Oct 2 20:38:29.111066 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 2 20:38:29.111085 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 20:38:29.111093 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Oct 2 20:38:29.111100 kernel: printk: bootconsole [pl11] enabled Oct 2 20:38:29.111104 kernel: efi: EFI v2.70 by EDK II Oct 2 20:38:29.111110 kernel: efi: ACPI 2.0=0x3fd8d018 SMBIOS=0x3fd6a000 SMBIOS 3.0=0x3fd68000 MEMATTR=0x3ef3f098 RNG=0x3fd8d998 MEMRESERVE=0x37eb7f98 Oct 2 20:38:29.111117 kernel: random: crng init done Oct 2 20:38:29.111122 kernel: ACPI: Early table checksum verification disabled Oct 2 20:38:29.111127 kernel: ACPI: RSDP 0x000000003FD8D018 000024 (v02 VRTUAL) Oct 2 20:38:29.111133 kernel: ACPI: XSDT 0x000000003FD8DF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111138 kernel: ACPI: FACP 0x000000003FD8DC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111145 kernel: ACPI: DSDT 0x000000003EBD6018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 20:38:29.111150 kernel: ACPI: DBG2 0x000000003FD8DB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111156 kernel: ACPI: GTDT 0x000000003FD8DD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111162 kernel: ACPI: OEM0 0x000000003FD8D098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111168 kernel: ACPI: SPCR 0x000000003FD8DA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111174 kernel: ACPI: APIC 0x000000003FD8D818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111181 kernel: ACPI: SRAT 0x000000003FD8D198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111187 kernel: ACPI: PPTT 0x000000003FD8D418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Oct 2 20:38:29.111193 kernel: ACPI: BGRT 0x000000003FD8DE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:38:29.111199 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Oct 2 20:38:29.111204 kernel: NUMA: Failed to initialise from firmware Oct 2 20:38:29.111210 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:38:29.111216 kernel: NUMA: NODE_DATA [mem 0x1bf7f0900-0x1bf7f5fff] Oct 2 20:38:29.111222 kernel: Zone ranges: Oct 2 20:38:29.111227 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Oct 2 20:38:29.111233 kernel: DMA32 empty Oct 2 20:38:29.111240 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:38:29.111245 kernel: Movable zone start for each node Oct 2 20:38:29.111251 kernel: Early memory node ranges Oct 2 20:38:29.111257 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Oct 2 20:38:29.111262 kernel: node 0: [mem 0x0000000000824000-0x000000003ec84fff] Oct 2 20:38:29.111268 kernel: node 0: [mem 0x000000003ec85000-0x000000003ecadfff] Oct 2 20:38:29.111274 kernel: node 0: [mem 0x000000003ecae000-0x000000003fd2dfff] Oct 2 20:38:29.111279 kernel: node 0: [mem 0x000000003fd2e000-0x000000003fd81fff] Oct 2 20:38:29.111285 kernel: node 0: [mem 0x000000003fd82000-0x000000003fd8dfff] Oct 2 20:38:29.111291 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fd91fff] Oct 2 20:38:29.111296 kernel: node 0: [mem 0x000000003fd92000-0x000000003fffffff] Oct 2 20:38:29.111302 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:38:29.111309 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:38:29.111318 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Oct 2 20:38:29.111324 kernel: psci: probing for conduit method from ACPI. Oct 2 20:38:29.111330 kernel: psci: PSCIv1.1 detected in firmware. Oct 2 20:38:29.111336 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 20:38:29.111343 kernel: psci: MIGRATE_INFO_TYPE not supported. Oct 2 20:38:29.111349 kernel: psci: SMC Calling Convention v1.4 Oct 2 20:38:29.111355 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Oct 2 20:38:29.111361 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Oct 2 20:38:29.111367 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 20:38:29.111373 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 20:38:29.111379 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 20:38:29.111385 kernel: Detected PIPT I-cache on CPU0 Oct 2 20:38:29.111391 kernel: CPU features: detected: GIC system register CPU interface Oct 2 20:38:29.111397 kernel: CPU features: detected: Hardware dirty bit management Oct 2 20:38:29.111403 kernel: CPU features: detected: Spectre-BHB Oct 2 20:38:29.111409 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 20:38:29.111416 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 20:38:29.111422 kernel: CPU features: detected: ARM erratum 1418040 Oct 2 20:38:29.111428 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Oct 2 20:38:29.111434 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Oct 2 20:38:29.111440 kernel: Policy zone: Normal Oct 2 20:38:29.111448 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:38:29.111454 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 20:38:29.111460 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 20:38:29.111467 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:38:29.111473 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 20:38:29.111480 kernel: software IO TLB: mapped [mem 0x000000003abd6000-0x000000003ebd6000] (64MB) Oct 2 20:38:29.111486 kernel: Memory: 3992056K/4194160K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 202104K reserved, 0K cma-reserved) Oct 2 20:38:29.111493 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 20:38:29.111499 kernel: trace event string verifier disabled Oct 2 20:38:29.111505 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 20:38:29.111511 kernel: rcu: RCU