[1]: Detected first boot. Oct 2 20:38:54.980173 systemd[1]: Hostname set to . Oct 2 20:38:54.980182 systemd[1]: Initializing machine ID from random generator. Oct 2 20:38:54.980404 kernel: mlx5_core d29c:00:02.0: poll_health:739:(pid 0): device's health compromised - reached miss count Oct 2 20:38:54.980420 systemd[1]: Populated /etc with preset unit settings. Oct 2 20:38:54.980432 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:38:54.980442 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:38:54.980453 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:38:54.980462 kernel: kauditd_printk_skb: 39 callbacks suppressed Oct 2 20:38:54.980470 kernel: audit: type=1334 audit(1696279134.044:87): prog-id=12 op=LOAD Oct 2 20:38:54.980479 kernel: audit: type=1334 audit(1696279134.044:88): prog-id=3 op=UNLOAD Oct 2 20:38:54.980489 kernel: audit: type=1334 audit(1696279134.044:89): prog-id=13 op=LOAD Oct 2 20:38:54.980498 kernel: audit: type=1334 audit(1696279134.044:90): prog-id=14 op=LOAD Oct 2 20:38:54.980506 kernel: audit: type=1334 audit(1696279134.044:91): prog-id=4 op=UNLOAD Oct 2 20:38:54.980514 kernel: audit: type=1334 audit(1696279134.044:92): prog-id=5 op=UNLOAD Oct 2 20:38:54.980523 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 20:38:54.980532 kernel: audit: type=1334 audit(1696279134.050:93): prog-id=15 op=LOAD Oct 2 20:38:54.980540 systemd[1]: Stopped iscsiuio.service. Oct 2 20:38:54.980549 kernel: audit: type=1334 audit(1696279134.050:94): prog-id=12 op=UNLOAD Oct 2 20:38:54.980559 kernel: audit: type=1334 audit(1696279134.055:95): prog-id=16 op=LOAD Oct 2 20:38:54.980567 kernel: audit: type=1334 audit(1696279134.061:96): prog-id=17 op=LOAD Oct 2 20:38:54.980576 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 20:38:54.980585 systemd[1]: Stopped iscsid.service. Oct 2 20:38:54.980595 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 20:38:54.980605 systemd[1]: Stopped initrd-switch-root.service. Oct 2 20:38:54.980615 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 20:38:54.980624 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 20:38:54.980633 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 20:38:54.980644 systemd[1]: Created slice system-getty.slice. Oct 2 20:38:54.980653 systemd[1]: Created slice system-modprobe.slice. Oct 2 20:38:54.980662 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 20:38:54.980671 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 20:38:54.980681 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 20:38:54.980690 systemd[1]: Created slice user.slice. Oct 2 20:38:54.980699 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:38:54.980708 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 20:38:54.980718 systemd[1]: Set up automount boot.automount. Oct 2 20:38:54.980729 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 20:38:54.980738 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 20:38:54.980747 systemd[1]: Stopped target initrd-fs.target. Oct 2 20:38:54.980756 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 20:38:54.980765 systemd[1]: Reached target integritysetup.target. Oct 2 20:38:54.980775 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:38:54.980784 systemd[1]: Reached target remote-fs.target. Oct 2 20:38:54.980794 systemd[1]: Reached target slices.target. Oct 2 20:38:54.980803 systemd[1]: Reached target swap.target. Oct 2 20:38:54.980812 systemd[1]: Reached target torcx.target. Oct 2 20:38:54.980822 systemd[1]: Reached target veritysetup.target. Oct 2 20:38:54.980831 systemd[1]: Listening on systemd-coredump.socket. Oct 2 20:38:54.980841 systemd[1]: Listening on systemd-initctl.socket. Oct 2 20:38:54.980851 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:38:54.980860 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:38:54.980869 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:38:54.980878 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 20:38:54.980888 systemd[1]: Mounting dev-hugepages.mount... Oct 2 20:38:54.980897 systemd[1]: Mounting dev-mqueue.mount... Oct 2 20:38:54.980906 systemd[1]: Mounting media.mount... Oct 2 20:38:54.980915 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 20:38:54.980926 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 20:38:54.980936 systemd[1]: Mounting tmp.mount... Oct 2 20:38:54.980945 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 20:38:54.980955 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 20:38:54.980964 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:38:54.980974 systemd[1]: Starting modprobe@configfs.service... Oct 2 20:38:54.980983 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 20:38:54.980992 systemd[1]: Starting modprobe@drm.service... Oct 2 20:38:54.981001 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 20:38:54.981012 systemd[1]: Starting modprobe@fuse.service... Oct 2 20:38:54.981021 systemd[1]: Starting modprobe@loop.service... Oct 2 20:38:54.981030 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 20:38:54.981040 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 20:38:54.981050 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 20:38:54.981059 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 20:38:54.981068 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 20:38:54.981077 systemd[1]: Stopped systemd-journald.service. Oct 2 20:38:54.981086 systemd[1]: systemd-journald.service: Consumed 3.199s CPU time. Oct 2 20:38:54.981097 systemd[1]: Starting systemd-journald.service... Oct 2 20:38:54.981106 kernel: loop: module loaded Oct 2 20:38:54.981114 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:38:54.981124 kernel: fuse: init (API version 7.34) Oct 2 20:38:54.981133 systemd[1]: Starting systemd-network-generator.service... Oct 2 20:38:54.981142 systemd[1]: Starting systemd-remount-fs.service... Oct 2 20:38:54.981151 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:38:54.981160 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 20:38:54.981170 systemd[1]: Stopped verity-setup.service. Oct 2 20:38:54.981180 systemd[1]: Mounted dev-hugepages.mount. Oct 2 20:38:54.981189 systemd[1]: Mounted dev-mqueue.mount. Oct 2 20:38:54.981198 systemd[1]: Mounted media.mount. Oct 2 20:38:54.981207 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 20:38:54.981216 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 20:38:54.981225 systemd[1]: Mounted tmp.mount. Oct 2 20:38:54.981234 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 20:38:54.981243 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:38:54.981253 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 20:38:54.981263 systemd[1]: Finished modprobe@configfs.service. Oct 2 20:38:54.981273 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 20:38:54.981282 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 20:38:54.981291 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 20:38:54.981300 systemd[1]: Finished modprobe@drm.service. Oct 2 20:38:54.981335 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 20:38:54.981345 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 20:38:54.981355 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 20:38:54.981369 systemd[1]: Finished modprobe@fuse.service. Oct 2 20:38:54.981378 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 20:38:54.981388 systemd[1]: Finished modprobe@loop.service. Oct 2 20:38:54.981398 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 20:38:54.981408 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 20:38:54.981417 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 20:38:54.981427 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 20:38:54.981436 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 20:38:54.981448 systemd-journald[1182]: Journal started Oct 2 20:38:54.981491 systemd-journald[1182]: Runtime Journal (/run/log/journal/a8d487f32b4b4cbda06d1941f2e0b4ea) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:38:43.310000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 20:38:43.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:38:43.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:38:43.582000 audit: BPF prog-id=10 op=LOAD Oct 2 20:38:43.582000 audit: BPF prog-id=10 op=UNLOAD Oct 2 20:38:43.582000 audit: BPF prog-id=11 op=LOAD Oct 2 20:38:43.582000 audit: BPF prog-id=11 op=UNLOAD Oct 2 20:38:54.044000 audit: BPF prog-id=12 op=LOAD Oct 2 20:38:54.044000 audit: BPF prog-id=3 op=UNLOAD Oct 2 20:38:54.044000 audit: BPF prog-id=13 op=LOAD Oct 2 20:38:54.044000 audit: BPF prog-id=14 op=LOAD Oct 2 20:38:54.044000 audit: BPF prog-id=4 op=UNLOAD Oct 2 20:38:54.044000 audit: BPF prog-id=5 op=UNLOAD Oct 2 20:38:54.050000 audit: BPF prog-id=15 op=LOAD Oct 2 20:38:54.050000 audit: BPF prog-id=12 op=UNLOAD Oct 2 20:38:54.055000 audit: BPF prog-id=16 op=LOAD Oct 2 20:38:54.061000 audit: BPF prog-id=17 op=LOAD Oct 2 20:38:54.061000 audit: BPF prog-id=13 op=UNLOAD Oct 2 20:38:54.061000 audit: BPF prog-id=14 op=UNLOAD Oct 2 20:38:54.067000 audit: BPF prog-id=18 op=LOAD Oct 2 20:38:54.067000 audit: BPF prog-id=15 op=UNLOAD Oct 2 20:38:54.072000 audit: BPF prog-id=19 op=LOAD Oct 2 20:38:54.078000 audit: BPF prog-id=20 op=LOAD Oct 2 20:38:54.078000 audit: BPF prog-id=16 op=UNLOAD Oct 2 20:38:54.078000 audit: BPF prog-id=17 op=UNLOAD Oct 2 20:38:54.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.098000 audit: BPF prog-id=18 op=UNLOAD Oct 2 20:38:54.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.640000 audit: BPF prog-id=21 op=LOAD Oct 2 20:38:54.640000 audit: BPF prog-id=22 op=LOAD Oct 2 20:38:54.640000 audit: BPF prog-id=23 op=LOAD Oct 2 20:38:54.640000 audit: BPF prog-id=19 op=UNLOAD Oct 2 20:38:54.640000 audit: BPF prog-id=20 op=UNLOAD Oct 2 20:38:54.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.977000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:38:54.977000 audit[1182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffccdc8f20 a2=4000 a3=1 items=0 ppid=1 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:54.977000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 20:38:43.974502 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:38:54.043123 systemd[1]: Queued start job for default target multi-user.target. Oct 2 20:38:43.987633 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:38:54.078978 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 20:38:43.987652 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:38:54.079403 systemd[1]: systemd-journald.service: Consumed 3.199s CPU time. Oct 2 20:38:43.987691 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 20:38:43.987700 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 20:38:43.987734 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 20:38:43.987746 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 20:38:43.988000 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 20:38:43.988048 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:38:43.988059 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:38:43.988525 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 20:38:43.988567 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 20:38:43.988585 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 20:38:43.988599 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 20:38:43.988615 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 20:38:43.988637 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 20:38:50.387569 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:50.387823 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:50.387923 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:50.388087 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:50.388133 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 20:38:50.388188 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2023-10-02T20:38:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 20:38:54.994478 systemd[1]: Started systemd-journald.service. Oct 2 20:38:54.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.995592 systemd[1]: Finished systemd-network-generator.service. Oct 2 20:38:55.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.000819 systemd[1]: Finished systemd-remount-fs.service. Oct 2 20:38:55.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.005739 systemd[1]: Reached target network-pre.target. Oct 2 20:38:55.010158 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 20:38:55.030439 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 20:38:55.036016 systemd[1]: Starting systemd-journal-flush.service... Oct 2 20:38:55.040437 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 20:38:55.041436 systemd[1]: Starting systemd-random-seed.service... Oct 2 20:38:55.047753 systemd[1]: Starting systemd-sysusers.service... Oct 2 20:38:55.055301 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:38:55.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.064992 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:38:55.072581 systemd-journald[1182]: Time spent on flushing to /var/log/journal/a8d487f32b4b4cbda06d1941f2e0b4ea is 21.766ms for 1097 entries. Oct 2 20:38:55.072581 systemd-journald[1182]: System Journal (/var/log/journal/a8d487f32b4b4cbda06d1941f2e0b4ea) is 8.0M, max 2.6G, 2.6G free. Oct 2 20:38:55.683379 systemd-journald[1182]: Received client request to flush runtime journal. Oct 2 20:38:55.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.083300 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:38:55.088867 systemd[1]: Finished systemd-random-seed.service. Oct 2 20:38:55.683888 udevadm[1220]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 20:38:55.094180 systemd[1]: Reached target first-boot-complete.target. Oct 2 20:38:55.101692 systemd[1]: Starting systemd-udev-settle.service... Oct 2 20:38:55.639994 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:38:55.684947 systemd[1]: Finished systemd-journal-flush.service. Oct 2 20:38:55.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:56.127882 systemd[1]: Finished systemd-sysusers.service. Oct 2 20:38:56.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:56.133469 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:38:56.648703 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:38:56.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:57.843769 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 20:38:57.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:57.849000 audit: BPF prog-id=24 op=LOAD Oct 2 20:38:57.849000 audit: BPF prog-id=25 op=LOAD Oct 2 20:38:57.849000 audit: BPF prog-id=7 op=UNLOAD Oct 2 20:38:57.849000 audit: BPF prog-id=8 op=UNLOAD Oct 2 20:38:57.850279 systemd[1]: Starting systemd-udevd.service... Oct 2 20:38:57.872003 systemd-udevd[1225]: Using default interface naming scheme 'v252'. Oct 2 20:38:58.190116 systemd[1]: Started systemd-udevd.service. Oct 2 20:38:58.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:58.199000 audit: BPF prog-id=26 op=LOAD Oct 2 20:38:58.201673 systemd[1]: Starting systemd-networkd.service... Oct 2 20:38:58.227241 systemd[1]: Starting systemd-userdbd.service... Oct 2 20:38:58.226000 audit: BPF prog-id=27 op=LOAD Oct 2 20:38:58.226000 audit: BPF prog-id=28 op=LOAD Oct 2 20:38:58.226000 audit: BPF prog-id=29 op=LOAD Oct 2 20:38:58.262205 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 2 20:38:58.268773 systemd[1]: Started systemd-userdbd.service. Oct 2 20:38:58.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:58.580000 audit[1227]: AVC avc: denied { confidentiality } for pid=1227 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:38:58.615370 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 20:38:58.615476 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 20:38:58.615494 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 20:38:58.615513 kernel: hv_vmbus: registering driver hv_balloon Oct 2 20:38:58.624293 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 20:38:58.624400 kernel: hv_vmbus: registering driver hv_utils Oct 2 20:38:58.624433 kernel: hv_balloon: Memory hot add disabled on ARM64 Oct 2 20:38:58.631323 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 20:38:58.640061 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 20:38:58.622881 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 20:39:00.806929 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 20:39:00.806967 systemd-journald[1182]: Time jumped backwards, rotating. Oct 2 20:39:00.807030 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 20:39:00.807046 kernel: Console: switching to colour dummy device 80x25 Oct 2 20:39:00.807058 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:39:00.807070 kernel: kauditd_printk_skb: 76 callbacks suppressed Oct 2 20:39:00.807082 kernel: audit: type=1130 audit(1696279139.024:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:00.807095 kernel: mlx5_core d29c:00:02.0 enP53916s1: Link up Oct 2 20:39:00.807262 kernel: hv_netvsc 002248c1-daf4-0022-48c1-daf4002248c1 eth0: Data path switched to VF: enP53916s1 Oct 2 20:39:00.807362 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1243) Oct 2 20:39:00.807374 kernel: audit: type=1130 audit(1696279140.577:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:00.807386 kernel: audit: type=1130 audit(1696279140.760:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:58.580000 audit[1227]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaddf17830 a1=aa2c a2=ffff91a624b0 a3=aaaadde79010 items=10 ppid=1225 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:58.580000 audit: CWD cwd="/" Oct 2 20:38:58.580000 audit: PATH item=0 name=(null) inode=11477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=1 name=(null) inode=11478 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=2 name=(null) inode=11477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=3 name=(null) inode=11479 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=4 name=(null) inode=11477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=5 name=(null) inode=11480 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=6 name=(null) inode=11477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=7 name=(null) inode=11481 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=8 name=(null) inode=11477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PATH item=9 name=(null) inode=11482 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:58.580000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 20:38:59.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:00.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:00.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:59.019986 systemd-networkd[1246]: lo: Link UP Oct 2 20:38:59.019991 systemd-networkd[1246]: lo: Gained carrier Oct 2 20:38:59.020371 systemd-networkd[1246]: Enumeration completed Oct 2 20:38:59.020463 systemd[1]: Started systemd-networkd.service. Oct 2 20:38:59.027697 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:38:59.258650 systemd-networkd[1246]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:38:59.356878 systemd-networkd[1246]: enP53916s1: Link UP Oct 2 20:38:59.356962 systemd-networkd[1246]: eth0: Link UP Oct 2 20:38:59.356965 systemd-networkd[1246]: eth0: Gained carrier Oct 2 20:38:59.370156 systemd-networkd[1246]: enP53916s1: Gained carrier Oct 2 20:38:59.379960 systemd-networkd[1246]: eth0: DHCPv4 address 10.200.20.45/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:39:00.566450 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:39:00.573348 systemd[1]: Finished systemd-udev-settle.service. Oct 2 20:39:00.579366 systemd[1]: Starting lvm2-activation-early.service... Oct 2 20:39:00.751972 systemd-networkd[1246]: eth0: Gained IPv6LL Oct 2 20:39:00.755173 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:39:00.920119 lvm[1306]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:39:00.948922 systemd[1]: Finished lvm2-activation-early.service. Oct 2 20:39:00.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:00.955063 systemd[1]: Reached target cryptsetup.target. Oct 2 20:39:00.974141 kernel: audit: type=1130 audit(1696279140.952:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:00.975622 systemd[1]: Starting lvm2-activation.service... Oct 2 20:39:00.982427 lvm[1307]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:39:01.012030 systemd[1]: Finished lvm2-activation.service. Oct 2 20:39:01.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.022082 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:39:01.037570 kernel: audit: type=1130 audit(1696279141.015:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.037941 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 20:39:01.038043 systemd[1]: Reached target local-fs.target. Oct 2 20:39:01.042536 systemd[1]: Reached target machines.target. Oct 2 20:39:01.048061 systemd[1]: Starting ldconfig.service... Oct 2 20:39:01.052054 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 20:39:01.052178 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:39:01.053293 systemd[1]: Starting systemd-boot-update.service... Oct 2 20:39:01.060671 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 20:39:01.067425 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 20:39:01.074074 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:39:01.074129 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:39:01.075211 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 20:39:01.082157 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1309 (bootctl) Oct 2 20:39:01.084532 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 20:39:01.096024 systemd-tmpfiles[1312]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 20:39:01.102473 systemd-tmpfiles[1312]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 20:39:01.358510 kernel: audit: type=1130 audit(1696279141.112:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.107728 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 20:39:01.314301 systemd-tmpfiles[1312]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 20:39:01.441894 systemd-fsck[1317]: fsck.fat 4.2 (2021-01-31) Oct 2 20:39:01.441894 systemd-fsck[1317]: /dev/sda1: 236 files, 113463/258078 clusters Oct 2 20:39:01.445333 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 20:39:01.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.453354 systemd[1]: Mounting boot.mount... Oct 2 20:39:01.475896 kernel: audit: type=1130 audit(1696279141.451:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.478156 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 20:39:01.479352 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 20:39:01.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.486669 systemd[1]: Mounted boot.mount. Oct 2 20:39:01.505846 kernel: audit: type=1130 audit(1696279141.483:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.513774 systemd[1]: Finished systemd-boot-update.service. Oct 2 20:39:01.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.539026 kernel: audit: type=1130 audit(1696279141.518:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.645140 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 20:39:01.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.651538 systemd[1]: Starting audit-rules.service... Oct 2 20:39:01.670886 kernel: audit: type=1130 audit(1696279141.649:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.675178 systemd[1]: Starting clean-ca-certificates.service... Oct 2 20:39:01.681895 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 20:39:01.694000 audit: BPF prog-id=30 op=LOAD Oct 2 20:39:01.697779 systemd[1]: Starting systemd-resolved.service... Oct 2 20:39:01.703000 audit: BPF prog-id=31 op=LOAD Oct 2 20:39:01.705398 systemd[1]: Starting systemd-timesyncd.service... Oct 2 20:39:01.711637 systemd[1]: Starting systemd-update-utmp.service... Oct 2 20:39:01.716276 systemd[1]: Finished clean-ca-certificates.service. Oct 2 20:39:01.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.721518 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 20:39:01.739000 audit[1334]: SYSTEM_BOOT pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.743044 systemd[1]: Finished systemd-update-utmp.service. Oct 2 20:39:01.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.751799 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 20:39:01.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.805177 systemd[1]: Started systemd-timesyncd.service. Oct 2 20:39:01.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.809825 systemd[1]: Reached target time-set.target. Oct 2 20:39:01.830877 systemd-resolved[1332]: Positive Trust Anchors: Oct 2 20:39:01.831194 systemd-resolved[1332]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:39:01.831277 systemd-resolved[1332]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:39:01.845000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:39:01.845000 audit[1344]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc99cb2d0 a2=420 a3=0 items=0 ppid=1323 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:01.845000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:39:01.849614 augenrules[1344]: No rules Oct 2 20:39:01.850348 systemd[1]: Finished audit-rules.service. Oct 2 20:39:01.854807 systemd-resolved[1332]: Using system hostname 'ci-3510.3.0-a-35b8781a58'. Oct 2 20:39:01.856473 systemd[1]: Started systemd-resolved.service. Oct 2 20:39:01.860939 systemd[1]: Reached target network.target. Oct 2 20:39:01.865159 systemd[1]: Reached target network-online.target. Oct 2 20:39:01.869797 systemd[1]: Reached target nss-lookup.target. Oct 2 20:39:02.061284 systemd-timesyncd[1333]: Contacted time server 104.194.8.227:123 (0.flatcar.pool.ntp.org). Oct 2 20:39:02.061349 systemd-timesyncd[1333]: Initial clock synchronization to Mon 2023-10-02 20:39:02.041289 UTC. Oct 2 20:39:03.522078 ldconfig[1308]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 20:39:03.547265 systemd[1]: Finished ldconfig.service. Oct 2 20:39:03.552925 systemd[1]: Starting systemd-update-done.service... Oct 2 20:39:03.569972 systemd[1]: Finished systemd-update-done.service. Oct 2 20:39:03.574880 systemd[1]: Reached target sysinit.target. Oct 2 20:39:03.579207 systemd[1]: Started motdgen.path. Oct 2 20:39:03.582881 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 20:39:03.588718 systemd[1]: Started logrotate.timer. Oct 2 20:39:03.592484 systemd[1]: Started mdadm.timer. Oct 2 20:39:03.595906 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 20:39:03.600521 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 20:39:03.600548 systemd[1]: Reached target paths.target. Oct 2 20:39:03.604456 systemd[1]: Reached target timers.target. Oct 2 20:39:03.608934 systemd[1]: Listening on dbus.socket. Oct 2 20:39:03.613911 systemd[1]: Starting docker.socket... Oct 2 20:39:03.620418 systemd[1]: Listening on sshd.socket. Oct 2 20:39:03.624406 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:39:03.624850 systemd[1]: Listening on docker.socket. Oct 2 20:39:03.628791 systemd[1]: Reached target sockets.target. Oct 2 20:39:03.633284 systemd[1]: Reached target basic.target. Oct 2 20:39:03.637577 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:39:03.637599 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:39:03.638905 systemd[1]: Starting containerd.service... Oct 2 20:39:03.643797 systemd[1]: Starting dbus.service... Oct 2 20:39:03.648201 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 20:39:03.653367 systemd[1]: Starting extend-filesystems.service... Oct 2 20:39:03.660039 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 20:39:03.662116 systemd[1]: Starting motdgen.service... Oct 2 20:39:03.667722 systemd[1]: Started nvidia.service. Oct 2 20:39:03.674059 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 20:39:03.681001 systemd[1]: Starting prepare-critools.service... Oct 2 20:39:03.686752 jq[1354]: false Oct 2 20:39:03.689783 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 20:39:03.697581 systemd[1]: Starting sshd-keygen.service... Oct 2 20:39:03.704484 systemd[1]: Starting systemd-logind.service... Oct 2 20:39:03.708424 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:39:03.708478 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 20:39:03.708944 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 20:39:03.712032 systemd[1]: Starting update-engine.service... Oct 2 20:39:03.717652 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 20:39:03.722462 jq[1372]: true Oct 2 20:39:03.726662 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 20:39:03.726829 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 20:39:03.729575 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 20:39:03.729731 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 20:39:03.742022 extend-filesystems[1355]: Found sda Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda1 Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda2 Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda3 Oct 2 20:39:03.747548 extend-filesystems[1355]: Found usr Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda4 Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda6 Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda7 Oct 2 20:39:03.747548 extend-filesystems[1355]: Found sda9 Oct 2 20:39:03.747548 extend-filesystems[1355]: Checking size of /dev/sda9 Oct 2 20:39:03.873383 jq[1380]: true Oct 2 20:39:03.857595 dbus-daemon[1353]: [system] SELinux support is enabled Oct 2 20:39:03.873772 extend-filesystems[1355]: Old size kept for /dev/sda9 Oct 2 20:39:03.873772 extend-filesystems[1355]: Found sr0 Oct 2 20:39:03.762000 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 20:39:03.919685 tar[1379]: crictl Oct 2 20:39:03.920569 tar[1378]: ./ Oct 2 20:39:03.920569 tar[1378]: ./macvlan Oct 2 20:39:03.876474 dbus-daemon[1353]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 20:39:03.762182 systemd[1]: Finished motdgen.service. Oct 2 20:39:03.920960 env[1381]: time="2023-10-02T20:39:03.917584659Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 20:39:03.842479 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 20:39:03.842673 systemd[1]: Finished extend-filesystems.service. Oct 2 20:39:03.843760 systemd-logind[1368]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 2 20:39:03.851967 systemd-logind[1368]: New seat seat0. Oct 2 20:39:03.868130 systemd[1]: Started dbus.service. Oct 2 20:39:03.875914 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 20:39:03.875935 systemd[1]: Reached target system-config.target. Oct 2 20:39:03.884221 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 20:39:03.884239 systemd[1]: Reached target user-config.target. Oct 2 20:39:03.903932 systemd[1]: Started systemd-logind.service. Oct 2 20:39:03.935772 bash[1413]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:39:03.936716 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 20:39:03.968246 tar[1378]: ./static Oct 2 20:39:03.983319 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 20:39:03.986800 update_engine[1369]: I1002 20:39:03.979070 1369 main.cc:92] Flatcar Update Engine starting Oct 2 20:39:04.004543 systemd[1]: Started update-engine.service. Oct 2 20:39:04.010812 update_engine[1369]: I1002 20:39:04.004580 1369 update_check_scheduler.cc:74] Next update check in 3m1s Oct 2 20:39:04.012033 systemd[1]: Started locksmithd.service. Oct 2 20:39:04.016082 env[1381]: time="2023-10-02T20:39:04.014822505Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 20:39:04.016082 env[1381]: time="2023-10-02T20:39:04.014996582Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:04.031429 env[1381]: time="2023-10-02T20:39:04.031376741Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:39:04.031429 env[1381]: time="2023-10-02T20:39:04.031421889Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:04.031679 env[1381]: time="2023-10-02T20:39:04.031643670Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:39:04.031679 env[1381]: time="2023-10-02T20:39:04.031664565Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:04.031679 env[1381]: time="2023-10-02T20:39:04.031677630Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 20:39:04.031762 env[1381]: time="2023-10-02T20:39:04.031687059Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:04.031762 env[1381]: time="2023-10-02T20:39:04.031754261Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:04.032092 env[1381]: time="2023-10-02T20:39:04.032066736Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:04.032210 env[1381]: time="2023-10-02T20:39:04.032184039Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:39:04.032210 env[1381]: time="2023-10-02T20:39:04.032203456Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 20:39:04.032281 env[1381]: time="2023-10-02T20:39:04.032260470Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 20:39:04.032281 env[1381]: time="2023-10-02T20:39:04.032277170Z" level=info msg="metadata content store policy set" policy=shared Oct 2 20:39:04.051337 env[1381]: time="2023-10-02T20:39:04.051291215Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 20:39:04.051448 env[1381]: time="2023-10-02T20:39:04.051363171Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 20:39:04.051448 env[1381]: time="2023-10-02T20:39:04.051379113Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 20:39:04.051557 env[1381]: time="2023-10-02T20:39:04.051540764Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.051595 env[1381]: time="2023-10-02T20:39:04.051561300Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.051595 env[1381]: time="2023-10-02T20:39:04.051575364Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.051595 env[1381]: time="2023-10-02T20:39:04.051588748Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.051988 env[1381]: time="2023-10-02T20:39:04.051968385Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.052033 env[1381]: time="2023-10-02T20:39:04.051990279Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.052033 env[1381]: time="2023-10-02T20:39:04.052003424Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.052033 env[1381]: time="2023-10-02T20:39:04.052024120Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.052100 env[1381]: time="2023-10-02T20:39:04.052037744Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 20:39:04.052213 env[1381]: time="2023-10-02T20:39:04.052188168Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 20:39:04.052302 env[1381]: time="2023-10-02T20:39:04.052280820Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 20:39:04.052647 env[1381]: time="2023-10-02T20:39:04.052622341Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 20:39:04.052683 env[1381]: time="2023-10-02T20:39:04.052652227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.052683 env[1381]: time="2023-10-02T20:39:04.052665291Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 20:39:04.052760 env[1381]: time="2023-10-02T20:39:04.052741043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.052929 env[1381]: time="2023-10-02T20:39:04.052911284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.052972 env[1381]: time="2023-10-02T20:39:04.052931101Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.052972 env[1381]: time="2023-10-02T20:39:04.052945684Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.052972 env[1381]: time="2023-10-02T20:39:04.052958669Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053028 env[1381]: time="2023-10-02T20:39:04.052971294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053028 env[1381]: time="2023-10-02T20:39:04.052991311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053028 env[1381]: time="2023-10-02T20:39:04.053003137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053028 env[1381]: time="2023-10-02T20:39:04.053016481Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 20:39:04.053180 env[1381]: time="2023-10-02T20:39:04.053156278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053180 env[1381]: time="2023-10-02T20:39:04.053178492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053242 env[1381]: time="2023-10-02T20:39:04.053190838Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053242 env[1381]: time="2023-10-02T20:39:04.053202984Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 20:39:04.053242 env[1381]: time="2023-10-02T20:39:04.053227994Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 20:39:04.053242 env[1381]: time="2023-10-02T20:39:04.053240500Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 20:39:04.053320 env[1381]: time="2023-10-02T20:39:04.053258359Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 20:39:04.053320 env[1381]: time="2023-10-02T20:39:04.053301429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 20:39:04.053587 env[1381]: time="2023-10-02T20:39:04.053529722Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 20:39:04.053587 env[1381]: time="2023-10-02T20:39:04.053586176Z" level=info msg="Connect containerd service" Oct 2 20:39:04.058531 env[1381]: time="2023-10-02T20:39:04.053623533Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 20:39:04.058531 env[1381]: time="2023-10-02T20:39:04.054277809Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:39:04.058593 tar[1378]: ./vlan Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059453607Z" level=info msg="Start subscribing containerd event" Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059512139Z" level=info msg="Start recovering state" Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059601794Z" level=info msg="Start event monitor" Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059595801Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059654653Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059670075Z" level=info msg="Start snapshots syncer" Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059712106Z" level=info msg="containerd successfully booted in 0.143706s" Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.059682540Z" level=info msg="Start cni network conf syncer for default" Oct 2 20:39:04.066637 env[1381]: time="2023-10-02T20:39:04.066321111Z" level=info msg="Start streaming server" Oct 2 20:39:04.059798 systemd[1]: Started containerd.service. Oct 2 20:39:04.155276 tar[1378]: ./portmap Oct 2 20:39:04.222405 tar[1378]: ./host-local Oct 2 20:39:04.247220 systemd[1]: Finished prepare-critools.service. Oct 2 20:39:04.260999 tar[1378]: ./vrf Oct 2 20:39:04.289073 tar[1378]: ./bridge Oct 2 20:39:04.321904 tar[1378]: ./tuning Oct 2 20:39:04.348918 tar[1378]: ./firewall Oct 2 20:39:04.383265 tar[1378]: ./host-device Oct 2 20:39:04.413453 tar[1378]: ./sbr Oct 2 20:39:04.440550 tar[1378]: ./loopback Oct 2 20:39:04.467086 tar[1378]: ./dhcp Oct 2 20:39:04.541307 tar[1378]: ./ptp Oct 2 20:39:04.573395 tar[1378]: ./ipvlan Oct 2 20:39:04.604782 tar[1378]: ./bandwidth Oct 2 20:39:04.671752 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 20:39:05.086693 locksmithd[1432]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 20:39:06.646467 sshd_keygen[1386]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 20:39:06.673345 systemd[1]: Finished sshd-keygen.service. Oct 2 20:39:06.680037 systemd[1]: Starting issuegen.service... Oct 2 20:39:06.685064 systemd[1]: Started waagent.service. Oct 2 20:39:06.692098 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 20:39:06.692260 systemd[1]: Finished issuegen.service. Oct 2 20:39:06.697767 systemd[1]: Starting systemd-user-sessions.service... Oct 2 20:39:06.719270 systemd[1]: Finished systemd-user-sessions.service. Oct 2 20:39:06.726267 systemd[1]: Started getty@tty1.service. Oct 2 20:39:06.735758 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 2 20:39:06.740987 systemd[1]: Reached target getty.target. Oct 2 20:39:06.750583 systemd[1]: Reached target multi-user.target. Oct 2 20:39:06.757815 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 20:39:06.774188 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 20:39:06.774353 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 20:39:06.782519 systemd[1]: Startup finished in 740ms (kernel) + 12.466s (initrd) + 23.702s (userspace) = 36.909s. Oct 2 20:39:06.965114 login[1466]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:39:06.965310 login[1467]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:39:06.987782 systemd[1]: Created slice user-500.slice. Oct 2 20:39:06.990310 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 20:39:06.992441 systemd-logind[1368]: New session 2 of user core. Oct 2 20:39:06.995311 systemd-logind[1368]: New session 1 of user core. Oct 2 20:39:07.008389 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 20:39:07.009923 systemd[1]: Starting user@500.service... Oct 2 20:39:07.023915 (systemd)[1470]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:07.172532 systemd[1470]: Queued start job for default target default.target. Oct 2 20:39:07.173340 systemd[1470]: Reached target paths.target. Oct 2 20:39:07.173459 systemd[1470]: Reached target sockets.target. Oct 2 20:39:07.173534 systemd[1470]: Reached target timers.target. Oct 2 20:39:07.173681 systemd[1470]: Reached target basic.target. Oct 2 20:39:07.173792 systemd[1470]: Reached target default.target. Oct 2 20:39:07.173883 systemd[1]: Started user@500.service. Oct 2 20:39:07.173966 systemd[1470]: Startup finished in 141ms. Oct 2 20:39:07.174807 systemd[1]: Started session-1.scope. Oct 2 20:39:07.175392 systemd[1]: Started session-2.scope. Oct 2 20:39:09.426079 waagent[1461]: 2023-10-02T20:39:09.425965Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 20:39:09.435574 waagent[1461]: 2023-10-02T20:39:09.435495Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 20:39:09.440258 waagent[1461]: 2023-10-02T20:39:09.440197Z INFO Daemon Daemon Python: 3.9.16 Oct 2 20:39:09.449880 waagent[1461]: 2023-10-02T20:39:09.445195Z INFO Daemon Daemon Run daemon Oct 2 20:39:09.449880 waagent[1461]: 2023-10-02T20:39:09.449813Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 20:39:09.469728 waagent[1461]: 2023-10-02T20:39:09.469585Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:39:09.484671 waagent[1461]: 2023-10-02T20:39:09.484532Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:39:09.494286 waagent[1461]: 2023-10-02T20:39:09.494212Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:39:09.499559 waagent[1461]: 2023-10-02T20:39:09.499488Z INFO Daemon Daemon Using waagent for provisioning Oct 2 20:39:09.507054 waagent[1461]: 2023-10-02T20:39:09.506986Z INFO Daemon Daemon Activate resource disk Oct 2 20:39:09.511845 waagent[1461]: 2023-10-02T20:39:09.511780Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 20:39:09.525971 waagent[1461]: 2023-10-02T20:39:09.525902Z INFO Daemon Daemon Found device: None Oct 2 20:39:09.530479 waagent[1461]: 2023-10-02T20:39:09.530421Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 20:39:09.538690 waagent[1461]: 2023-10-02T20:39:09.538635Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 20:39:09.550551 waagent[1461]: 2023-10-02T20:39:09.550487Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:39:09.556437 waagent[1461]: 2023-10-02T20:39:09.556378Z INFO Daemon Daemon Running default provisioning handler Oct 2 20:39:09.572693 waagent[1461]: 2023-10-02T20:39:09.572540Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:39:09.587887 waagent[1461]: 2023-10-02T20:39:09.587732Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:39:09.598123 waagent[1461]: 2023-10-02T20:39:09.598037Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:39:09.603101 waagent[1461]: 2023-10-02T20:39:09.603027Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 20:39:09.662516 waagent[1461]: 2023-10-02T20:39:09.662369Z INFO Daemon Daemon Successfully mounted dvd Oct 2 20:39:09.715710 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 20:39:09.730722 waagent[1461]: 2023-10-02T20:39:09.730578Z INFO Daemon Daemon Detect protocol endpoint Oct 2 20:39:09.735750 waagent[1461]: 2023-10-02T20:39:09.735676Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:39:09.741487 waagent[1461]: 2023-10-02T20:39:09.741421Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 20:39:09.747987 waagent[1461]: 2023-10-02T20:39:09.747926Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 20:39:09.753405 waagent[1461]: 2023-10-02T20:39:09.753345Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 20:39:09.758951 waagent[1461]: 2023-10-02T20:39:09.758886Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 20:39:09.827195 waagent[1461]: 2023-10-02T20:39:09.827125Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 20:39:09.834257 waagent[1461]: 2023-10-02T20:39:09.834214Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 20:39:09.839510 waagent[1461]: 2023-10-02T20:39:09.839453Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 20:39:10.428067 waagent[1461]: 2023-10-02T20:39:10.427916Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 20:39:10.442937 waagent[1461]: 2023-10-02T20:39:10.442849Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 20:39:10.449443 waagent[1461]: 2023-10-02T20:39:10.449382Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 20:39:10.531889 waagent[1461]: 2023-10-02T20:39:10.531735Z INFO Daemon Daemon Found private key matching thumbprint 1D00DB21CD0DB8A91813EB84F5DCB88E8F3303C8 Oct 2 20:39:10.540271 waagent[1461]: 2023-10-02T20:39:10.540191Z INFO Daemon Daemon Certificate with thumbprint 311D639E44AAF270E114D4B8EE01A5D679B44465 has no matching private key. Oct 2 20:39:10.550790 waagent[1461]: 2023-10-02T20:39:10.550718Z INFO Daemon Daemon Fetch goal state completed Oct 2 20:39:10.576973 waagent[1461]: 2023-10-02T20:39:10.576918Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 0707bdfe-6cd3-455b-86ec-797b888005be New eTag: 17053267290492888856] Oct 2 20:39:10.587536 waagent[1461]: 2023-10-02T20:39:10.587476Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:39:10.603273 waagent[1461]: 2023-10-02T20:39:10.603199Z INFO Daemon Daemon Starting provisioning Oct 2 20:39:10.608610 waagent[1461]: 2023-10-02T20:39:10.608548Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 20:39:10.613237 waagent[1461]: 2023-10-02T20:39:10.613183Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-35b8781a58] Oct 2 20:39:10.644793 waagent[1461]: 2023-10-02T20:39:10.644651Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-35b8781a58] Oct 2 20:39:10.651211 waagent[1461]: 2023-10-02T20:39:10.651132Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 20:39:10.658131 waagent[1461]: 2023-10-02T20:39:10.658062Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 20:39:10.677874 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 20:39:10.678040 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 20:39:10.678099 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 20:39:10.678331 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:39:10.682908 systemd-networkd[1246]: eth0: DHCPv6 lease lost Oct 2 20:39:10.684556 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:39:10.684710 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:39:10.686650 systemd[1]: Starting systemd-networkd.service... Oct 2 20:39:10.718590 systemd-networkd[1513]: enP53916s1: Link UP Oct 2 20:39:10.718813 systemd-networkd[1513]: enP53916s1: Gained carrier Oct 2 20:39:10.719722 systemd-networkd[1513]: eth0: Link UP Oct 2 20:39:10.719805 systemd-networkd[1513]: eth0: Gained carrier Oct 2 20:39:10.720362 systemd-networkd[1513]: lo: Link UP Oct 2 20:39:10.720437 systemd-networkd[1513]: lo: Gained carrier Oct 2 20:39:10.720717 systemd-networkd[1513]: eth0: Gained IPv6LL Oct 2 20:39:10.721241 systemd-networkd[1513]: Enumeration completed Oct 2 20:39:10.721419 systemd[1]: Started systemd-networkd.service. Oct 2 20:39:10.722456 systemd-networkd[1513]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:39:10.723164 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:39:10.733027 waagent[1461]: 2023-10-02T20:39:10.732886Z INFO Daemon Daemon Create user account if not exists Oct 2 20:39:10.738751 waagent[1461]: 2023-10-02T20:39:10.738685Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 20:39:10.744343 waagent[1461]: 2023-10-02T20:39:10.744281Z INFO Daemon Daemon Configure sudoer Oct 2 20:39:10.744936 systemd-networkd[1513]: eth0: DHCPv4 address 10.200.20.45/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:39:10.749796 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:39:10.750947 waagent[1461]: 2023-10-02T20:39:10.750820Z INFO Daemon Daemon Configure sshd Oct 2 20:39:10.755382 waagent[1461]: 2023-10-02T20:39:10.755318Z INFO Daemon Daemon Deploy ssh public key. Oct 2 20:39:11.967953 waagent[1461]: 2023-10-02T20:39:11.967853Z INFO Daemon Daemon Provisioning complete Oct 2 20:39:11.988571 waagent[1461]: 2023-10-02T20:39:11.988507Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 20:39:11.995286 waagent[1461]: 2023-10-02T20:39:11.995218Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 20:39:12.005489 waagent[1461]: 2023-10-02T20:39:12.005424Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 20:39:12.309683 waagent[1522]: 2023-10-02T20:39:12.309531Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 20:39:12.310848 waagent[1522]: 2023-10-02T20:39:12.310789Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:12.311111 waagent[1522]: 2023-10-02T20:39:12.311061Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:12.325310 waagent[1522]: 2023-10-02T20:39:12.325223Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 20:39:12.325654 waagent[1522]: 2023-10-02T20:39:12.325602Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 20:39:12.413989 waagent[1522]: 2023-10-02T20:39:12.413832Z INFO ExtHandler ExtHandler Found private key matching thumbprint 1D00DB21CD0DB8A91813EB84F5DCB88E8F3303C8 Oct 2 20:39:12.414363 waagent[1522]: 2023-10-02T20:39:12.414309Z INFO ExtHandler ExtHandler Certificate with thumbprint 311D639E44AAF270E114D4B8EE01A5D679B44465 has no matching private key. Oct 2 20:39:12.414688 waagent[1522]: 2023-10-02T20:39:12.414637Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 20:39:12.429004 waagent[1522]: 2023-10-02T20:39:12.428950Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 72f91862-0f0a-4aec-ba93-75a0e792a919 New eTag: 17053267290492888856] Oct 2 20:39:12.429760 waagent[1522]: 2023-10-02T20:39:12.429698Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:39:12.491384 waagent[1522]: 2023-10-02T20:39:12.491250Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:39:12.501663 waagent[1522]: 2023-10-02T20:39:12.501586Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1522 Oct 2 20:39:12.505588 waagent[1522]: 2023-10-02T20:39:12.505524Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:39:12.507091 waagent[1522]: 2023-10-02T20:39:12.507030Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:39:12.545398 waagent[1522]: 2023-10-02T20:39:12.545338Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:39:12.546005 waagent[1522]: 2023-10-02T20:39:12.545945Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:39:12.557332 waagent[1522]: 2023-10-02T20:39:12.557274Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:39:12.558074 waagent[1522]: 2023-10-02T20:39:12.558014Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:39:12.559414 waagent[1522]: 2023-10-02T20:39:12.559348Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 20:39:12.561002 waagent[1522]: 2023-10-02T20:39:12.560894Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:39:12.561230 waagent[1522]: 2023-10-02T20:39:12.561159Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:12.561780 waagent[1522]: 2023-10-02T20:39:12.561722Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:12.562356 waagent[1522]: 2023-10-02T20:39:12.562300Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:39:12.562647 waagent[1522]: 2023-10-02T20:39:12.562593Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:39:12.562647 waagent[1522]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:39:12.562647 waagent[1522]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:39:12.562647 waagent[1522]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:39:12.562647 waagent[1522]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:12.562647 waagent[1522]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:12.562647 waagent[1522]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:12.564946 waagent[1522]: 2023-10-02T20:39:12.564772Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:39:12.565656 waagent[1522]: 2023-10-02T20:39:12.565580Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:39:12.565937 waagent[1522]: 2023-10-02T20:39:12.565833Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:39:12.566695 waagent[1522]: 2023-10-02T20:39:12.566620Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:39:12.566927 waagent[1522]: 2023-10-02T20:39:12.566821Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:39:12.567153 waagent[1522]: 2023-10-02T20:39:12.567094Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:39:12.570586 waagent[1522]: 2023-10-02T20:39:12.570509Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:12.572426 waagent[1522]: 2023-10-02T20:39:12.572303Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:12.578385 waagent[1522]: 2023-10-02T20:39:12.578300Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:39:12.579973 waagent[1522]: 2023-10-02T20:39:12.579896Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:39:12.580592 waagent[1522]: 2023-10-02T20:39:12.580531Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:39:12.581754 waagent[1522]: 2023-10-02T20:39:12.581687Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 20:39:12.582625 waagent[1522]: 2023-10-02T20:39:12.582563Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:39:12.584040 waagent[1522]: 2023-10-02T20:39:12.583973Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 20:39:12.632326 waagent[1522]: 2023-10-02T20:39:12.632259Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 20:39:12.821117 waagent[1522]: 2023-10-02T20:39:12.820972Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1513' Oct 2 20:39:12.874338 waagent[1522]: 2023-10-02T20:39:12.874265Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Oct 2 20:39:13.009056 waagent[1461]: 2023-10-02T20:39:13.008935Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 20:39:13.012620 waagent[1461]: 2023-10-02T20:39:13.012567Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Oct 2 20:39:14.325336 waagent[1549]: 2023-10-02T20:39:14.325231Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Oct 2 20:39:14.329012 waagent[1549]: 2023-10-02T20:39:14.328946Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 20:39:14.329152 waagent[1549]: 2023-10-02T20:39:14.329104Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 20:39:14.339824 waagent[1549]: 2023-10-02T20:39:14.339706Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:39:14.340241 waagent[1549]: 2023-10-02T20:39:14.340187Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:14.340380 waagent[1549]: 2023-10-02T20:39:14.340334Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:14.353091 waagent[1549]: 2023-10-02T20:39:14.353016Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 20:39:14.362600 waagent[1549]: 2023-10-02T20:39:14.362545Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 20:39:14.363629 waagent[1549]: 2023-10-02T20:39:14.363570Z INFO ExtHandler Oct 2 20:39:14.363778 waagent[1549]: 2023-10-02T20:39:14.363730Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: ded4a6c5-edd5-4f0d-9c62-7374cd94b913 eTag: 17053267290492888856 source: Fabric] Oct 2 20:39:14.364524 waagent[1549]: 2023-10-02T20:39:14.364465Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 20:39:14.365716 waagent[1549]: 2023-10-02T20:39:14.365656Z INFO ExtHandler Oct 2 20:39:14.365846 waagent[1549]: 2023-10-02T20:39:14.365800Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 20:39:14.372188 waagent[1549]: 2023-10-02T20:39:14.372141Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 20:39:14.372628 waagent[1549]: 2023-10-02T20:39:14.372578Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:39:14.391656 waagent[1549]: 2023-10-02T20:39:14.391596Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 20:39:14.473880 waagent[1549]: 2023-10-02T20:39:14.473727Z INFO ExtHandler Downloaded certificate {'thumbprint': '311D639E44AAF270E114D4B8EE01A5D679B44465', 'hasPrivateKey': False} Oct 2 20:39:14.474920 waagent[1549]: 2023-10-02T20:39:14.474834Z INFO ExtHandler Downloaded certificate {'thumbprint': '1D00DB21CD0DB8A91813EB84F5DCB88E8F3303C8', 'hasPrivateKey': True} Oct 2 20:39:14.475943 waagent[1549]: 2023-10-02T20:39:14.475884Z INFO ExtHandler Fetch goal state completed Oct 2 20:39:14.500028 waagent[1549]: 2023-10-02T20:39:14.499961Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1549 Oct 2 20:39:14.503434 waagent[1549]: 2023-10-02T20:39:14.503373Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:39:14.504900 waagent[1549]: 2023-10-02T20:39:14.504826Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:39:14.511035 waagent[1549]: 2023-10-02T20:39:14.510974Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:39:14.511421 waagent[1549]: 2023-10-02T20:39:14.511364Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:39:14.521530 waagent[1549]: 2023-10-02T20:39:14.521469Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:39:14.522009 waagent[1549]: 2023-10-02T20:39:14.521952Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:39:14.529261 waagent[1549]: 2023-10-02T20:39:14.529158Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Oct 2 20:39:14.532812 waagent[1549]: 2023-10-02T20:39:14.532756Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 20:39:14.534273 waagent[1549]: 2023-10-02T20:39:14.534200Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:39:14.534900 waagent[1549]: 2023-10-02T20:39:14.534821Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:14.535169 waagent[1549]: 2023-10-02T20:39:14.535118Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:14.535803 waagent[1549]: 2023-10-02T20:39:14.535746Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:39:14.536188 waagent[1549]: 2023-10-02T20:39:14.536134Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:39:14.536188 waagent[1549]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:39:14.536188 waagent[1549]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:39:14.536188 waagent[1549]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:39:14.536188 waagent[1549]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:14.536188 waagent[1549]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:14.536188 waagent[1549]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:14.538614 waagent[1549]: 2023-10-02T20:39:14.538487Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:39:14.539396 waagent[1549]: 2023-10-02T20:39:14.539337Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:14.539651 waagent[1549]: 2023-10-02T20:39:14.539599Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:14.540251 waagent[1549]: 2023-10-02T20:39:14.540120Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:39:14.542354 waagent[1549]: 2023-10-02T20:39:14.542218Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:39:14.542511 waagent[1549]: 2023-10-02T20:39:14.542460Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:39:14.543633 waagent[1549]: 2023-10-02T20:39:14.543574Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:39:14.543970 waagent[1549]: 2023-10-02T20:39:14.543897Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:39:14.544710 waagent[1549]: 2023-10-02T20:39:14.544651Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:39:14.544805 waagent[1549]: 2023-10-02T20:39:14.544567Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:39:14.548570 waagent[1549]: 2023-10-02T20:39:14.548454Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:39:14.563920 waagent[1549]: 2023-10-02T20:39:14.560302Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Oct 2 20:39:14.565461 waagent[1549]: 2023-10-02T20:39:14.565390Z INFO ExtHandler ExtHandler Downloading manifest Oct 2 20:39:14.565802 waagent[1549]: 2023-10-02T20:39:14.565732Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:39:14.565802 waagent[1549]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:39:14.565802 waagent[1549]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:39:14.565802 waagent[1549]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:da:f4 brd ff:ff:ff:ff:ff:ff Oct 2 20:39:14.565802 waagent[1549]: 3: enP53916s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:da:f4 brd ff:ff:ff:ff:ff:ff\ altname enP53916p0s2 Oct 2 20:39:14.565802 waagent[1549]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:39:14.565802 waagent[1549]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:39:14.565802 waagent[1549]: 2: eth0 inet 10.200.20.45/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:39:14.565802 waagent[1549]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:39:14.565802 waagent[1549]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:39:14.565802 waagent[1549]: 2: eth0 inet6 fe80::222:48ff:fec1:daf4/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:39:14.590046 waagent[1549]: 2023-10-02T20:39:14.589927Z INFO ExtHandler ExtHandler Oct 2 20:39:14.590201 waagent[1549]: 2023-10-02T20:39:14.590130Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e265ce00-1912-48fc-bf95-d82e248029d9 correlation 896b2499-5e85-422f-8727-3a2207d88fbd created: 2023-10-02T20:38:06.987228Z] Oct 2 20:39:14.591170 waagent[1549]: 2023-10-02T20:39:14.591106Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 20:39:14.593016 waagent[1549]: 2023-10-02T20:39:14.592957Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Oct 2 20:39:14.620582 waagent[1549]: 2023-10-02T20:39:14.620515Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 20:39:15.264287 waagent[1549]: 2023-10-02T20:39:15.264192Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 05D9C234-A1AC-4EF0-B567-F1702D9933C9;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 20:39:15.358427 waagent[1549]: 2023-10-02T20:39:15.358295Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Oct 2 20:39:15.358427 waagent[1549]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:15.358427 waagent[1549]: pkts bytes target prot opt in out source destination Oct 2 20:39:15.358427 waagent[1549]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:15.358427 waagent[1549]: pkts bytes target prot opt in out source destination Oct 2 20:39:15.358427 waagent[1549]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:15.358427 waagent[1549]: pkts bytes target prot opt in out source destination Oct 2 20:39:15.358427 waagent[1549]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:39:15.358427 waagent[1549]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:39:15.358427 waagent[1549]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:39:15.367491 waagent[1549]: 2023-10-02T20:39:15.367314Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 20:39:15.367491 waagent[1549]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:15.367491 waagent[1549]: pkts bytes target prot opt in out source destination Oct 2 20:39:15.367491 waagent[1549]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:15.367491 waagent[1549]: pkts bytes target prot opt in out source destination Oct 2 20:39:15.367491 waagent[1549]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:15.367491 waagent[1549]: pkts bytes target prot opt in out source destination Oct 2 20:39:15.367491 waagent[1549]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:39:15.367491 waagent[1549]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:39:15.367491 waagent[1549]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:39:15.368076 waagent[1549]: 2023-10-02T20:39:15.368023Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 20:39:43.572283 systemd[1]: Created slice system-sshd.slice. Oct 2 20:39:43.573385 systemd[1]: Started sshd@0-10.200.20.45:22-10.200.12.6:53850.service. Oct 2 20:39:44.074667 sshd[1599]: Accepted publickey for core from 10.200.12.6 port 53850 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:44.082049 sshd[1599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:44.086475 systemd[1]: Started session-3.scope. Oct 2 20:39:44.086909 systemd-logind[1368]: New session 3 of user core. Oct 2 20:39:44.450265 systemd[1]: Started sshd@1-10.200.20.45:22-10.200.12.6:53858.service. Oct 2 20:39:44.906145 sshd[1604]: Accepted publickey for core from 10.200.12.6 port 53858 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:44.907594 sshd[1604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:44.911376 systemd-logind[1368]: New session 4 of user core. Oct 2 20:39:44.911775 systemd[1]: Started session-4.scope. Oct 2 20:39:45.309354 systemd[1]: Started sshd@2-10.200.20.45:22-10.200.12.6:53874.service. Oct 2 20:39:45.591517 sshd[1604]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:45.594204 systemd[1]: sshd@1-10.200.20.45:22-10.200.12.6:53858.service: Deactivated successfully. Oct 2 20:39:45.594919 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 20:39:45.595412 systemd-logind[1368]: Session 4 logged out. Waiting for processes to exit. Oct 2 20:39:45.596293 systemd-logind[1368]: Removed session 4. Oct 2 20:39:45.722983 sshd[1609]: Accepted publickey for core from 10.200.12.6 port 53874 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:45.724446 sshd[1609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:45.728227 systemd-logind[1368]: New session 5 of user core. Oct 2 20:39:45.728592 systemd[1]: Started session-5.scope. Oct 2 20:39:46.022208 sshd[1609]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:46.024677 systemd[1]: sshd@2-10.200.20.45:22-10.200.12.6:53874.service: Deactivated successfully. Oct 2 20:39:46.025314 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 20:39:46.025826 systemd-logind[1368]: Session 5 logged out. Waiting for processes to exit. Oct 2 20:39:46.026632 systemd-logind[1368]: Removed session 5. Oct 2 20:39:46.091714 systemd[1]: Started sshd@3-10.200.20.45:22-10.200.12.6:53880.service. Oct 2 20:39:46.504355 sshd[1616]: Accepted publickey for core from 10.200.12.6 port 53880 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:46.505839 sshd[1616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:46.509614 systemd-logind[1368]: New session 6 of user core. Oct 2 20:39:46.510024 systemd[1]: Started session-6.scope. Oct 2 20:39:46.743896 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Oct 2 20:39:46.814110 sshd[1616]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:46.816629 systemd-logind[1368]: Session 6 logged out. Waiting for processes to exit. Oct 2 20:39:46.816709 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 20:39:46.817718 systemd[1]: sshd@3-10.200.20.45:22-10.200.12.6:53880.service: Deactivated successfully. Oct 2 20:39:46.818420 systemd-logind[1368]: Removed session 6. Oct 2 20:39:46.884172 systemd[1]: Started sshd@4-10.200.20.45:22-10.200.12.6:53886.service. Oct 2 20:39:47.303422 sshd[1622]: Accepted publickey for core from 10.200.12.6 port 53886 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:47.304925 sshd[1622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:47.308723 systemd-logind[1368]: New session 7 of user core. Oct 2 20:39:47.309138 systemd[1]: Started session-7.scope. Oct 2 20:39:47.641567 sudo[1625]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 20:39:47.642152 sudo[1625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:47.666081 dbus-daemon[1353]: avc: received setenforce notice (enforcing=1) Oct 2 20:39:47.667884 sudo[1625]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:47.739012 sshd[1622]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:47.742142 systemd-logind[1368]: Session 7 logged out. Waiting for processes to exit. Oct 2 20:39:47.742259 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 20:39:47.742796 systemd[1]: sshd@4-10.200.20.45:22-10.200.12.6:53886.service: Deactivated successfully. Oct 2 20:39:47.743750 systemd-logind[1368]: Removed session 7. Oct 2 20:39:47.807968 systemd[1]: Started sshd@5-10.200.20.45:22-10.200.12.6:49716.service. Oct 2 20:39:48.221816 sshd[1629]: Accepted publickey for core from 10.200.12.6 port 49716 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:48.223645 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:48.227383 systemd-logind[1368]: New session 8 of user core. Oct 2 20:39:48.227795 systemd[1]: Started session-8.scope. Oct 2 20:39:48.461598 sudo[1633]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 20:39:48.461789 sudo[1633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:48.464924 sudo[1633]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:48.470649 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 20:39:48.471069 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:48.482108 systemd[1]: Stopping audit-rules.service... Oct 2 20:39:48.482000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:39:48.488019 kernel: kauditd_printk_skb: 10 callbacks suppressed Oct 2 20:39:48.488067 kernel: audit: type=1305 audit(1696279188.482:176): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:39:48.488269 auditctl[1636]: No rules Oct 2 20:39:48.499310 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 20:39:48.499477 systemd[1]: Stopped audit-rules.service. Oct 2 20:39:48.482000 audit[1636]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffce997930 a2=420 a3=0 items=0 ppid=1 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:48.523888 kernel: audit: type=1300 audit(1696279188.482:176): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffce997930 a2=420 a3=0 items=0 ppid=1 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:48.501122 systemd[1]: Starting audit-rules.service... Oct 2 20:39:48.482000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:39:48.532048 kernel: audit: type=1327 audit(1696279188.482:176): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:39:48.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.552219 kernel: audit: type=1131 audit(1696279188.497:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.567522 augenrules[1653]: No rules Oct 2 20:39:48.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.568520 systemd[1]: Finished audit-rules.service. Oct 2 20:39:48.571070 sudo[1632]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:48.569000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.606173 kernel: audit: type=1130 audit(1696279188.566:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.606233 kernel: audit: type=1106 audit(1696279188.569:179): pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.569000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.623370 kernel: audit: type=1104 audit(1696279188.569:180): pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.637282 sshd[1629]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:48.636000 audit[1629]: USER_END pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:48.640264 systemd-logind[1368]: Session 8 logged out. Waiting for processes to exit. Oct 2 20:39:48.641329 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 20:39:48.642309 systemd[1]: sshd@5-10.200.20.45:22-10.200.12.6:49716.service: Deactivated successfully. Oct 2 20:39:48.643558 systemd-logind[1368]: Removed session 8. Oct 2 20:39:48.636000 audit[1629]: CRED_DISP pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:48.681431 kernel: audit: type=1106 audit(1696279188.636:181): pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:48.681486 kernel: audit: type=1104 audit(1696279188.636:182): pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:48.681515 kernel: audit: type=1131 audit(1696279188.640:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.45:22-10.200.12.6:49716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.45:22-10.200.12.6:49716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.705856 systemd[1]: Started sshd@6-10.200.20.45:22-10.200.12.6:49732.service. Oct 2 20:39:48.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.45:22-10.200.12.6:49732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.873432 update_engine[1369]: I1002 20:39:48.873299 1369 update_attempter.cc:505] Updating boot flags... Oct 2 20:39:49.126000 audit[1659]: USER_ACCT pid=1659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:49.128472 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 49732 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:49.128000 audit[1659]: CRED_ACQ pid=1659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:49.128000 audit[1659]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9091c20 a2=3 a3=1 items=0 ppid=1 pid=1659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:49.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:39:49.130400 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:49.134565 systemd[1]: Started session-9.scope. Oct 2 20:39:49.134921 systemd-logind[1368]: New session 9 of user core. Oct 2 20:39:49.137000 audit[1659]: USER_START pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:49.139000 audit[1727]: CRED_ACQ pid=1727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:49.370000 audit[1728]: USER_ACCT pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:49.372411 sudo[1728]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 20:39:49.370000 audit[1728]: CRED_REFR pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:49.372912 sudo[1728]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:49.372000 audit[1728]: USER_START pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:49.954749 systemd[1]: Reloading. Oct 2 20:39:50.037733 /usr/lib/systemd/system-generators/torcx-generator[1757]: time="2023-10-02T20:39:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:39:50.037762 /usr/lib/systemd/system-generators/torcx-generator[1757]: time="2023-10-02T20:39:50Z" level=info msg="torcx already run" Oct 2 20:39:50.152446 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:39:50.152465 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:39:50.169145 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.230000 audit: BPF prog-id=38 op=LOAD Oct 2 20:39:50.231000 audit: BPF prog-id=31 op=UNLOAD Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit: BPF prog-id=39 op=LOAD Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit: BPF prog-id=40 op=LOAD Oct 2 20:39:50.231000 audit: BPF prog-id=24 op=UNLOAD Oct 2 20:39:50.231000 audit: BPF prog-id=25 op=UNLOAD Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.231000 audit: BPF prog-id=41 op=LOAD Oct 2 20:39:50.231000 audit: BPF prog-id=35 op=UNLOAD Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit: BPF prog-id=42 op=LOAD Oct 2 20:39:50.234000 audit: BPF prog-id=21 op=UNLOAD Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit: BPF prog-id=43 op=LOAD Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit: BPF prog-id=44 op=LOAD Oct 2 20:39:50.234000 audit: BPF prog-id=22 op=UNLOAD Oct 2 20:39:50.234000 audit: BPF prog-id=23 op=UNLOAD Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit: BPF prog-id=45 op=LOAD Oct 2 20:39:50.234000 audit: BPF prog-id=27 op=UNLOAD Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit: BPF prog-id=46 op=LOAD Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.234000 audit: BPF prog-id=47 op=LOAD Oct 2 20:39:50.234000 audit: BPF prog-id=28 op=UNLOAD Oct 2 20:39:50.234000 audit: BPF prog-id=29 op=UNLOAD Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit: BPF prog-id=48 op=LOAD Oct 2 20:39:50.235000 audit: BPF prog-id=37 op=UNLOAD Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.235000 audit: BPF prog-id=49 op=LOAD Oct 2 20:39:50.235000 audit: BPF prog-id=30 op=UNLOAD Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit: BPF prog-id=50 op=LOAD Oct 2 20:39:50.237000 audit: BPF prog-id=32 op=UNLOAD Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit: BPF prog-id=51 op=LOAD Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.237000 audit: BPF prog-id=52 op=LOAD Oct 2 20:39:50.237000 audit: BPF prog-id=33 op=UNLOAD Oct 2 20:39:50.237000 audit: BPF prog-id=34 op=UNLOAD Oct 2 20:39:50.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:50.246613 systemd[1]: Started kubelet.service. Oct 2 20:39:50.262982 systemd[1]: Starting coreos-metadata.service... Oct 2 20:39:50.304927 coreos-metadata[1824]: Oct 02 20:39:50.304 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:39:50.308115 coreos-metadata[1824]: Oct 02 20:39:50.308 INFO Fetch successful Oct 2 20:39:50.308293 coreos-metadata[1824]: Oct 02 20:39:50.308 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Oct 2 20:39:50.310124 coreos-metadata[1824]: Oct 02 20:39:50.310 INFO Fetch successful Oct 2 20:39:50.310502 coreos-metadata[1824]: Oct 02 20:39:50.310 INFO Fetching http://168.63.129.16/machine/47a55061-3560-45c2-8a14-db84a6cf6356/6639ac46%2D3fd0%2D43ba%2Da851%2Dbdc824887215.%5Fci%2D3510.3.0%2Da%2D35b8781a58?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Oct 2 20:39:50.312493 coreos-metadata[1824]: Oct 02 20:39:50.312 INFO Fetch successful Oct 2 20:39:50.333775 kubelet[1816]: E1002 20:39:50.333716 1816 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:39:50.335576 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:39:50.335699 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:39:50.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:39:50.350077 coreos-metadata[1824]: Oct 02 20:39:50.349 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:39:50.363460 coreos-metadata[1824]: Oct 02 20:39:50.363 INFO Fetch successful Oct 2 20:39:50.375226 systemd[1]: Finished coreos-metadata.service. Oct 2 20:39:50.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:51.365386 systemd[1]: Stopped kubelet.service. Oct 2 20:39:51.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:51.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:51.391320 systemd[1]: Reloading. Oct 2 20:39:51.462288 /usr/lib/systemd/system-generators/torcx-generator[1880]: time="2023-10-02T20:39:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:39:51.462316 /usr/lib/systemd/system-generators/torcx-generator[1880]: time="2023-10-02T20:39:51Z" level=info msg="torcx already run" Oct 2 20:39:51.590344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:39:51.590503 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:39:51.607183 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit: BPF prog-id=53 op=LOAD Oct 2 20:39:51.669000 audit: BPF prog-id=38 op=UNLOAD Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit: BPF prog-id=54 op=LOAD Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit: BPF prog-id=55 op=LOAD Oct 2 20:39:51.670000 audit: BPF prog-id=39 op=UNLOAD Oct 2 20:39:51.670000 audit: BPF prog-id=40 op=UNLOAD Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.670000 audit: BPF prog-id=56 op=LOAD Oct 2 20:39:51.671000 audit: BPF prog-id=41 op=UNLOAD Oct 2 20:39:51.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit: BPF prog-id=57 op=LOAD Oct 2 20:39:51.673000 audit: BPF prog-id=42 op=UNLOAD Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit: BPF prog-id=58 op=LOAD Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit: BPF prog-id=59 op=LOAD Oct 2 20:39:51.674000 audit: BPF prog-id=43 op=UNLOAD Oct 2 20:39:51.674000 audit: BPF prog-id=44 op=UNLOAD Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit: BPF prog-id=60 op=LOAD Oct 2 20:39:51.675000 audit: BPF prog-id=45 op=UNLOAD Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit: BPF prog-id=61 op=LOAD Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit: BPF prog-id=62 op=LOAD Oct 2 20:39:51.676000 audit: BPF prog-id=46 op=UNLOAD Oct 2 20:39:51.676000 audit: BPF prog-id=47 op=UNLOAD Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.677000 audit: BPF prog-id=63 op=LOAD Oct 2 20:39:51.677000 audit: BPF prog-id=48 op=UNLOAD Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.678000 audit: BPF prog-id=64 op=LOAD Oct 2 20:39:51.678000 audit: BPF prog-id=49 op=UNLOAD Oct 2 20:39:51.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit: BPF prog-id=65 op=LOAD Oct 2 20:39:51.680000 audit: BPF prog-id=50 op=UNLOAD Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit: BPF prog-id=66 op=LOAD Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.681000 audit: BPF prog-id=67 op=LOAD Oct 2 20:39:51.681000 audit: BPF prog-id=51 op=UNLOAD Oct 2 20:39:51.681000 audit: BPF prog-id=52 op=UNLOAD Oct 2 20:39:51.695934 systemd[1]: Started kubelet.service. Oct 2 20:39:51.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:51.766580 kubelet[1941]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 20:39:51.766580 kubelet[1941]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:39:51.766580 kubelet[1941]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:39:51.766955 kubelet[1941]: I1002 20:39:51.766639 1941 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:39:51.768081 kubelet[1941]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 20:39:51.768081 kubelet[1941]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:39:51.768081 kubelet[1941]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:39:52.475450 kubelet[1941]: I1002 20:39:52.475416 1941 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 20:39:52.475450 kubelet[1941]: I1002 20:39:52.475442 1941 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:39:52.475670 kubelet[1941]: I1002 20:39:52.475644 1941 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 20:39:52.479957 kubelet[1941]: I1002 20:39:52.479936 1941 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:39:52.480145 kubelet[1941]: W1002 20:39:52.480038 1941 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:39:52.480925 kubelet[1941]: I1002 20:39:52.480909 1941 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:39:52.481310 kubelet[1941]: I1002 20:39:52.481298 1941 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:39:52.481478 kubelet[1941]: I1002 20:39:52.481467 1941 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 20:39:52.481680 kubelet[1941]: I1002 20:39:52.481659 1941 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:39:52.481740 kubelet[1941]: I1002 20:39:52.481731 1941 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 20:39:52.481905 kubelet[1941]: I1002 20:39:52.481896 1941 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:39:52.488847 kubelet[1941]: I1002 20:39:52.488829 1941 kubelet.go:381] "Attempting to sync node with API server" Oct 2 20:39:52.488973 kubelet[1941]: I1002 20:39:52.488963 1941 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:39:52.489264 kubelet[1941]: I1002 20:39:52.489253 1941 kubelet.go:281] "Adding apiserver pod source" Oct 2 20:39:52.489346 kubelet[1941]: I1002 20:39:52.489338 1941 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:39:52.490193 kubelet[1941]: E1002 20:39:52.490176 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:52.490995 kubelet[1941]: E1002 20:39:52.490982 1941 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:52.491848 kubelet[1941]: I1002 20:39:52.491836 1941 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:39:52.492331 kubelet[1941]: W1002 20:39:52.492318 1941 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 20:39:52.492833 kubelet[1941]: I1002 20:39:52.492816 1941 server.go:1175] "Started kubelet" Oct 2 20:39:52.494000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:52.494000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:39:52.494000 audit[1941]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b132c0 a1=4000e4e030 a2=4000b13290 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.494000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:39:52.495634 kubelet[1941]: I1002 20:39:52.495618 1941 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:39:52.494000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:52.494000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:39:52.494000 audit[1941]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b5afc0 a1=4000e4e048 a2=4000b13350 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.494000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:39:52.495886 kubelet[1941]: I1002 20:39:52.495853 1941 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:39:52.496215 kubelet[1941]: I1002 20:39:52.496199 1941 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:39:52.496936 kubelet[1941]: I1002 20:39:52.496778 1941 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:39:52.498066 kubelet[1941]: I1002 20:39:52.498020 1941 server.go:438] "Adding debug handlers to kubelet server" Oct 2 20:39:52.503113 kubelet[1941]: E1002 20:39:52.496207 1941 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:39:52.503113 kubelet[1941]: E1002 20:39:52.502737 1941 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:39:52.503113 kubelet[1941]: I1002 20:39:52.502773 1941 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 20:39:52.503113 kubelet[1941]: I1002 20:39:52.502829 1941 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 20:39:52.504743 kubelet[1941]: E1002 20:39:52.504709 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:39:52.505000 audit[1953]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.505000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde57fea0 a2=0 a3=1 items=0 ppid=1941 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:39:52.507000 audit[1954]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.507000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffdb7168c0 a2=0 a3=1 items=0 ppid=1941 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:39:52.510000 audit[1956]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.510000 audit[1956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe9480460 a2=0 a3=1 items=0 ppid=1941 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.510000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:39:52.513000 audit[1958]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.513000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe6935420 a2=0 a3=1 items=0 ppid=1941 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:39:52.528000 audit[1961]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.528000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff55757c0 a2=0 a3=1 items=0 ppid=1941 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 20:39:52.535761 kubelet[1941]: E1002 20:39:52.535663 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f0346b6952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 492796242, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 492796242, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.535953 kubelet[1941]: W1002 20:39:52.535938 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:52.535990 kubelet[1941]: E1002 20:39:52.535961 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:52.536059 kubelet[1941]: W1002 20:39:52.536040 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:52.536059 kubelet[1941]: E1002 20:39:52.536056 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:52.536130 kubelet[1941]: W1002 20:39:52.536080 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:52.536130 kubelet[1941]: E1002 20:39:52.536088 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:52.536176 kubelet[1941]: E1002 20:39:52.536154 1941 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.200.20.45" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 20:39:52.536000 audit[1964]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.537100 kubelet[1941]: I1002 20:39:52.537076 1941 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 20:39:52.537100 kubelet[1941]: I1002 20:39:52.537088 1941 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 20:39:52.537100 kubelet[1941]: I1002 20:39:52.537101 1941 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:39:52.536000 audit[1964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe06e1390 a2=0 a3=1 items=0 ppid=1941 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 20:39:52.537427 kubelet[1941]: E1002 20:39:52.537356 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f03502e27f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 502723199, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 502723199, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.538059 kubelet[1941]: E1002 20:39:52.537991 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.538595 kubelet[1941]: E1002 20:39:52.538541 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.539504 kubelet[1941]: E1002 20:39:52.539445 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.543229 kubelet[1941]: I1002 20:39:52.543211 1941 policy_none.go:49] "None policy: Start" Oct 2 20:39:52.543757 kubelet[1941]: I1002 20:39:52.543739 1941 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 20:39:52.543817 kubelet[1941]: I1002 20:39:52.543764 1941 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:39:52.553276 systemd[1]: Created slice kubepods.slice. Oct 2 20:39:52.558592 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 20:39:52.561420 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 20:39:52.562000 audit[1970]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.562000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe49b8da0 a2=0 a3=1 items=0 ppid=1941 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 20:39:52.566540 kubelet[1941]: I1002 20:39:52.566513 1941 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:39:52.565000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:52.565000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:39:52.565000 audit[1941]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aeef30 a1=4000b1f5c0 a2=4000aeef00 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.565000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:39:52.566754 kubelet[1941]: I1002 20:39:52.566598 1941 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:39:52.566807 kubelet[1941]: I1002 20:39:52.566787 1941 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:39:52.568945 kubelet[1941]: E1002 20:39:52.568728 1941 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.45\" not found" Oct 2 20:39:52.569083 kubelet[1941]: E1002 20:39:52.568897 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f038e65bc5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 567962565, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 567962565, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.603793 kubelet[1941]: E1002 20:39:52.603748 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:52.604558 kubelet[1941]: I1002 20:39:52.604541 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:39:52.605795 kubelet[1941]: E1002 20:39:52.605760 1941 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.45" Oct 2 20:39:52.605931 kubelet[1941]: E1002 20:39:52.605830 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 604488602, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef00ed" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.606803 kubelet[1941]: E1002 20:39:52.606716 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 604514841, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef144d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.607591 kubelet[1941]: E1002 20:39:52.607538 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 604518241, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef2005" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.620000 audit[1974]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.620000 audit[1974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffd674b3e0 a2=0 a3=1 items=0 ppid=1941 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 20:39:52.622000 audit[1975]: NETFILTER_CFG table=nat:13 family=2 entries=1 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.622000 audit[1975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc63302d0 a2=0 a3=1 items=0 ppid=1941 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 20:39:52.624000 audit[1976]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.624000 audit[1976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4e9f820 a2=0 a3=1 items=0 ppid=1941 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:39:52.627000 audit[1978]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.627000 audit[1978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc880cfc0 a2=0 a3=1 items=0 ppid=1941 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 20:39:52.630000 audit[1980]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.630000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffef6461e0 a2=0 a3=1 items=0 ppid=1941 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:39:52.658000 audit[1983]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.658000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc329d7b0 a2=0 a3=1 items=0 ppid=1941 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 20:39:52.662000 audit[1985]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.662000 audit[1985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff5c1cfa0 a2=0 a3=1 items=0 ppid=1941 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 20:39:52.683000 audit[1988]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.683000 audit[1988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffe2490460 a2=0 a3=1 items=0 ppid=1941 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 20:39:52.684845 kubelet[1941]: I1002 20:39:52.684824 1941 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:39:52.685000 audit[1989]: NETFILTER_CFG table=mangle:20 family=10 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.685000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd0fc6bd0 a2=0 a3=1 items=0 ppid=1941 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:39:52.686000 audit[1990]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.686000 audit[1990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdbadd860 a2=0 a3=1 items=0 ppid=1941 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:39:52.687000 audit[1991]: NETFILTER_CFG table=nat:22 family=10 entries=2 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.687000 audit[1991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcc4e9e20 a2=0 a3=1 items=0 ppid=1941 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 20:39:52.688000 audit[1992]: NETFILTER_CFG table=nat:23 family=2 entries=1 op=nft_register_chain pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.688000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe940bcc0 a2=0 a3=1 items=0 ppid=1941 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:39:52.689000 audit[1994]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:52.689000 audit[1994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef2e4ac0 a2=0 a3=1 items=0 ppid=1941 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:39:52.691000 audit[1995]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.691000 audit[1995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc70b1d90 a2=0 a3=1 items=0 ppid=1941 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 20:39:52.693000 audit[1996]: NETFILTER_CFG table=filter:26 family=10 entries=2 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.693000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc4aa3360 a2=0 a3=1 items=0 ppid=1941 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:39:52.697000 audit[1998]: NETFILTER_CFG table=filter:27 family=10 entries=1 op=nft_register_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.697000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffcfcb52c0 a2=0 a3=1 items=0 ppid=1941 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 20:39:52.699000 audit[1999]: NETFILTER_CFG table=nat:28 family=10 entries=1 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.699000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffce2f3e90 a2=0 a3=1 items=0 ppid=1941 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 20:39:52.700000 audit[2000]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.700000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffcd281e0 a2=0 a3=1 items=0 ppid=1941 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:39:52.704626 kubelet[1941]: E1002 20:39:52.704607 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:52.703000 audit[2002]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=2002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.703000 audit[2002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffe58d860 a2=0 a3=1 items=0 ppid=1941 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 20:39:52.707000 audit[2004]: NETFILTER_CFG table=nat:31 family=10 entries=2 op=nft_register_chain pid=2004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.707000 audit[2004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe72521a0 a2=0 a3=1 items=0 ppid=1941 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:39:52.710000 audit[2006]: NETFILTER_CFG table=nat:32 family=10 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.710000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffcfee2250 a2=0 a3=1 items=0 ppid=1941 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 20:39:52.714000 audit[2008]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.714000 audit[2008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffe15778e0 a2=0 a3=1 items=0 ppid=1941 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 20:39:52.722000 audit[2010]: NETFILTER_CFG table=nat:34 family=10 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.722000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffc5ed5b20 a2=0 a3=1 items=0 ppid=1941 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 20:39:52.724236 kubelet[1941]: I1002 20:39:52.724217 1941 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:39:52.724356 kubelet[1941]: I1002 20:39:52.724346 1941 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 20:39:52.724421 kubelet[1941]: I1002 20:39:52.724405 1941 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 20:39:52.724509 kubelet[1941]: E1002 20:39:52.724501 1941 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 20:39:52.726000 audit[2011]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2011 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.726000 audit[2011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbf3b010 a2=0 a3=1 items=0 ppid=1941 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:39:52.729066 kubelet[1941]: W1002 20:39:52.725678 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:52.729172 kubelet[1941]: E1002 20:39:52.729158 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:52.728000 audit[2012]: NETFILTER_CFG table=nat:36 family=10 entries=1 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.728000 audit[2012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1a8f100 a2=0 a3=1 items=0 ppid=1941 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:39:52.730000 audit[2013]: NETFILTER_CFG table=filter:37 family=10 entries=1 op=nft_register_chain pid=2013 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:52.730000 audit[2013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcdd9dc0 a2=0 a3=1 items=0 ppid=1941 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:52.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:39:52.737442 kubelet[1941]: E1002 20:39:52.737421 1941 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.200.20.45" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 20:39:52.805691 kubelet[1941]: E1002 20:39:52.805670 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:52.806673 kubelet[1941]: I1002 20:39:52.806641 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:39:52.807690 kubelet[1941]: E1002 20:39:52.807672 1941 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.45" Oct 2 20:39:52.808127 kubelet[1941]: E1002 20:39:52.808050 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 806604203, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef00ed" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.808912 kubelet[1941]: E1002 20:39:52.808847 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 806616362, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef144d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.895172 kubelet[1941]: E1002 20:39:52.895099 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 806619402, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef2005" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.906687 kubelet[1941]: E1002 20:39:52.906669 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.007770 kubelet[1941]: E1002 20:39:53.007228 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.108740 kubelet[1941]: E1002 20:39:53.108711 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.138916 kubelet[1941]: E1002 20:39:53.138897 1941 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.200.20.45" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 20:39:53.208742 kubelet[1941]: I1002 20:39:53.208725 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:39:53.208957 kubelet[1941]: E1002 20:39:53.208745 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.209839 kubelet[1941]: E1002 20:39:53.209812 1941 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.45" Oct 2 20:39:53.209981 kubelet[1941]: E1002 20:39:53.209807 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 53, 208657079, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef00ed" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:53.295559 kubelet[1941]: E1002 20:39:53.295184 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 53, 208661878, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef144d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:53.309518 kubelet[1941]: E1002 20:39:53.309494 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.409924 kubelet[1941]: E1002 20:39:53.409903 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.491216 kubelet[1941]: E1002 20:39:53.491197 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:53.496202 kubelet[1941]: E1002 20:39:53.496128 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 53, 208689797, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef2005" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:53.510500 kubelet[1941]: E1002 20:39:53.510470 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.536679 kubelet[1941]: W1002 20:39:53.536656 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:53.536739 kubelet[1941]: E1002 20:39:53.536685 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:53.536800 kubelet[1941]: W1002 20:39:53.536782 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:53.536800 kubelet[1941]: E1002 20:39:53.536800 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:53.610914 kubelet[1941]: E1002 20:39:53.610520 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.711000 kubelet[1941]: E1002 20:39:53.710971 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.734955 kubelet[1941]: W1002 20:39:53.734931 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:53.734955 kubelet[1941]: E1002 20:39:53.734959 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:53.811253 kubelet[1941]: E1002 20:39:53.811230 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.911852 kubelet[1941]: E1002 20:39:53.911619 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:53.940631 kubelet[1941]: E1002 20:39:53.940609 1941 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.200.20.45" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 20:39:53.996681 kubelet[1941]: W1002 20:39:53.996663 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:53.996793 kubelet[1941]: E1002 20:39:53.996783 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:54.011536 kubelet[1941]: I1002 20:39:54.011519 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:39:54.011755 kubelet[1941]: E1002 20:39:54.011660 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.012476 kubelet[1941]: E1002 20:39:54.012394 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 54, 11467772, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef00ed" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:54.012757 kubelet[1941]: E1002 20:39:54.012710 1941 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.45" Oct 2 20:39:54.013174 kubelet[1941]: E1002 20:39:54.013123 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 54, 11492731, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef144d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:54.095369 kubelet[1941]: E1002 20:39:54.095291 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 54, 11495691, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef2005" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:54.112657 kubelet[1941]: E1002 20:39:54.112631 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.213039 kubelet[1941]: E1002 20:39:54.213011 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.313421 kubelet[1941]: E1002 20:39:54.313397 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.413835 kubelet[1941]: E1002 20:39:54.413808 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.492314 kubelet[1941]: E1002 20:39:54.492125 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:54.514468 kubelet[1941]: E1002 20:39:54.514450 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.615048 kubelet[1941]: E1002 20:39:54.615022 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.715609 kubelet[1941]: E1002 20:39:54.715583 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.816556 kubelet[1941]: E1002 20:39:54.816231 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:54.916686 kubelet[1941]: E1002 20:39:54.916662 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.017113 kubelet[1941]: E1002 20:39:55.017078 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.117755 kubelet[1941]: E1002 20:39:55.117503 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.217989 kubelet[1941]: E1002 20:39:55.217955 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.318378 kubelet[1941]: E1002 20:39:55.318355 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.418801 kubelet[1941]: E1002 20:39:55.418779 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.493093 kubelet[1941]: E1002 20:39:55.493076 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:55.519494 kubelet[1941]: E1002 20:39:55.519475 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.541483 kubelet[1941]: E1002 20:39:55.541461 1941 controller.go:144] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.200.20.45" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 20:39:55.613485 kubelet[1941]: I1002 20:39:55.613455 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:39:55.614464 kubelet[1941]: E1002 20:39:55.614396 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 55, 613424984, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef00ed" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:55.614720 kubelet[1941]: E1002 20:39:55.614697 1941 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.45" Oct 2 20:39:55.615332 kubelet[1941]: E1002 20:39:55.615276 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 55, 613429624, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef144d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:55.616025 kubelet[1941]: E1002 20:39:55.615965 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 55, 613432584, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef2005" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:55.620271 kubelet[1941]: E1002 20:39:55.620256 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.721049 kubelet[1941]: E1002 20:39:55.720646 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.752678 kubelet[1941]: W1002 20:39:55.752647 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:55.752678 kubelet[1941]: E1002 20:39:55.752679 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:55.821012 kubelet[1941]: E1002 20:39:55.820988 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:55.921397 kubelet[1941]: E1002 20:39:55.921377 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.022207 kubelet[1941]: E1002 20:39:56.021884 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.108100 kubelet[1941]: W1002 20:39:56.108074 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:56.108240 kubelet[1941]: E1002 20:39:56.108229 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:56.122256 kubelet[1941]: E1002 20:39:56.122229 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.222652 kubelet[1941]: E1002 20:39:56.222628 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.323308 kubelet[1941]: E1002 20:39:56.323007 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.423425 kubelet[1941]: E1002 20:39:56.423400 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.493724 kubelet[1941]: E1002 20:39:56.493704 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:56.524029 kubelet[1941]: E1002 20:39:56.524014 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.624889 kubelet[1941]: E1002 20:39:56.624596 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.725460 kubelet[1941]: E1002 20:39:56.725429 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.747515 kubelet[1941]: W1002 20:39:56.747487 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:56.747515 kubelet[1941]: E1002 20:39:56.747517 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:56.826051 kubelet[1941]: E1002 20:39:56.826033 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:56.926465 kubelet[1941]: E1002 20:39:56.926444 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.027017 kubelet[1941]: E1002 20:39:57.026985 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.100971 kubelet[1941]: W1002 20:39:57.100950 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:57.100971 kubelet[1941]: E1002 20:39:57.100975 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:57.127292 kubelet[1941]: E1002 20:39:57.127276 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.228059 kubelet[1941]: E1002 20:39:57.227691 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.328098 kubelet[1941]: E1002 20:39:57.328076 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.428533 kubelet[1941]: E1002 20:39:57.428499 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.494989 kubelet[1941]: E1002 20:39:57.494794 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:57.529095 kubelet[1941]: E1002 20:39:57.529070 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.568103 kubelet[1941]: E1002 20:39:57.568077 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:39:57.629596 kubelet[1941]: E1002 20:39:57.629574 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.730145 kubelet[1941]: E1002 20:39:57.730118 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.830668 kubelet[1941]: E1002 20:39:57.830333 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:57.930713 kubelet[1941]: E1002 20:39:57.930684 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.031141 kubelet[1941]: E1002 20:39:58.031115 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.131781 kubelet[1941]: E1002 20:39:58.131498 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.233004 kubelet[1941]: E1002 20:39:58.232971 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.333422 kubelet[1941]: E1002 20:39:58.333404 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.433893 kubelet[1941]: E1002 20:39:58.433875 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.495241 kubelet[1941]: E1002 20:39:58.495225 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:58.534684 kubelet[1941]: E1002 20:39:58.534660 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.634983 kubelet[1941]: E1002 20:39:58.634953 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.735759 kubelet[1941]: E1002 20:39:58.735506 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.747484 kubelet[1941]: E1002 20:39:58.747454 1941 controller.go:144] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.200.20.45" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 20:39:58.816302 kubelet[1941]: I1002 20:39:58.816277 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:39:58.822515 kubelet[1941]: E1002 20:39:58.822490 1941 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.45" Oct 2 20:39:58.822601 kubelet[1941]: E1002 20:39:58.822421 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef00ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.45 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534974701, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 58, 816222281, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef00ed" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:58.835798 kubelet[1941]: E1002 20:39:58.835766 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:58.850419 kubelet[1941]: E1002 20:39:58.850333 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef144d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.45 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534979661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 58, 816228761, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef144d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:58.858740 kubelet[1941]: E1002 20:39:58.858663 1941 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45.178a64f036ef2005", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.45", UID:"10.200.20.45", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.45 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.45"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 52, 534982661, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 58, 816231681, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.45.178a64f036ef2005" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:58.936130 kubelet[1941]: E1002 20:39:58.936105 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.036986 kubelet[1941]: E1002 20:39:59.036587 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.137105 kubelet[1941]: E1002 20:39:59.137077 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.237599 kubelet[1941]: E1002 20:39:59.237569 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.338345 kubelet[1941]: E1002 20:39:59.338043 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.438538 kubelet[1941]: E1002 20:39:59.438514 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.495958 kubelet[1941]: E1002 20:39:59.495930 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:59.538658 kubelet[1941]: E1002 20:39:59.538638 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.639396 kubelet[1941]: E1002 20:39:59.639179 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.739653 kubelet[1941]: E1002 20:39:59.739626 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.790823 kubelet[1941]: W1002 20:39:59.790793 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:59.790935 kubelet[1941]: E1002 20:39:59.790831 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:59.840152 kubelet[1941]: E1002 20:39:59.840131 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:39:59.940617 kubelet[1941]: E1002 20:39:59.940596 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.006999 kubelet[1941]: W1002 20:40:00.006967 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:40:00.007149 kubelet[1941]: E1002 20:40:00.007139 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:40:00.041187 kubelet[1941]: E1002 20:40:00.041164 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.141604 kubelet[1941]: E1002 20:40:00.141583 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.242328 kubelet[1941]: E1002 20:40:00.242068 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.342557 kubelet[1941]: E1002 20:40:00.342525 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.442966 kubelet[1941]: E1002 20:40:00.442947 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.496436 kubelet[1941]: E1002 20:40:00.496251 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:00.543578 kubelet[1941]: E1002 20:40:00.543552 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.644127 kubelet[1941]: E1002 20:40:00.644104 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.744506 kubelet[1941]: E1002 20:40:00.744483 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.845119 kubelet[1941]: E1002 20:40:00.844904 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:00.946384 kubelet[1941]: E1002 20:40:00.946365 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.046931 kubelet[1941]: E1002 20:40:01.046903 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.147517 kubelet[1941]: E1002 20:40:01.147322 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.247822 kubelet[1941]: E1002 20:40:01.247797 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.348176 kubelet[1941]: E1002 20:40:01.348156 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.369303 kubelet[1941]: W1002 20:40:01.369281 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:40:01.369369 kubelet[1941]: E1002 20:40:01.369308 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.45" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:40:01.448683 kubelet[1941]: E1002 20:40:01.448658 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.497056 kubelet[1941]: E1002 20:40:01.497037 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:01.548762 kubelet[1941]: E1002 20:40:01.548738 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.649334 kubelet[1941]: E1002 20:40:01.649308 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.750034 kubelet[1941]: E1002 20:40:01.749777 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.850520 kubelet[1941]: E1002 20:40:01.850495 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:01.950922 kubelet[1941]: E1002 20:40:01.950904 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.051646 kubelet[1941]: E1002 20:40:02.051448 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.151930 kubelet[1941]: E1002 20:40:02.151894 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.252391 kubelet[1941]: E1002 20:40:02.252357 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.352977 kubelet[1941]: E1002 20:40:02.352766 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.357791 kubelet[1941]: W1002 20:40:02.357754 1941 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:40:02.357791 kubelet[1941]: E1002 20:40:02.357778 1941 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:40:02.453161 kubelet[1941]: E1002 20:40:02.453139 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.479554 kubelet[1941]: I1002 20:40:02.479392 1941 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 20:40:02.497891 kubelet[1941]: E1002 20:40:02.497820 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:02.553579 kubelet[1941]: E1002 20:40:02.553550 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.568836 kubelet[1941]: E1002 20:40:02.568814 1941 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.45\" not found" Oct 2 20:40:02.569406 kubelet[1941]: E1002 20:40:02.569391 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:40:02.654072 kubelet[1941]: E1002 20:40:02.653632 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.754085 kubelet[1941]: E1002 20:40:02.754058 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.854527 kubelet[1941]: E1002 20:40:02.854505 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:02.891061 kubelet[1941]: E1002 20:40:02.891033 1941 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.45" not found Oct 2 20:40:02.955838 kubelet[1941]: E1002 20:40:02.955813 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.056068 kubelet[1941]: E1002 20:40:03.056035 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.156486 kubelet[1941]: E1002 20:40:03.156460 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.257144 kubelet[1941]: E1002 20:40:03.256846 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.357274 kubelet[1941]: E1002 20:40:03.357243 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.458409 kubelet[1941]: E1002 20:40:03.458374 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.498732 kubelet[1941]: E1002 20:40:03.498716 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:03.559141 kubelet[1941]: E1002 20:40:03.558874 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.659541 kubelet[1941]: E1002 20:40:03.659521 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.760142 kubelet[1941]: E1002 20:40:03.760113 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.860742 kubelet[1941]: E1002 20:40:03.860516 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:03.959892 kubelet[1941]: E1002 20:40:03.959843 1941 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.45" not found Oct 2 20:40:03.960875 kubelet[1941]: E1002 20:40:03.960845 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.061432 kubelet[1941]: E1002 20:40:04.061408 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.162352 kubelet[1941]: E1002 20:40:04.162116 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.262562 kubelet[1941]: E1002 20:40:04.262532 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.362976 kubelet[1941]: E1002 20:40:04.362954 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.464021 kubelet[1941]: E1002 20:40:04.464000 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.499431 kubelet[1941]: E1002 20:40:04.499406 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:04.564557 kubelet[1941]: E1002 20:40:04.564523 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.665137 kubelet[1941]: E1002 20:40:04.665114 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.765794 kubelet[1941]: E1002 20:40:04.765553 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.866489 kubelet[1941]: E1002 20:40:04.866458 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:04.966759 kubelet[1941]: E1002 20:40:04.966735 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.067509 kubelet[1941]: E1002 20:40:05.067311 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.152050 kubelet[1941]: E1002 20:40:05.152017 1941 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.45\" not found" node="10.200.20.45" Oct 2 20:40:05.167775 kubelet[1941]: E1002 20:40:05.167748 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.223707 kubelet[1941]: I1002 20:40:05.223682 1941 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.45" Oct 2 20:40:05.268184 kubelet[1941]: E1002 20:40:05.268153 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.361449 kubelet[1941]: I1002 20:40:05.361211 1941 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.45" Oct 2 20:40:05.369126 kubelet[1941]: E1002 20:40:05.369109 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.469357 kubelet[1941]: E1002 20:40:05.469325 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.499680 kubelet[1941]: E1002 20:40:05.499652 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:05.570108 kubelet[1941]: E1002 20:40:05.570079 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.670680 kubelet[1941]: E1002 20:40:05.670657 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.721558 sudo[1728]: pam_unix(sudo:session): session closed for user root Oct 2 20:40:05.720000 audit[1728]: USER_END pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.725636 kernel: kauditd_printk_skb: 472 callbacks suppressed Oct 2 20:40:05.725675 kernel: audit: type=1106 audit(1696279205.720:579): pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.720000 audit[1728]: CRED_DISP pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.764012 kernel: audit: type=1104 audit(1696279205.720:580): pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.771320 kubelet[1941]: E1002 20:40:05.771299 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.808072 sshd[1659]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:05.810819 systemd-logind[1368]: Session 9 logged out. Waiting for processes to exit. Oct 2 20:40:05.808000 audit[1659]: USER_END pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.811810 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 20:40:05.812819 systemd-logind[1368]: Removed session 9. Oct 2 20:40:05.813275 systemd[1]: sshd@6-10.200.20.45:22-10.200.12.6:49732.service: Deactivated successfully. Oct 2 20:40:05.808000 audit[1659]: CRED_DISP pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.856649 kernel: audit: type=1106 audit(1696279205.808:581): pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.856747 kernel: audit: type=1104 audit(1696279205.808:582): pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.856805 kernel: audit: type=1131 audit(1696279205.810:583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.45:22-10.200.12.6:49732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.45:22-10.200.12.6:49732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.877816 kubelet[1941]: E1002 20:40:05.877769 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:05.978193 kubelet[1941]: E1002 20:40:05.978110 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.078385 kubelet[1941]: E1002 20:40:06.078352 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.178708 kubelet[1941]: E1002 20:40:06.178677 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.279118 kubelet[1941]: E1002 20:40:06.279032 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.379366 kubelet[1941]: E1002 20:40:06.379338 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.479698 kubelet[1941]: E1002 20:40:06.479679 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.499927 kubelet[1941]: E1002 20:40:06.499906 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:06.580360 kubelet[1941]: E1002 20:40:06.580302 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.680782 kubelet[1941]: E1002 20:40:06.680762 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.781335 kubelet[1941]: E1002 20:40:06.781312 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.881692 kubelet[1941]: E1002 20:40:06.881627 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:06.982558 kubelet[1941]: E1002 20:40:06.982534 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.082906 kubelet[1941]: E1002 20:40:07.082885 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.183256 kubelet[1941]: E1002 20:40:07.183240 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.283590 kubelet[1941]: E1002 20:40:07.283574 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.383890 kubelet[1941]: E1002 20:40:07.383876 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.484419 kubelet[1941]: E1002 20:40:07.484355 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.500660 kubelet[1941]: E1002 20:40:07.500627 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:07.570312 kubelet[1941]: E1002 20:40:07.570283 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:40:07.584570 kubelet[1941]: E1002 20:40:07.584553 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.684928 kubelet[1941]: E1002 20:40:07.684914 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.785294 kubelet[1941]: E1002 20:40:07.785202 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.885578 kubelet[1941]: E1002 20:40:07.885553 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:07.986112 kubelet[1941]: E1002 20:40:07.986088 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.086520 kubelet[1941]: E1002 20:40:08.086449 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.186812 kubelet[1941]: E1002 20:40:08.186788 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.287134 kubelet[1941]: E1002 20:40:08.287109 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.387527 kubelet[1941]: E1002 20:40:08.387455 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.488128 kubelet[1941]: E1002 20:40:08.488108 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.501479 kubelet[1941]: E1002 20:40:08.501456 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:08.588917 kubelet[1941]: E1002 20:40:08.588902 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.689282 kubelet[1941]: E1002 20:40:08.689264 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.789568 kubelet[1941]: E1002 20:40:08.789539 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.889912 kubelet[1941]: E1002 20:40:08.889896 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:08.990439 kubelet[1941]: E1002 20:40:08.990358 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.090751 kubelet[1941]: E1002 20:40:09.090721 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.191096 kubelet[1941]: E1002 20:40:09.191073 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.292217 kubelet[1941]: E1002 20:40:09.292132 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.392591 kubelet[1941]: E1002 20:40:09.392564 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.493068 kubelet[1941]: E1002 20:40:09.493032 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.502306 kubelet[1941]: E1002 20:40:09.502289 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:09.593783 kubelet[1941]: E1002 20:40:09.593687 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.694115 kubelet[1941]: E1002 20:40:09.694087 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.794418 kubelet[1941]: E1002 20:40:09.794390 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.894788 kubelet[1941]: E1002 20:40:09.894713 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:09.995206 kubelet[1941]: E1002 20:40:09.995162 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:10.096092 kubelet[1941]: E1002 20:40:10.096064 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:10.196492 kubelet[1941]: E1002 20:40:10.196467 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:10.296856 kubelet[1941]: E1002 20:40:10.296834 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:10.397221 kubelet[1941]: E1002 20:40:10.397202 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:10.497736 kubelet[1941]: E1002 20:40:10.497680 1941 kubelet.go:2448] "Error getting node" err="node \"10.200.20.45\" not found" Oct 2 20:40:10.502996 kubelet[1941]: E1002 20:40:10.502961 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:10.598276 kubelet[1941]: I1002 20:40:10.598249 1941 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 20:40:10.598756 env[1381]: time="2023-10-02T20:40:10.598644889Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 20:40:10.599164 kubelet[1941]: I1002 20:40:10.599149 1941 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 20:40:10.599524 kubelet[1941]: E1002 20:40:10.599505 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:40:11.502160 kubelet[1941]: I1002 20:40:11.502124 1941 apiserver.go:52] "Watching apiserver" Oct 2 20:40:11.503236 kubelet[1941]: E1002 20:40:11.503209 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:11.504661 kubelet[1941]: I1002 20:40:11.504636 1941 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:40:11.504741 kubelet[1941]: I1002 20:40:11.504702 1941 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:40:11.509483 systemd[1]: Created slice kubepods-besteffort-poddc3b942f_58aa_43ae_8055_4bd26af82be1.slice. Oct 2 20:40:11.520761 systemd[1]: Created slice kubepods-besteffort-pod17253a68_d55a_4b81_a1ae_05ca652bd6f5.slice. Oct 2 20:40:11.704318 kubelet[1941]: I1002 20:40:11.704283 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc3b942f-58aa-43ae-8055-4bd26af82be1-xtables-lock\") pod \"kube-proxy-9jc52\" (UID: \"dc3b942f-58aa-43ae-8055-4bd26af82be1\") " pod="kube-system/kube-proxy-9jc52" Oct 2 20:40:11.704318 kubelet[1941]: I1002 20:40:11.704327 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9tprp\" (UniqueName: \"kubernetes.io/projected/dc3b942f-58aa-43ae-8055-4bd26af82be1-kube-api-access-9tprp\") pod \"kube-proxy-9jc52\" (UID: \"dc3b942f-58aa-43ae-8055-4bd26af82be1\") " pod="kube-system/kube-proxy-9jc52" Oct 2 20:40:11.704460 kubelet[1941]: I1002 20:40:11.704349 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/17253a68-d55a-4b81-a1ae-05ca652bd6f5-tigera-ca-bundle\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704460 kubelet[1941]: I1002 20:40:11.704370 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-cni-net-dir\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704460 kubelet[1941]: I1002 20:40:11.704389 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-cni-log-dir\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704460 kubelet[1941]: I1002 20:40:11.704409 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dc3b942f-58aa-43ae-8055-4bd26af82be1-kube-proxy\") pod \"kube-proxy-9jc52\" (UID: \"dc3b942f-58aa-43ae-8055-4bd26af82be1\") " pod="kube-system/kube-proxy-9jc52" Oct 2 20:40:11.704460 kubelet[1941]: I1002 20:40:11.704428 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-var-run-calico\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704460 kubelet[1941]: I1002 20:40:11.704445 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-var-lib-calico\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704648 kubelet[1941]: I1002 20:40:11.704463 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc3b942f-58aa-43ae-8055-4bd26af82be1-lib-modules\") pod \"kube-proxy-9jc52\" (UID: \"dc3b942f-58aa-43ae-8055-4bd26af82be1\") " pod="kube-system/kube-proxy-9jc52" Oct 2 20:40:11.704648 kubelet[1941]: I1002 20:40:11.704482 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-lib-modules\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704648 kubelet[1941]: I1002 20:40:11.704499 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-xtables-lock\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704648 kubelet[1941]: I1002 20:40:11.704517 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-policysync\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704648 kubelet[1941]: I1002 20:40:11.704534 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/17253a68-d55a-4b81-a1ae-05ca652bd6f5-node-certs\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704648 kubelet[1941]: I1002 20:40:11.704552 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-cni-bin-dir\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704779 kubelet[1941]: I1002 20:40:11.704571 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/17253a68-d55a-4b81-a1ae-05ca652bd6f5-flexvol-driver-host\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704779 kubelet[1941]: I1002 20:40:11.704592 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4fbtp\" (UniqueName: \"kubernetes.io/projected/17253a68-d55a-4b81-a1ae-05ca652bd6f5-kube-api-access-4fbtp\") pod \"calico-node-9bnfb\" (UID: \"17253a68-d55a-4b81-a1ae-05ca652bd6f5\") " pod="calico-system/calico-node-9bnfb" Oct 2 20:40:11.704779 kubelet[1941]: I1002 20:40:11.704600 1941 reconciler.go:169] "Reconciler: start to sync state" Oct 2 20:40:11.813357 kubelet[1941]: E1002 20:40:11.813286 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:11.813477 kubelet[1941]: W1002 20:40:11.813462 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:11.813542 kubelet[1941]: E1002 20:40:11.813533 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:11.907315 kubelet[1941]: E1002 20:40:11.907293 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:11.907450 kubelet[1941]: W1002 20:40:11.907437 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:11.907510 kubelet[1941]: E1002 20:40:11.907501 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:11.907730 kubelet[1941]: E1002 20:40:11.907719 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:11.907795 kubelet[1941]: W1002 20:40:11.907784 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:11.907846 kubelet[1941]: E1002 20:40:11.907838 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:11.917137 kubelet[1941]: E1002 20:40:11.917042 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:11.917137 kubelet[1941]: W1002 20:40:11.917061 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:11.917137 kubelet[1941]: E1002 20:40:11.917077 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:12.008657 kubelet[1941]: E1002 20:40:12.008635 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:12.008801 kubelet[1941]: W1002 20:40:12.008787 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:12.008888 kubelet[1941]: E1002 20:40:12.008855 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:12.109624 kubelet[1941]: E1002 20:40:12.109549 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:12.109733 kubelet[1941]: W1002 20:40:12.109720 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:12.110034 kubelet[1941]: E1002 20:40:12.110021 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:12.117524 kubelet[1941]: E1002 20:40:12.117504 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:40:12.117524 kubelet[1941]: W1002 20:40:12.117521 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:40:12.117623 kubelet[1941]: E1002 20:40:12.117538 1941 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:40:12.124269 env[1381]: time="2023-10-02T20:40:12.124229424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9bnfb,Uid:17253a68-d55a-4b81-a1ae-05ca652bd6f5,Namespace:calico-system,Attempt:0,}" Oct 2 20:40:12.417462 env[1381]: time="2023-10-02T20:40:12.417425560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9jc52,Uid:dc3b942f-58aa-43ae-8055-4bd26af82be1,Namespace:kube-system,Attempt:0,}" Oct 2 20:40:12.490235 kubelet[1941]: E1002 20:40:12.490192 1941 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:12.503374 kubelet[1941]: E1002 20:40:12.503333 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:12.571920 kubelet[1941]: E1002 20:40:12.571889 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:40:13.093706 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3064382933.mount: Deactivated successfully. Oct 2 20:40:13.133340 env[1381]: time="2023-10-02T20:40:13.133300993Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.147228 env[1381]: time="2023-10-02T20:40:13.147177728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.153289 env[1381]: time="2023-10-02T20:40:13.153255030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.160398 env[1381]: time="2023-10-02T20:40:13.160361976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.164158 env[1381]: time="2023-10-02T20:40:13.164118785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.168217 env[1381]: time="2023-10-02T20:40:13.168186981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.173746 env[1381]: time="2023-10-02T20:40:13.173705540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.182427 env[1381]: time="2023-10-02T20:40:13.182388389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:13.247137 env[1381]: time="2023-10-02T20:40:13.247054801Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:40:13.247137 env[1381]: time="2023-10-02T20:40:13.247096621Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:40:13.247137 env[1381]: time="2023-10-02T20:40:13.247106825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:40:13.247592 env[1381]: time="2023-10-02T20:40:13.247521381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c pid=2036 runtime=io.containerd.runc.v2 Oct 2 20:40:13.257529 env[1381]: time="2023-10-02T20:40:13.257440332Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:40:13.257529 env[1381]: time="2023-10-02T20:40:13.257485713Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:40:13.257529 env[1381]: time="2023-10-02T20:40:13.257496838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:40:13.257985 env[1381]: time="2023-10-02T20:40:13.257918437Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4459ab104be6ba1da389c57e228b8f3be6cd4e6b350006a57d51a7721d8f31c4 pid=2052 runtime=io.containerd.runc.v2 Oct 2 20:40:13.277097 systemd[1]: Started cri-containerd-4459ab104be6ba1da389c57e228b8f3be6cd4e6b350006a57d51a7721d8f31c4.scope. Oct 2 20:40:13.285889 systemd[1]: Started cri-containerd-67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c.scope. Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.347024 kernel: audit: type=1400 audit(1696279213.306:584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.347153 kernel: audit: type=1400 audit(1696279213.306:585): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.368075 kernel: audit: type=1400 audit(1696279213.306:586): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.387657 kernel: audit: type=1400 audit(1696279213.306:587): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.387749 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.412848 kernel: audit: type=1400 audit(1696279213.306:588): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.412933 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.443142 kernel: audit: type=1400 audit(1696279213.306:589): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.443220 kernel: audit: backlog limit exceeded Oct 2 20:40:13.443262 kernel: audit: type=1400 audit(1696279213.306:590): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.443772 env[1381]: time="2023-10-02T20:40:13.443736901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9bnfb,Uid:17253a68-d55a-4b81-a1ae-05ca652bd6f5,Namespace:calico-system,Attempt:0,} returns sandbox id \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\"" Oct 2 20:40:13.446027 env[1381]: time="2023-10-02T20:40:13.445995605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.323000 audit: BPF prog-id=68 op=LOAD Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2036 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663663356539393130656634336265383731326364333765616338 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2036 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663663356539393130656634336265383731326364333765616338 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit: BPF prog-id=69 op=LOAD Oct 2 20:40:13.324000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2036 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663663356539393130656634336265383731326364333765616338 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit: BPF prog-id=70 op=LOAD Oct 2 20:40:13.324000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2036 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663663356539393130656634336265383731326364333765616338 Oct 2 20:40:13.324000 audit: BPF prog-id=70 op=UNLOAD Oct 2 20:40:13.324000 audit: BPF prog-id=69 op=UNLOAD Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.324000 audit: BPF prog-id=71 op=LOAD Oct 2 20:40:13.324000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2036 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637663663356539393130656634336265383731326364333765616338 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.462000 audit: BPF prog-id=72 op=LOAD Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2052 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353961623130346265366261316461333839633537653232386238 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2052 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353961623130346265366261316461333839633537653232386238 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit: BPF prog-id=73 op=LOAD Oct 2 20:40:13.463000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2052 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353961623130346265366261316461333839633537653232386238 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit: BPF prog-id=74 op=LOAD Oct 2 20:40:13.463000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2052 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353961623130346265366261316461333839633537653232386238 Oct 2 20:40:13.463000 audit: BPF prog-id=74 op=UNLOAD Oct 2 20:40:13.463000 audit: BPF prog-id=73 op=UNLOAD Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:13.463000 audit: BPF prog-id=75 op=LOAD Oct 2 20:40:13.463000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2052 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:13.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353961623130346265366261316461333839633537653232386238 Oct 2 20:40:13.482470 env[1381]: time="2023-10-02T20:40:13.482404830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9jc52,Uid:dc3b942f-58aa-43ae-8055-4bd26af82be1,Namespace:kube-system,Attempt:0,} returns sandbox id \"4459ab104be6ba1da389c57e228b8f3be6cd4e6b350006a57d51a7721d8f31c4\"" Oct 2 20:40:13.504489 kubelet[1941]: E1002 20:40:13.504444 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:14.504877 kubelet[1941]: E1002 20:40:14.504833 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:14.867372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3420298448.mount: Deactivated successfully. Oct 2 20:40:15.009879 env[1381]: time="2023-10-02T20:40:15.009818435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:15.016746 env[1381]: time="2023-10-02T20:40:15.016708026Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:15.023509 env[1381]: time="2023-10-02T20:40:15.023476563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:15.027218 env[1381]: time="2023-10-02T20:40:15.027188417Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:15.027514 env[1381]: time="2023-10-02T20:40:15.027484990Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 20:40:15.028771 env[1381]: time="2023-10-02T20:40:15.028737988Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 20:40:15.029502 env[1381]: time="2023-10-02T20:40:15.029470875Z" level=info msg="CreateContainer within sandbox \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 20:40:15.065290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1040439588.mount: Deactivated successfully. Oct 2 20:40:15.082977 env[1381]: time="2023-10-02T20:40:15.082911016Z" level=info msg="CreateContainer within sandbox \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d\"" Oct 2 20:40:15.083808 env[1381]: time="2023-10-02T20:40:15.083777122Z" level=info msg="StartContainer for \"7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d\"" Oct 2 20:40:15.107550 systemd[1]: Started cri-containerd-7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d.scope. Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2036 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:15.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766306638363163356338616339336663306632666634396530383634 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.130000 audit: BPF prog-id=76 op=LOAD Oct 2 20:40:15.130000 audit[2122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2036 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:15.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766306638363163356338616339336663306632666634396530383634 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.131000 audit: BPF prog-id=77 op=LOAD Oct 2 20:40:15.131000 audit[2122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2036 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:15.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766306638363163356338616339336663306632666634396530383634 Oct 2 20:40:15.131000 audit: BPF prog-id=77 op=UNLOAD Oct 2 20:40:15.132000 audit: BPF prog-id=76 op=UNLOAD Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:15.132000 audit: BPF prog-id=78 op=LOAD Oct 2 20:40:15.132000 audit[2122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2036 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:15.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766306638363163356338616339336663306632666634396530383634 Oct 2 20:40:15.154735 env[1381]: time="2023-10-02T20:40:15.154375952Z" level=info msg="StartContainer for \"7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d\" returns successfully" Oct 2 20:40:15.155755 systemd[1]: cri-containerd-7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d.scope: Deactivated successfully. Oct 2 20:40:15.159000 audit: BPF prog-id=78 op=UNLOAD Oct 2 20:40:15.180099 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d-rootfs.mount: Deactivated successfully. Oct 2 20:40:15.260848 env[1381]: time="2023-10-02T20:40:15.260801392Z" level=info msg="shim disconnected" id=7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d Oct 2 20:40:15.260848 env[1381]: time="2023-10-02T20:40:15.260844851Z" level=warning msg="cleaning up after shim disconnected" id=7f0f861c5c8ac93fc0f2ff49e086442a433fe648446c3f6170494952d412ad1d namespace=k8s.io Oct 2 20:40:15.260848 env[1381]: time="2023-10-02T20:40:15.260854255Z" level=info msg="cleaning up dead shim" Oct 2 20:40:15.273471 env[1381]: time="2023-10-02T20:40:15.273419857Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2163 runtime=io.containerd.runc.v2\n" Oct 2 20:40:15.505959 kubelet[1941]: E1002 20:40:15.505917 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:16.170382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2250324638.mount: Deactivated successfully. Oct 2 20:40:16.506771 kubelet[1941]: E1002 20:40:16.506664 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:16.551920 env[1381]: time="2023-10-02T20:40:16.551852199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:16.559214 env[1381]: time="2023-10-02T20:40:16.559171174Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36ad84e6a838b02d80a9db87b13c83185253f647e2af2f58f91ac1346103ff4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:16.564794 env[1381]: time="2023-10-02T20:40:16.564746072Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:16.569354 env[1381]: time="2023-10-02T20:40:16.569328780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:16.569745 env[1381]: time="2023-10-02T20:40:16.569718629Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:36ad84e6a838b02d80a9db87b13c83185253f647e2af2f58f91ac1346103ff4e\"" Oct 2 20:40:16.570851 env[1381]: time="2023-10-02T20:40:16.570824709Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 20:40:16.571839 env[1381]: time="2023-10-02T20:40:16.571804974Z" level=info msg="CreateContainer within sandbox \"4459ab104be6ba1da389c57e228b8f3be6cd4e6b350006a57d51a7721d8f31c4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 20:40:16.602581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3376664554.mount: Deactivated successfully. Oct 2 20:40:16.617686 env[1381]: time="2023-10-02T20:40:16.617636054Z" level=info msg="CreateContainer within sandbox \"4459ab104be6ba1da389c57e228b8f3be6cd4e6b350006a57d51a7721d8f31c4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6958718cce2f3ef5194fe5ceeb81bd7402e5e8de809587788dc6417e6f4b6cb9\"" Oct 2 20:40:16.618396 env[1381]: time="2023-10-02T20:40:16.618374174Z" level=info msg="StartContainer for \"6958718cce2f3ef5194fe5ceeb81bd7402e5e8de809587788dc6417e6f4b6cb9\"" Oct 2 20:40:16.638146 systemd[1]: Started cri-containerd-6958718cce2f3ef5194fe5ceeb81bd7402e5e8de809587788dc6417e6f4b6cb9.scope. Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2052 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353837313863636532663365663531393466653563656562383162 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit: BPF prog-id=79 op=LOAD Oct 2 20:40:16.657000 audit[2187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2052 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353837313863636532663365663531393466653563656562383162 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit: BPF prog-id=80 op=LOAD Oct 2 20:40:16.657000 audit[2187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2052 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353837313863636532663365663531393466653563656562383162 Oct 2 20:40:16.657000 audit: BPF prog-id=80 op=UNLOAD Oct 2 20:40:16.657000 audit: BPF prog-id=79 op=UNLOAD Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:16.657000 audit: BPF prog-id=81 op=LOAD Oct 2 20:40:16.657000 audit[2187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2052 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353837313863636532663365663531393466653563656562383162 Oct 2 20:40:16.685074 env[1381]: time="2023-10-02T20:40:16.685023164Z" level=info msg="StartContainer for \"6958718cce2f3ef5194fe5ceeb81bd7402e5e8de809587788dc6417e6f4b6cb9\" returns successfully" Oct 2 20:40:16.745591 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 20:40:16.745759 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 20:40:16.745813 kernel: IPVS: ipvs loaded. Oct 2 20:40:16.761890 kernel: IPVS: [rr] scheduler registered. Oct 2 20:40:16.776895 kernel: IPVS: [wrr] scheduler registered. Oct 2 20:40:16.787887 kernel: IPVS: [sh] scheduler registered. Oct 2 20:40:16.845000 audit[2245]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.845000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc36d0a0 a2=0 a3=ffffbd9d36c0 items=0 ppid=2198 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:40:16.846000 audit[2246]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:16.846000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0459700 a2=0 a3=ffffa0b5d6c0 items=0 ppid=2198 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:40:16.847000 audit[2247]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.847000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec912c70 a2=0 a3=ffffbdeb46c0 items=0 ppid=2198 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:40:16.848000 audit[2248]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:16.848000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7262710 a2=0 a3=ffff8f5d66c0 items=0 ppid=2198 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:40:16.849000 audit[2249]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.849000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd387ad80 a2=0 a3=ffff8e37a6c0 items=0 ppid=2198 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:40:16.851000 audit[2250]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:16.851000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf1725c0 a2=0 a3=ffff7fce46c0 items=0 ppid=2198 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:40:16.953000 audit[2252]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.953000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff491ced0 a2=0 a3=ffffbb8416c0 items=0 ppid=2198 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:40:16.956000 audit[2254]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.956000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdd365b10 a2=0 a3=ffffbb1806c0 items=0 ppid=2198 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 20:40:16.962000 audit[2257]: NETFILTER_CFG table=filter:46 family=2 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.962000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc0c46800 a2=0 a3=ffffb33f26c0 items=0 ppid=2198 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 20:40:16.964000 audit[2258]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.964000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2f18790 a2=0 a3=ffffa12476c0 items=0 ppid=2198 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:40:16.967000 audit[2260]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.967000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdc4e81e0 a2=0 a3=ffff8becd6c0 items=0 ppid=2198 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:40:16.969000 audit[2261]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.969000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4e36360 a2=0 a3=ffff803166c0 items=0 ppid=2198 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:40:16.972000 audit[2263]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.972000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff74c9ab0 a2=0 a3=ffffabdd66c0 items=0 ppid=2198 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:40:16.976000 audit[2266]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.976000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffebc4e9a0 a2=0 a3=ffffb3a816c0 items=0 ppid=2198 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 20:40:16.979000 audit[2267]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.979000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef22b460 a2=0 a3=ffffb56ac6c0 items=0 ppid=2198 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:40:16.982000 audit[2269]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.982000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd35ffe80 a2=0 a3=ffffa997f6c0 items=0 ppid=2198 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:40:16.984000 audit[2270]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.984000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2ee64a0 a2=0 a3=ffff8b5c06c0 items=0 ppid=2198 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:40:16.989000 audit[2272]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.989000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4fded20 a2=0 a3=ffffa73306c0 items=0 ppid=2198 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:40:16.994000 audit[2275]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.994000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3940ce0 a2=0 a3=ffff8779a6c0 items=0 ppid=2198 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:40:16.999000 audit[2278]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:16.999000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe3799270 a2=0 a3=ffff8ee946c0 items=0 ppid=2198 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:16.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:40:17.000000 audit[2279]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:17.000000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff81dee60 a2=0 a3=ffffb6df06c0 items=0 ppid=2198 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:40:17.004000 audit[2281]: NETFILTER_CFG table=nat:59 family=2 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:17.004000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdcb2feb0 a2=0 a3=ffff8e2d16c0 items=0 ppid=2198 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:40:17.008000 audit[2284]: NETFILTER_CFG table=nat:60 family=2 entries=2 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:40:17.008000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff95c3e70 a2=0 a3=ffffbf10a6c0 items=0 ppid=2198 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:40:17.029000 audit[2288]: NETFILTER_CFG table=filter:61 family=2 entries=4 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:40:17.029000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd4cef710 a2=0 a3=ffffa3c806c0 items=0 ppid=2198 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:40:17.057000 audit[2288]: NETFILTER_CFG table=nat:62 family=2 entries=57 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:40:17.057000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd4cef710 a2=0 a3=ffffa3c806c0 items=0 ppid=2198 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:40:17.078000 audit[2295]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.078000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffb123580 a2=0 a3=ffffa0e406c0 items=0 ppid=2198 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:40:17.083000 audit[2297]: NETFILTER_CFG table=filter:64 family=10 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.083000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd07de7a0 a2=0 a3=ffffaed2a6c0 items=0 ppid=2198 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 20:40:17.088000 audit[2300]: NETFILTER_CFG table=filter:65 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.088000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffcd4e470 a2=0 a3=ffff8e11d6c0 items=0 ppid=2198 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 20:40:17.090000 audit[2301]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.090000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca00d1d0 a2=0 a3=ffffb19056c0 items=0 ppid=2198 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:40:17.093000 audit[2303]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.093000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd06ca1f0 a2=0 a3=ffff9d1bd6c0 items=0 ppid=2198 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:40:17.095000 audit[2304]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.095000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8b14370 a2=0 a3=ffffbadea6c0 items=0 ppid=2198 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:40:17.098000 audit[2306]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.098000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd73f2750 a2=0 a3=ffffad9196c0 items=0 ppid=2198 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 20:40:17.103000 audit[2309]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.103000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff1820b40 a2=0 a3=ffffafbf36c0 items=0 ppid=2198 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:40:17.105000 audit[2310]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.105000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1b5c920 a2=0 a3=ffff868156c0 items=0 ppid=2198 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:40:17.108000 audit[2312]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.108000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe46598b0 a2=0 a3=ffffb47e26c0 items=0 ppid=2198 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:40:17.110000 audit[2313]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.110000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc62d7450 a2=0 a3=ffffbac5a6c0 items=0 ppid=2198 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:40:17.114000 audit[2315]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.114000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd87208e0 a2=0 a3=ffffb6d666c0 items=0 ppid=2198 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:40:17.119000 audit[2318]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.119000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff3386fd0 a2=0 a3=ffff8e4a66c0 items=0 ppid=2198 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:40:17.124000 audit[2321]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.124000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8326ad0 a2=0 a3=ffffb5ebf6c0 items=0 ppid=2198 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 20:40:17.125000 audit[2322]: NETFILTER_CFG table=nat:77 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.125000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc85fbbe0 a2=0 a3=ffff8e8686c0 items=0 ppid=2198 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:40:17.129000 audit[2324]: NETFILTER_CFG table=nat:78 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.129000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffec75e380 a2=0 a3=ffffac9a76c0 items=0 ppid=2198 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:40:17.133000 audit[2327]: NETFILTER_CFG table=nat:79 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:40:17.133000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd0b00bb0 a2=0 a3=ffff8546a6c0 items=0 ppid=2198 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:40:17.141000 audit[2331]: NETFILTER_CFG table=filter:80 family=10 entries=3 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:40:17.141000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe3d21440 a2=0 a3=ffffa3ef96c0 items=0 ppid=2198 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.141000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:40:17.142000 audit[2331]: NETFILTER_CFG table=nat:81 family=10 entries=10 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:40:17.142000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1860 a0=3 a1=ffffe3d21440 a2=0 a3=ffffa3ef96c0 items=0 ppid=2198 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.142000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:40:17.507261 kubelet[1941]: E1002 20:40:17.507228 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:17.573088 kubelet[1941]: E1002 20:40:17.573034 1941 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:40:17.787691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3088879161.mount: Deactivated successfully. Oct 2 20:40:18.507879 kubelet[1941]: E1002 20:40:18.507838 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:19.508914 kubelet[1941]: E1002 20:40:19.508827 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:19.965105 env[1381]: time="2023-10-02T20:40:19.965063745Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:19.971413 env[1381]: time="2023-10-02T20:40:19.971379111Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:19.974951 env[1381]: time="2023-10-02T20:40:19.974916006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:19.978624 env[1381]: time="2023-10-02T20:40:19.978583673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:19.979110 env[1381]: time="2023-10-02T20:40:19.979086274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 20:40:19.980759 env[1381]: time="2023-10-02T20:40:19.980715726Z" level=info msg="CreateContainer within sandbox \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 20:40:20.007488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3377769527.mount: Deactivated successfully. Oct 2 20:40:20.012741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3463804170.mount: Deactivated successfully. Oct 2 20:40:20.037430 env[1381]: time="2023-10-02T20:40:20.037378286Z" level=info msg="CreateContainer within sandbox \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b\"" Oct 2 20:40:20.037923 env[1381]: time="2023-10-02T20:40:20.037896127Z" level=info msg="StartContainer for \"21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b\"" Oct 2 20:40:20.059359 systemd[1]: Started cri-containerd-21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b.scope. Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.086319 kernel: kauditd_printk_skb: 325 callbacks suppressed Oct 2 20:40:20.086388 kernel: audit: type=1400 audit(1696279220.080:676): avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2036 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:20.128253 kernel: audit: type=1300 audit(1696279220.080:676): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2036 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:20.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663039616134316561343432333035393339346534666664623538 Oct 2 20:40:20.151871 kernel: audit: type=1327 audit(1696279220.080:676): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663039616134316561343432333035393339346534666664623538 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.169229 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.187381 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.204625 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.222149 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.239358 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.239488 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.256215 env[1381]: time="2023-10-02T20:40:20.256157564Z" level=info msg="StartContainer for \"21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b\" returns successfully" Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.273283 kernel: audit: type=1400 audit(1696279220.080:677): avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit: BPF prog-id=82 op=LOAD Oct 2 20:40:20.080000 audit[2339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2036 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:20.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663039616134316561343432333035393339346534666664623538 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit: BPF prog-id=83 op=LOAD Oct 2 20:40:20.080000 audit[2339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2036 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:20.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663039616134316561343432333035393339346534666664623538 Oct 2 20:40:20.080000 audit: BPF prog-id=83 op=UNLOAD Oct 2 20:40:20.080000 audit: BPF prog-id=82 op=UNLOAD Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:20.080000 audit: BPF prog-id=84 op=LOAD Oct 2 20:40:20.080000 audit[2339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2036 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:20.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663039616134316561343432333035393339346534666664623538 Oct 2 20:40:20.587593 kubelet[1941]: E1002 20:40:20.509357 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:21.504155 env[1381]: time="2023-10-02T20:40:21.504080878Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:40:21.506476 systemd[1]: cri-containerd-21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b.scope: Deactivated successfully. Oct 2 20:40:21.509000 audit: BPF prog-id=84 op=UNLOAD Oct 2 20:40:21.510251 kubelet[1941]: E1002 20:40:21.510122 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:21.533429 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b-rootfs.mount: Deactivated successfully. Oct 2 20:40:22.511047 kubelet[1941]: E1002 20:40:22.511015 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:22.997721 env[1381]: time="2023-10-02T20:40:22.997677218Z" level=info msg="shim disconnected" id=21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b Oct 2 20:40:22.998112 env[1381]: time="2023-10-02T20:40:22.998091491Z" level=warning msg="cleaning up after shim disconnected" id=21f09aa41ea4423059394e4ffdb58fb3b52a2bc91c8fc190bd0ff22eaa14d12b namespace=k8s.io Oct 2 20:40:22.998196 env[1381]: time="2023-10-02T20:40:22.998182765Z" level=info msg="cleaning up dead shim" Oct 2 20:40:23.009568 env[1381]: time="2023-10-02T20:40:23.009529632Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2385 runtime=io.containerd.runc.v2\n" Oct 2 20:40:23.511611 kubelet[1941]: E1002 20:40:23.511560 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:23.803426 env[1381]: time="2023-10-02T20:40:23.803320623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 20:40:24.512404 kubelet[1941]: E1002 20:40:24.512364 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:25.513257 kubelet[1941]: E1002 20:40:25.513066 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:25.723262 kubelet[1941]: I1002 20:40:25.723225 1941 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:40:25.737278 systemd[1]: Created slice kubepods-besteffort-podfde6eff6_708c_4bff_9f14_54970aa9c292.slice. Oct 2 20:40:25.899135 kubelet[1941]: I1002 20:40:25.898774 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fde6eff6-708c-4bff-9f14-54970aa9c292-registration-dir\") pod \"csi-node-driver-5rxvj\" (UID: \"fde6eff6-708c-4bff-9f14-54970aa9c292\") " pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:25.899317 kubelet[1941]: I1002 20:40:25.899301 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8fpn\" (UniqueName: \"kubernetes.io/projected/fde6eff6-708c-4bff-9f14-54970aa9c292-kube-api-access-s8fpn\") pod \"csi-node-driver-5rxvj\" (UID: \"fde6eff6-708c-4bff-9f14-54970aa9c292\") " pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:25.899418 kubelet[1941]: I1002 20:40:25.899408 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fde6eff6-708c-4bff-9f14-54970aa9c292-socket-dir\") pod \"csi-node-driver-5rxvj\" (UID: \"fde6eff6-708c-4bff-9f14-54970aa9c292\") " pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:25.899506 kubelet[1941]: I1002 20:40:25.899497 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/fde6eff6-708c-4bff-9f14-54970aa9c292-etccalico\") pod \"csi-node-driver-5rxvj\" (UID: \"fde6eff6-708c-4bff-9f14-54970aa9c292\") " pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:25.899591 kubelet[1941]: I1002 20:40:25.899583 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fde6eff6-708c-4bff-9f14-54970aa9c292-kubelet-dir\") pod \"csi-node-driver-5rxvj\" (UID: \"fde6eff6-708c-4bff-9f14-54970aa9c292\") " pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:25.899679 kubelet[1941]: I1002 20:40:25.899671 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fde6eff6-708c-4bff-9f14-54970aa9c292-varrun\") pod \"csi-node-driver-5rxvj\" (UID: \"fde6eff6-708c-4bff-9f14-54970aa9c292\") " pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:26.041568 env[1381]: time="2023-10-02T20:40:26.041528471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rxvj,Uid:fde6eff6-708c-4bff-9f14-54970aa9c292,Namespace:calico-system,Attempt:0,}" Oct 2 20:40:26.189674 env[1381]: time="2023-10-02T20:40:26.189596884Z" level=error msg="Failed to destroy network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:26.192008 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f-shm.mount: Deactivated successfully. Oct 2 20:40:26.193151 env[1381]: time="2023-10-02T20:40:26.193104531Z" level=error msg="encountered an error cleaning up failed sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:26.193300 env[1381]: time="2023-10-02T20:40:26.193274627Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rxvj,Uid:fde6eff6-708c-4bff-9f14-54970aa9c292,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:26.194000 kubelet[1941]: E1002 20:40:26.193590 1941 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:26.194000 kubelet[1941]: E1002 20:40:26.193644 1941 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:26.194000 kubelet[1941]: E1002 20:40:26.193663 1941 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5rxvj" Oct 2 20:40:26.194195 kubelet[1941]: E1002 20:40:26.193714 1941 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:40:26.514045 kubelet[1941]: E1002 20:40:26.513520 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:26.808586 kubelet[1941]: I1002 20:40:26.807587 1941 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:40:26.808911 env[1381]: time="2023-10-02T20:40:26.808856950Z" level=info msg="StopPodSandbox for \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\"" Oct 2 20:40:26.871576 env[1381]: time="2023-10-02T20:40:26.871515712Z" level=error msg="StopPodSandbox for \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\" failed" error="failed to destroy network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:26.871894 kubelet[1941]: E1002 20:40:26.871852 1941 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:40:26.871981 kubelet[1941]: E1002 20:40:26.871927 1941 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f} Oct 2 20:40:26.871981 kubelet[1941]: E1002 20:40:26.871962 1941 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fde6eff6-708c-4bff-9f14-54970aa9c292\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:40:26.872066 kubelet[1941]: E1002 20:40:26.871991 1941 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fde6eff6-708c-4bff-9f14-54970aa9c292\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:40:27.513894 kubelet[1941]: E1002 20:40:27.513818 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:27.651395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount179140689.mount: Deactivated successfully. Oct 2 20:40:27.787904 env[1381]: time="2023-10-02T20:40:27.787775202Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:27.796967 env[1381]: time="2023-10-02T20:40:27.796931570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:27.802183 env[1381]: time="2023-10-02T20:40:27.802141299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:27.806731 env[1381]: time="2023-10-02T20:40:27.806694015Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:27.807282 env[1381]: time="2023-10-02T20:40:27.807249995Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 20:40:27.810078 env[1381]: time="2023-10-02T20:40:27.810050463Z" level=info msg="CreateContainer within sandbox \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 20:40:27.851624 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2205523671.mount: Deactivated successfully. Oct 2 20:40:27.877826 env[1381]: time="2023-10-02T20:40:27.877772537Z" level=info msg="CreateContainer within sandbox \"67f6c5e9910ef43be8712cd37eac8853124eb538786a6940e927c8ed492a5e3c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f\"" Oct 2 20:40:27.878498 env[1381]: time="2023-10-02T20:40:27.878473924Z" level=info msg="StartContainer for \"f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f\"" Oct 2 20:40:27.898756 systemd[1]: Started cri-containerd-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f.scope. Oct 2 20:40:27.926882 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 20:40:27.927006 kernel: audit: type=1400 audit(1696279227.919:683): avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.919000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.919000 audit[2460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2036 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:27.968135 kernel: audit: type=1300 audit(1696279227.919:683): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2036 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:27.968216 kernel: audit: type=1327 audit(1696279227.919:683): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303362373162663333366466333031636338393532306637613565 Oct 2 20:40:27.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303362373162663333366466333031636338393532306637613565 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.008234 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.008326 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.041366 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.062154 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.080695 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.080817 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:28.116103 kernel: audit: type=1400 audit(1696279227.928:684): avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.928000 audit: BPF prog-id=85 op=LOAD Oct 2 20:40:27.928000 audit[2460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2036 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:27.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303362373162663333366466333031636338393532306637613565 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit: BPF prog-id=86 op=LOAD Oct 2 20:40:27.941000 audit[2460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2036 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:27.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303362373162663333366466333031636338393532306637613565 Oct 2 20:40:27.941000 audit: BPF prog-id=86 op=UNLOAD Oct 2 20:40:27.941000 audit: BPF prog-id=85 op=UNLOAD Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:27.941000 audit: BPF prog-id=87 op=LOAD Oct 2 20:40:27.941000 audit[2460]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2036 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:27.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303362373162663333366466333031636338393532306637613565 Oct 2 20:40:28.117750 env[1381]: time="2023-10-02T20:40:28.117707520Z" level=info msg="StartContainer for \"f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f\" returns successfully" Oct 2 20:40:28.189207 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 20:40:28.189330 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 20:40:28.514620 kubelet[1941]: E1002 20:40:28.514579 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:28.833825 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.nbAkxv.mount: Deactivated successfully. Oct 2 20:40:29.515484 kubelet[1941]: E1002 20:40:29.515451 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:29.582000 audit[2575]: AVC avc: denied { write } for pid=2575 comm="tee" name="fd" dev="proc" ino=17941 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.582000 audit[2575]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe75cb96d a2=241 a3=1b6 items=1 ppid=2547 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.582000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 20:40:29.582000 audit: PATH item=0 name="/dev/fd/63" inode=17932 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.582000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.598000 audit[2581]: AVC avc: denied { write } for pid=2581 comm="tee" name="fd" dev="proc" ino=17254 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.598000 audit[2581]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef4be97d a2=241 a3=1b6 items=1 ppid=2549 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.598000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 20:40:29.598000 audit: PATH item=0 name="/dev/fd/63" inode=17243 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.598000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.627000 audit[2605]: AVC avc: denied { write } for pid=2605 comm="tee" name="fd" dev="proc" ino=17961 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.627000 audit[2605]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7e8a97e a2=241 a3=1b6 items=1 ppid=2566 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.627000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 20:40:29.627000 audit: PATH item=0 name="/dev/fd/63" inode=17956 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.627000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.632000 audit[2609]: AVC avc: denied { write } for pid=2609 comm="tee" name="fd" dev="proc" ino=17277 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.635000 audit[2613]: AVC avc: denied { write } for pid=2613 comm="tee" name="fd" dev="proc" ino=17966 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.635000 audit[2613]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc279d96e a2=241 a3=1b6 items=1 ppid=2560 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.635000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 20:40:29.635000 audit: PATH item=0 name="/dev/fd/63" inode=17958 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.635000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.642000 audit[2622]: AVC avc: denied { write } for pid=2622 comm="tee" name="fd" dev="proc" ino=17971 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.642000 audit[2622]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0d3997d a2=241 a3=1b6 items=1 ppid=2562 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.642000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 20:40:29.642000 audit: PATH item=0 name="/dev/fd/63" inode=17965 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.643000 audit[2616]: AVC avc: denied { write } for pid=2616 comm="tee" name="fd" dev="proc" ino=17280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:29.632000 audit[2609]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe159897d a2=241 a3=1b6 items=1 ppid=2564 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.632000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 20:40:29.632000 audit: PATH item=0 name="/dev/fd/63" inode=17957 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.632000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.643000 audit[2616]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5ce097f a2=241 a3=1b6 items=1 ppid=2570 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.643000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 20:40:29.643000 audit: PATH item=0 name="/dev/fd/63" inode=17263 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:29.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:29.831891 kernel: Initializing XFRM netlink socket Oct 2 20:40:29.837985 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.LuMqAz.mount: Deactivated successfully. Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit: BPF prog-id=88 op=LOAD Oct 2 20:40:30.013000 audit[2712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf65cb18 a2=70 a3=0 items=0 ppid=2565 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:30.013000 audit: BPF prog-id=88 op=UNLOAD Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit: BPF prog-id=89 op=LOAD Oct 2 20:40:30.013000 audit[2712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf65cb18 a2=70 a3=4a174c items=0 ppid=2565 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:30.013000 audit: BPF prog-id=89 op=UNLOAD Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffcf65cb48 a2=70 a3=2c1f279f items=0 ppid=2565 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.013000 audit: BPF prog-id=90 op=LOAD Oct 2 20:40:30.013000 audit[2712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffcf65ca98 a2=70 a3=2c1f27b9 items=0 ppid=2565 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:30.018000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.018000 audit[2714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe024c108 a2=70 a3=0 items=0 ppid=2565 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.018000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:40:30.019000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.019000 audit[2714]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe024bfe8 a2=70 a3=2 items=0 ppid=2565 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:40:30.029000 audit: BPF prog-id=90 op=UNLOAD Oct 2 20:40:30.109000 audit[2739]: NETFILTER_CFG table=mangle:82 family=2 entries=19 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:30.109000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd6799180 a2=0 a3=ffff9d48bfa0 items=0 ppid=2565 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.109000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:30.113000 audit[2736]: NETFILTER_CFG table=raw:83 family=2 entries=19 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:30.113000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffd38ce030 a2=0 a3=ffffbefd7fa0 items=0 ppid=2565 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.113000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:30.118000 audit[2737]: NETFILTER_CFG table=nat:84 family=2 entries=16 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:30.118000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffdaadbcb0 a2=0 a3=ffffb275ffa0 items=0 ppid=2565 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:30.125000 audit[2742]: NETFILTER_CFG table=filter:85 family=2 entries=39 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:30.125000 audit[2742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffdc93c370 a2=0 a3=ffff88a24fa0 items=0 ppid=2565 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.125000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:30.328952 kubelet[1941]: I1002 20:40:30.328916 1941 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:40:30.333256 systemd[1]: Created slice kubepods-besteffort-pod6a995ff9_b338_4bb7_850e_2f661bb14ae2.slice. Oct 2 20:40:30.516238 kubelet[1941]: E1002 20:40:30.516204 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:30.520407 kubelet[1941]: I1002 20:40:30.520384 1941 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dznx2\" (UniqueName: \"kubernetes.io/projected/6a995ff9-b338-4bb7-850e-2f661bb14ae2-kube-api-access-dznx2\") pod \"nginx-deployment-5bbcdd876f-grzgg\" (UID: \"6a995ff9-b338-4bb7-850e-2f661bb14ae2\") " pod="default/nginx-deployment-5bbcdd876f-grzgg" Oct 2 20:40:30.636648 env[1381]: time="2023-10-02T20:40:30.636591465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-grzgg,Uid:6a995ff9-b338-4bb7-850e-2f661bb14ae2,Namespace:default,Attempt:0,}" Oct 2 20:40:30.804966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif5cbce4b2e6: link becomes ready Oct 2 20:40:30.811045 systemd-networkd[1513]: calif5cbce4b2e6: Link UP Oct 2 20:40:30.811052 systemd-networkd[1513]: calif5cbce4b2e6: Gained carrier Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.731 [INFO][2748] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0 nginx-deployment-5bbcdd876f- default 6a995ff9-b338-4bb7-850e-2f661bb14ae2 1134 0 2023-10-02 20:40:30 +0000 UTC map[app:nginx pod-template-hash:5bbcdd876f projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.45 nginx-deployment-5bbcdd876f-grzgg eth0 default [] [] [kns.default ksa.default.default] calif5cbce4b2e6 [] []}} ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.731 [INFO][2748] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.761 [INFO][2759] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" HandleID="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Workload="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.775 [INFO][2759] ipam_plugin.go 269: Auto assigning IP ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" HandleID="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Workload="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d2e0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.45", "pod":"nginx-deployment-5bbcdd876f-grzgg", "timestamp":"2023-10-02 20:40:30.761537673 +0000 UTC"}, Hostname:"10.200.20.45", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:40:30.817769 env[1381]: time="2023-10-02T20:40:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:30.817769 env[1381]: time="2023-10-02T20:40:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.775 [INFO][2759] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.45' Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.777 [INFO][2759] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.780 [INFO][2759] ipam.go 372: Looking up existing affinities for host host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.783 [INFO][2759] ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.785 [INFO][2759] ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.786 [INFO][2759] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.786 [INFO][2759] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.788 [INFO][2759] ipam.go 1682: Creating new handle: k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0 Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.791 [INFO][2759] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.795 [INFO][2759] ipam.go 1216: Successfully claimed IPs: [192.168.126.193/26] block=192.168.126.192/26 handle="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.795 [INFO][2759] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.193/26] handle="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" host="10.200.20.45" Oct 2 20:40:30.817769 env[1381]: time="2023-10-02T20:40:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:30.817769 env[1381]: 2023-10-02 20:40:30.795 [INFO][2759] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.126.193/26] IPv6=[] ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" HandleID="k8s-pod-network.05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Workload="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.818287 env[1381]: 2023-10-02 20:40:30.796 [INFO][2748] k8s.go 383: Populated endpoint ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"6a995ff9-b338-4bb7-850e-2f661bb14ae2", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"", Pod:"nginx-deployment-5bbcdd876f-grzgg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif5cbce4b2e6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:30.818287 env[1381]: 2023-10-02 20:40:30.797 [INFO][2748] k8s.go 384: Calico CNI using IPs: [192.168.126.193/32] ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.818287 env[1381]: 2023-10-02 20:40:30.797 [INFO][2748] dataplane_linux.go 68: Setting the host side veth name to calif5cbce4b2e6 ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.818287 env[1381]: 2023-10-02 20:40:30.804 [INFO][2748] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.818287 env[1381]: 2023-10-02 20:40:30.811 [INFO][2748] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"6a995ff9-b338-4bb7-850e-2f661bb14ae2", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0", Pod:"nginx-deployment-5bbcdd876f-grzgg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif5cbce4b2e6", MAC:"9e:0e:8f:b6:b3:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:30.818287 env[1381]: 2023-10-02 20:40:30.816 [INFO][2748] k8s.go 489: Wrote updated endpoint to datastore ContainerID="05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0" Namespace="default" Pod="nginx-deployment-5bbcdd876f-grzgg" WorkloadEndpoint="10.200.20.45-k8s-nginx--deployment--5bbcdd876f--grzgg-eth0" Oct 2 20:40:30.844601 env[1381]: time="2023-10-02T20:40:30.844513635Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:40:30.844601 env[1381]: time="2023-10-02T20:40:30.844559128Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:40:30.844601 env[1381]: time="2023-10-02T20:40:30.844569571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:40:30.845091 env[1381]: time="2023-10-02T20:40:30.845047795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0 pid=2783 runtime=io.containerd.runc.v2 Oct 2 20:40:30.864456 systemd[1]: Started cri-containerd-05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0.scope. Oct 2 20:40:30.874236 systemd-networkd[1513]: vxlan.calico: Link UP Oct 2 20:40:30.874244 systemd-networkd[1513]: vxlan.calico: Gained carrier Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.896000 audit: BPF prog-id=91 op=LOAD Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2783 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616534393064373264366431663838613761653931323165353636 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2783 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616534393064373264366431663838613761653931323165353636 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit: BPF prog-id=92 op=LOAD Oct 2 20:40:30.897000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2783 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616534393064373264366431663838613761653931323165353636 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit: BPF prog-id=93 op=LOAD Oct 2 20:40:30.897000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2783 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616534393064373264366431663838613761653931323165353636 Oct 2 20:40:30.897000 audit: BPF prog-id=93 op=UNLOAD Oct 2 20:40:30.897000 audit: BPF prog-id=92 op=UNLOAD Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:30.897000 audit: BPF prog-id=94 op=LOAD Oct 2 20:40:30.897000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2783 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616534393064373264366431663838613761653931323165353636 Oct 2 20:40:30.901000 audit[2816]: NETFILTER_CFG table=filter:86 family=2 entries=36 op=nft_register_chain pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:30.901000 audit[2816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19876 a0=3 a1=ffffe0f4c6c0 a2=0 a3=ffffb0607fa0 items=0 ppid=2565 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.901000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:30.921980 env[1381]: time="2023-10-02T20:40:30.921926046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-grzgg,Uid:6a995ff9-b338-4bb7-850e-2f661bb14ae2,Namespace:default,Attempt:0,} returns sandbox id \"05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0\"" Oct 2 20:40:30.923846 env[1381]: time="2023-10-02T20:40:30.923813813Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 20:40:31.517274 kubelet[1941]: E1002 20:40:31.517229 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:32.144047 systemd-networkd[1513]: calif5cbce4b2e6: Gained IPv6LL Oct 2 20:40:32.154041 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.dQ23NJ.mount: Deactivated successfully. Oct 2 20:40:32.490157 kubelet[1941]: E1002 20:40:32.490124 1941 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:32.518320 kubelet[1941]: E1002 20:40:32.518292 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:32.847976 systemd-networkd[1513]: vxlan.calico: Gained IPv6LL Oct 2 20:40:33.518619 kubelet[1941]: E1002 20:40:33.518578 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:33.695696 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1154034826.mount: Deactivated successfully. Oct 2 20:40:34.518730 kubelet[1941]: E1002 20:40:34.518684 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:34.709647 env[1381]: time="2023-10-02T20:40:34.709601665Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:34.718111 env[1381]: time="2023-10-02T20:40:34.718064806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a57d753be2d9e69d7787326e21137e5f57448955d7294cea9891e593fc97821,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:34.726899 env[1381]: time="2023-10-02T20:40:34.726396352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:34.732849 env[1381]: time="2023-10-02T20:40:34.732802453Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:34.733647 env[1381]: time="2023-10-02T20:40:34.733613714Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7a57d753be2d9e69d7787326e21137e5f57448955d7294cea9891e593fc97821\"" Oct 2 20:40:34.735699 env[1381]: time="2023-10-02T20:40:34.735662631Z" level=info msg="CreateContainer within sandbox \"05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 20:40:34.769855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4120553093.mount: Deactivated successfully. Oct 2 20:40:34.773179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount564498796.mount: Deactivated successfully. Oct 2 20:40:34.787415 env[1381]: time="2023-10-02T20:40:34.787374453Z" level=info msg="CreateContainer within sandbox \"05ae490d72d6d1f88a7ae9121e5660f5de6ee8b41342feb01985c1a2e2817fe0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"e292dcc469ff0f3c58c5a886cec7c2845b6c7341f9cdbede39f91c84a44f6e64\"" Oct 2 20:40:34.788056 env[1381]: time="2023-10-02T20:40:34.788034712Z" level=info msg="StartContainer for \"e292dcc469ff0f3c58c5a886cec7c2845b6c7341f9cdbede39f91c84a44f6e64\"" Oct 2 20:40:34.811000 systemd[1]: Started cri-containerd-e292dcc469ff0f3c58c5a886cec7c2845b6c7341f9cdbede39f91c84a44f6e64.scope. Oct 2 20:40:34.834323 kernel: kauditd_printk_skb: 189 callbacks suppressed Oct 2 20:40:34.834446 kernel: audit: type=1400 audit(1696279234.828:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.875576 kernel: audit: type=1400 audit(1696279234.828:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.875700 kernel: audit: type=1400 audit(1696279234.828:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.914007 kernel: audit: type=1400 audit(1696279234.828:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.933400 kernel: audit: type=1400 audit(1696279234.828:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.953078 kernel: audit: type=1400 audit(1696279234.828:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.973050 kernel: audit: type=1400 audit(1696279234.828:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.992491 kernel: audit: type=1400 audit(1696279234.828:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:35.011646 kernel: audit: type=1400 audit(1696279234.828:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:35.031542 kernel: audit: type=1400 audit(1696279234.833:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.833000 audit: BPF prog-id=95 op=LOAD Oct 2 20:40:34.854000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.854000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2783 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:34.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532393264636334363966663066336335386335613838366365633763 Oct 2 20:40:34.854000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.854000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2783 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:34.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532393264636334363966663066336335386335613838366365633763 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit: BPF prog-id=96 op=LOAD Oct 2 20:40:34.855000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2783 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:34.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532393264636334363966663066336335386335613838366365633763 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit: BPF prog-id=97 op=LOAD Oct 2 20:40:34.855000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2783 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:34.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532393264636334363966663066336335386335613838366365633763 Oct 2 20:40:34.855000 audit: BPF prog-id=97 op=UNLOAD Oct 2 20:40:34.855000 audit: BPF prog-id=96 op=UNLOAD Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:34.855000 audit: BPF prog-id=98 op=LOAD Oct 2 20:40:34.855000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2783 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:34.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532393264636334363966663066336335386335613838366365633763 Oct 2 20:40:35.043633 env[1381]: time="2023-10-02T20:40:35.043578959Z" level=info msg="StartContainer for \"e292dcc469ff0f3c58c5a886cec7c2845b6c7341f9cdbede39f91c84a44f6e64\" returns successfully" Oct 2 20:40:35.519814 kubelet[1941]: E1002 20:40:35.519783 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:36.520488 kubelet[1941]: E1002 20:40:36.520452 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:37.521077 kubelet[1941]: E1002 20:40:37.521045 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:38.521843 kubelet[1941]: E1002 20:40:38.521805 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:39.522960 kubelet[1941]: E1002 20:40:39.522926 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:40.524096 kubelet[1941]: E1002 20:40:40.524059 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:40.725776 env[1381]: time="2023-10-02T20:40:40.725739761Z" level=info msg="StopPodSandbox for \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\"" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.778 [INFO][2953] k8s.go 576: Cleaning up netns ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.778 [INFO][2953] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" iface="eth0" netns="/var/run/netns/cni-32134fba-75c8-04b2-9a6d-22b005d1ed1e" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.778 [INFO][2953] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" iface="eth0" netns="/var/run/netns/cni-32134fba-75c8-04b2-9a6d-22b005d1ed1e" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.778 [INFO][2953] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" iface="eth0" netns="/var/run/netns/cni-32134fba-75c8-04b2-9a6d-22b005d1ed1e" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.779 [INFO][2953] k8s.go 583: Releasing IP address(es) ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.779 [INFO][2953] utils.go 196: Calico CNI releasing IP address ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.805 [INFO][2959] ipam_plugin.go 416: Releasing address using handleID ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" HandleID="k8s-pod-network.2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Workload="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:40.821418 env[1381]: time="2023-10-02T20:40:40Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:40.821418 env[1381]: time="2023-10-02T20:40:40Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.815 [WARNING][2959] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" HandleID="k8s-pod-network.2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Workload="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.815 [INFO][2959] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" HandleID="k8s-pod-network.2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Workload="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:40.821418 env[1381]: time="2023-10-02T20:40:40Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:40.821418 env[1381]: 2023-10-02 20:40:40.818 [INFO][2953] k8s.go 589: Teardown processing complete. ContainerID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:40:40.821418 env[1381]: time="2023-10-02T20:40:40.820895209Z" level=info msg="TearDown network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\" successfully" Oct 2 20:40:40.821418 env[1381]: time="2023-10-02T20:40:40.820932698Z" level=info msg="StopPodSandbox for \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\" returns successfully" Oct 2 20:40:40.820640 systemd[1]: run-netns-cni\x2d32134fba\x2d75c8\x2d04b2\x2d9a6d\x2d22b005d1ed1e.mount: Deactivated successfully. Oct 2 20:40:40.822558 env[1381]: time="2023-10-02T20:40:40.822525113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rxvj,Uid:fde6eff6-708c-4bff-9f14-54970aa9c292,Namespace:calico-system,Attempt:1,}" Oct 2 20:40:40.997510 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:40:40.997613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali74811521e93: link becomes ready Oct 2 20:40:41.007468 systemd-networkd[1513]: cali74811521e93: Link UP Oct 2 20:40:41.007474 systemd-networkd[1513]: cali74811521e93: Gained carrier Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.918 [INFO][2966] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.45-k8s-csi--node--driver--5rxvj-eth0 csi-node-driver- calico-system fde6eff6-708c-4bff-9f14-54970aa9c292 1172 0 2023-10-02 20:40:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.45 csi-node-driver-5rxvj eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali74811521e93 [] []}} ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.918 [INFO][2966] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.951 [INFO][2976] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" HandleID="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Workload="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.963 [INFO][2976] ipam_plugin.go 269: Auto assigning IP ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" HandleID="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Workload="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004dfc0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.45", "pod":"csi-node-driver-5rxvj", "timestamp":"2023-10-02 20:40:40.950997848 +0000 UTC"}, Hostname:"10.200.20.45", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:40:41.016451 env[1381]: time="2023-10-02T20:40:40Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:41.016451 env[1381]: time="2023-10-02T20:40:40Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.963 [INFO][2976] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.45' Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.965 [INFO][2976] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.968 [INFO][2976] ipam.go 372: Looking up existing affinities for host host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.971 [INFO][2976] ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.972 [INFO][2976] ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.974 [INFO][2976] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.974 [INFO][2976] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.976 [INFO][2976] ipam.go 1682: Creating new handle: k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875 Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.979 [INFO][2976] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.983 [INFO][2976] ipam.go 1216: Successfully claimed IPs: [192.168.126.194/26] block=192.168.126.192/26 handle="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.983 [INFO][2976] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.194/26] handle="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" host="10.200.20.45" Oct 2 20:40:41.016451 env[1381]: time="2023-10-02T20:40:40Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:41.016451 env[1381]: 2023-10-02 20:40:40.983 [INFO][2976] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.126.194/26] IPv6=[] ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" HandleID="k8s-pod-network.b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Workload="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.017105 env[1381]: 2023-10-02 20:40:40.984 [INFO][2966] k8s.go 383: Populated endpoint ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-csi--node--driver--5rxvj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fde6eff6-708c-4bff-9f14-54970aa9c292", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"", Pod:"csi-node-driver-5rxvj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali74811521e93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:41.017105 env[1381]: 2023-10-02 20:40:40.985 [INFO][2966] k8s.go 384: Calico CNI using IPs: [192.168.126.194/32] ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.017105 env[1381]: 2023-10-02 20:40:40.985 [INFO][2966] dataplane_linux.go 68: Setting the host side veth name to cali74811521e93 ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.017105 env[1381]: 2023-10-02 20:40:40.997 [INFO][2966] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.017105 env[1381]: 2023-10-02 20:40:41.008 [INFO][2966] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.45-k8s-csi--node--driver--5rxvj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fde6eff6-708c-4bff-9f14-54970aa9c292", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.45", ContainerID:"b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875", Pod:"csi-node-driver-5rxvj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali74811521e93", MAC:"d6:40:ce:27:d0:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:41.017105 env[1381]: 2023-10-02 20:40:41.015 [INFO][2966] k8s.go 489: Wrote updated endpoint to datastore ContainerID="b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875" Namespace="calico-system" Pod="csi-node-driver-5rxvj" WorkloadEndpoint="10.200.20.45-k8s-csi--node--driver--5rxvj-eth0" Oct 2 20:40:41.035000 audit[2999]: NETFILTER_CFG table=filter:87 family=2 entries=40 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:41.042432 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 2 20:40:41.042548 kernel: audit: type=1325 audit(1696279241.035:746): table=filter:87 family=2 entries=40 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:41.058732 env[1381]: time="2023-10-02T20:40:41.055500761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:40:41.058732 env[1381]: time="2023-10-02T20:40:41.055539050Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:40:41.058732 env[1381]: time="2023-10-02T20:40:41.055548532Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:40:41.058732 env[1381]: time="2023-10-02T20:40:41.055686324Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875 pid=3007 runtime=io.containerd.runc.v2 Oct 2 20:40:41.035000 audit[2999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffc7f32a00 a2=0 a3=ffffab265fa0 items=0 ppid=2565 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.087544 kernel: audit: type=1300 audit(1696279241.035:746): arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffc7f32a00 a2=0 a3=ffffab265fa0 items=0 ppid=2565 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.035000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:41.109430 kernel: audit: type=1327 audit(1696279241.035:746): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:41.113828 systemd[1]: Started cri-containerd-b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875.scope. Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.160670 kernel: audit: type=1400 audit(1696279241.123:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.160768 kernel: audit: type=1400 audit(1696279241.123:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.160794 kernel: audit: type=1400 audit(1696279241.123:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.179222 kernel: audit: type=1400 audit(1696279241.123:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.216221 kernel: audit: type=1400 audit(1696279241.123:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.216297 kernel: audit: type=1400 audit(1696279241.123:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.252479 kernel: audit: type=1400 audit(1696279241.123:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.123000 audit: BPF prog-id=99 op=LOAD Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3007 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336266666462306630623039333437323735626364326531643863 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3007 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336266666462306630623039333437323735626364326531643863 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.125000 audit: BPF prog-id=100 op=LOAD Oct 2 20:40:41.125000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3007 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336266666462306630623039333437323735626364326531643863 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.141000 audit: BPF prog-id=101 op=LOAD Oct 2 20:40:41.141000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3007 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336266666462306630623039333437323735626364326531643863 Oct 2 20:40:41.159000 audit: BPF prog-id=101 op=UNLOAD Oct 2 20:40:41.159000 audit: BPF prog-id=100 op=UNLOAD Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:41.159000 audit: BPF prog-id=102 op=LOAD Oct 2 20:40:41.159000 audit[3016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3007 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336266666462306630623039333437323735626364326531643863 Oct 2 20:40:41.266940 env[1381]: time="2023-10-02T20:40:41.266896077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rxvj,Uid:fde6eff6-708c-4bff-9f14-54970aa9c292,Namespace:calico-system,Attempt:1,} returns sandbox id \"b63bffdb0f0b09347275bcd2e1d8cb700fff3b060344fded1d451c25d6555875\"" Oct 2 20:40:41.268628 env[1381]: time="2023-10-02T20:40:41.268597308Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:41.505727 env[1381]: time="2023-10-02T20:40:41.505675293Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:41.516688 env[1381]: time="2023-10-02T20:40:41.516622731Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:41.517583 kubelet[1941]: E1002 20:40:41.517062 1941 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:41.517583 kubelet[1941]: E1002 20:40:41.517118 1941 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:41.517725 kubelet[1941]: E1002 20:40:41.517230 1941 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-s8fpn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:41.518139 env[1381]: time="2023-10-02T20:40:41.518105072Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:41.524252 kubelet[1941]: E1002 20:40:41.524215 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:41.673524 env[1381]: time="2023-10-02T20:40:41.673457574Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:41.681358 env[1381]: time="2023-10-02T20:40:41.681314222Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:41.682005 kubelet[1941]: E1002 20:40:41.681561 1941 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:41.682005 kubelet[1941]: E1002 20:40:41.681600 1941 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:41.682005 kubelet[1941]: E1002 20:40:41.681681 1941 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-s8fpn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:41.682005 kubelet[1941]: E1002 20:40:41.681734 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:40:41.840015 kubelet[1941]: E1002 20:40:41.839925 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:40:42.142851 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.WG6KsV.mount: Deactivated successfully. Oct 2 20:40:42.525183 kubelet[1941]: E1002 20:40:42.525142 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:42.576060 systemd-networkd[1513]: cali74811521e93: Gained IPv6LL Oct 2 20:40:42.841329 kubelet[1941]: E1002 20:40:42.841225 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:40:43.525664 kubelet[1941]: E1002 20:40:43.525607 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:44.526581 kubelet[1941]: E1002 20:40:44.526542 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:45.527351 kubelet[1941]: E1002 20:40:45.527313 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:46.528167 kubelet[1941]: E1002 20:40:46.528102 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:47.528491 kubelet[1941]: E1002 20:40:47.528453 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:48.529367 kubelet[1941]: E1002 20:40:48.529334 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:49.530651 kubelet[1941]: E1002 20:40:49.530619 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:50.531829 kubelet[1941]: E1002 20:40:50.531797 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:51.532991 kubelet[1941]: E1002 20:40:51.532951 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:52.141231 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.W8cBlW.mount: Deactivated successfully. Oct 2 20:40:52.490231 kubelet[1941]: E1002 20:40:52.490181 1941 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:52.505387 env[1381]: time="2023-10-02T20:40:52.505340638Z" level=info msg="StopPodSandbox for \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\"" Oct 2 20:40:52.534017 kubelet[1941]: E1002 20:40:52.533974 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:53.534786 kubelet[1941]: E1002 20:40:53.534755 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:54.536160 kubelet[1941]: E1002 20:40:54.536123 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:55.537235 kubelet[1941]: E1002 20:40:55.537186 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:55.726087 env[1381]: time="2023-10-02T20:40:55.725905150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:55.897648 env[1381]: time="2023-10-02T20:40:55.897535400Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:55.903990 env[1381]: time="2023-10-02T20:40:55.903946528Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:55.904292 kubelet[1941]: E1002 20:40:55.904259 1941 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:55.904378 kubelet[1941]: E1002 20:40:55.904300 1941 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:55.904413 kubelet[1941]: E1002 20:40:55.904400 1941 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-s8fpn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:55.905142 env[1381]: time="2023-10-02T20:40:55.905109365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:56.071144 env[1381]: time="2023-10-02T20:40:56.071095597Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:56.077014 env[1381]: time="2023-10-02T20:40:56.076970334Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:56.077571 kubelet[1941]: E1002 20:40:56.077305 1941 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:56.077571 kubelet[1941]: E1002 20:40:56.077353 1941 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:56.077571 kubelet[1941]: E1002 20:40:56.077483 1941 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-s8fpn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:56.077571 kubelet[1941]: E1002 20:40:56.077552 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:40:56.166739 kubelet[1941]: E1002 20:40:56.166697 1941 controller.go:187] failed to update lease, error: Put "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:40:56.540110 kubelet[1941]: E1002 20:40:56.537771 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:56.588521 kubelet[1941]: E1002 20:40:56.588458 1941 controller.go:187] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.37:38070->10.200.20.16:2379: read: connection timed out Oct 2 20:40:57.538128 kubelet[1941]: E1002 20:40:57.538049 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:58.538777 kubelet[1941]: E1002 20:40:58.538745 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:59.539919 kubelet[1941]: E1002 20:40:59.539884 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:00.540629 kubelet[1941]: E1002 20:41:00.540597 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:01.541569 kubelet[1941]: E1002 20:41:01.541529 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:02.143756 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.wlvhFQ.mount: Deactivated successfully. Oct 2 20:41:02.542793 kubelet[1941]: E1002 20:41:02.542761 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:02.926216 kubelet[1941]: E1002 20:41:02.926184 1941 kubelet_node_status.go:460] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:56Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:56Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:56Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:56Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001\\\",\\\"ghcr.io/flatcar/calico/node:v3.25.0\\\"],\\\"sizeBytes\\\":82231285},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35\\\",\\\"ghcr.io/flatcar/calico/cni:v3.25.0\\\"],\\\"sizeBytes\\\":81110848},{\\\"names\\\":[\\\"ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf\\\",\\\"ghcr.io/flatcar/nginx:latest\\\"],\\\"sizeBytes\\\":55605639},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326\\\",\\\"registry.k8s.io/kube-proxy:v1.25.14\\\"],\\\"sizeBytes\\\":18278766},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\\\"],\\\"sizeBytes\\\":5379891},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":253553}]}}\" for node \"10.200.20.45\": rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.37:37978->10.200.20.16:2379: read: connection timed out" Oct 2 20:41:03.543872 kubelet[1941]: E1002 20:41:03.543828 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:04.544123 kubelet[1941]: E1002 20:41:04.544086 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:05.544225 kubelet[1941]: E1002 20:41:05.544182 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:06.544641 kubelet[1941]: E1002 20:41:06.544613 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:06.589318 kubelet[1941]: E1002 20:41:06.589278 1941 controller.go:187] failed to update lease, error: Put "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:07.545151 kubelet[1941]: E1002 20:41:07.545110 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:08.546477 kubelet[1941]: E1002 20:41:08.546439 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:08.727483 kubelet[1941]: E1002 20:41:08.727445 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:41:09.546751 kubelet[1941]: E1002 20:41:09.546718 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:10.547615 kubelet[1941]: E1002 20:41:10.547578 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:11.548266 kubelet[1941]: E1002 20:41:11.548236 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:12.141592 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.mmfLjR.mount: Deactivated successfully. Oct 2 20:41:12.489685 kubelet[1941]: E1002 20:41:12.489654 1941 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:12.548844 kubelet[1941]: E1002 20:41:12.548823 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:12.927024 kubelet[1941]: E1002 20:41:12.926999 1941 kubelet_node_status.go:460] "Error updating node status, will retry" err="error getting node \"10.200.20.45\": Get \"https://10.200.20.37:6443/api/v1/nodes/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:13.549641 kubelet[1941]: E1002 20:41:13.549597 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:14.550123 kubelet[1941]: E1002 20:41:14.550090 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:15.551204 kubelet[1941]: E1002 20:41:15.551167 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:16.551311 kubelet[1941]: E1002 20:41:16.551262 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:16.589489 kubelet[1941]: E1002 20:41:16.589460 1941 controller.go:187] failed to update lease, error: Put "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:17.551465 kubelet[1941]: E1002 20:41:17.551416 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:18.551886 kubelet[1941]: E1002 20:41:18.551829 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:19.552147 kubelet[1941]: E1002 20:41:19.552118 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:20.553134 kubelet[1941]: E1002 20:41:20.553097 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:21.554119 kubelet[1941]: E1002 20:41:21.554077 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:22.141990 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.ZC9TU0.mount: Deactivated successfully. Oct 2 20:41:22.554951 kubelet[1941]: E1002 20:41:22.554923 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:22.726996 env[1381]: time="2023-10-02T20:41:22.726950829Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:41:22.927706 kubelet[1941]: E1002 20:41:22.927679 1941 kubelet_node_status.go:460] "Error updating node status, will retry" err="error getting node \"10.200.20.45\": Get \"https://10.200.20.37:6443/api/v1/nodes/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:22.945122 env[1381]: time="2023-10-02T20:41:22.945040666Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:22.949665 env[1381]: time="2023-10-02T20:41:22.949607357Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:22.949896 kubelet[1941]: E1002 20:41:22.949876 1941 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:41:22.950019 kubelet[1941]: E1002 20:41:22.950010 1941 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:41:22.950195 kubelet[1941]: E1002 20:41:22.950181 1941 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-s8fpn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:22.951022 env[1381]: time="2023-10-02T20:41:22.950992067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:41:23.099814 env[1381]: time="2023-10-02T20:41:23.099760347Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:23.106711 env[1381]: time="2023-10-02T20:41:23.106671721Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:23.106910 kubelet[1941]: E1002 20:41:23.106891 1941 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:41:23.107025 kubelet[1941]: E1002 20:41:23.107016 1941 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:41:23.107199 kubelet[1941]: E1002 20:41:23.107186 1941 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-s8fpn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-5rxvj_calico-system(fde6eff6-708c-4bff-9f14-54970aa9c292): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:23.107403 kubelet[1941]: E1002 20:41:23.107378 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:41:23.555813 kubelet[1941]: E1002 20:41:23.555789 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:24.557114 kubelet[1941]: E1002 20:41:24.557085 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:25.558282 kubelet[1941]: E1002 20:41:25.558248 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:26.559213 kubelet[1941]: E1002 20:41:26.559182 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:26.589772 kubelet[1941]: E1002 20:41:26.589744 1941 controller.go:187] failed to update lease, error: Put "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:26.589906 kubelet[1941]: I1002 20:41:26.589896 1941 controller.go:114] failed to update lease using latest lease, fallback to ensure lease, err: failed 5 attempts to update lease Oct 2 20:41:27.560410 kubelet[1941]: E1002 20:41:27.560367 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:28.561486 kubelet[1941]: E1002 20:41:28.561451 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:29.562441 kubelet[1941]: E1002 20:41:29.562406 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:30.563374 kubelet[1941]: E1002 20:41:30.563343 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:31.564190 kubelet[1941]: E1002 20:41:31.564158 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:32.142763 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.z4oA4V.mount: Deactivated successfully. Oct 2 20:41:32.489600 kubelet[1941]: E1002 20:41:32.489559 1941 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:32.564927 kubelet[1941]: E1002 20:41:32.564898 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:32.928197 kubelet[1941]: E1002 20:41:32.928173 1941 kubelet_node_status.go:460] "Error updating node status, will retry" err="error getting node \"10.200.20.45\": Get \"https://10.200.20.37:6443/api/v1/nodes/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:33.565474 kubelet[1941]: E1002 20:41:33.565444 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:33.726110 kubelet[1941]: E1002 20:41:33.726089 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:41:34.566911 kubelet[1941]: E1002 20:41:34.566848 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:35.567411 kubelet[1941]: E1002 20:41:35.567378 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:36.568963 kubelet[1941]: E1002 20:41:36.568931 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:36.590706 kubelet[1941]: E1002 20:41:36.590669 1941 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:37.570267 kubelet[1941]: E1002 20:41:37.570235 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:37.581173 env[1381]: time="2023-10-02T20:41:37.581122172Z" level=error msg="StopPodSandbox for \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\" failed" error="failed to destroy network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": http2: client connection lost" Oct 2 20:41:37.581661 kubelet[1941]: E1002 20:41:37.581644 1941 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": http2: client connection lost" podSandboxID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:41:37.581797 kubelet[1941]: E1002 20:41:37.581787 1941 kuberuntime_gc.go:176] "Failed to stop sandbox before removing" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": http2: client connection lost" sandboxID="2645e0c7558e017b212f073703b0d54da87ad7a6e61d5caf36ab1c802dc6392f" Oct 2 20:41:38.570789 kubelet[1941]: E1002 20:41:38.570692 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:39.571037 kubelet[1941]: E1002 20:41:39.571003 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:40.571312 kubelet[1941]: E1002 20:41:40.571278 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:41.571585 kubelet[1941]: E1002 20:41:41.571553 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:42.144002 systemd[1]: run-containerd-runc-k8s.io-f503b71bf336df301cc89520f7a5efe04c9fcc77f803b40d8c317611f5a03e0f-runc.MzsJz8.mount: Deactivated successfully. Oct 2 20:41:42.572465 kubelet[1941]: E1002 20:41:42.572433 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:42.929555 kubelet[1941]: E1002 20:41:42.929519 1941 kubelet_node_status.go:460] "Error updating node status, will retry" err="error getting node \"10.200.20.45\": Get \"https://10.200.20.37:6443/api/v1/nodes/10.200.20.45?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:42.929720 kubelet[1941]: E1002 20:41:42.929708 1941 kubelet_node_status.go:447] "Unable to update node status" err="update node status exceeds retry count" Oct 2 20:41:43.573251 kubelet[1941]: E1002 20:41:43.573197 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:44.573405 kubelet[1941]: E1002 20:41:44.573347 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:45.574040 kubelet[1941]: E1002 20:41:45.574005 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:46.574600 kubelet[1941]: E1002 20:41:46.574553 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:46.726940 kubelet[1941]: E1002 20:41:46.726917 1941 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-5rxvj" podUID=fde6eff6-708c-4bff-9f14-54970aa9c292 Oct 2 20:41:46.791807 kubelet[1941]: E1002 20:41:46.791774 1941 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.45?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:47.575025 kubelet[1941]: E1002 20:41:47.574995 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:48.576346 kubelet[1941]: E1002 20:41:48.576312 1941 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"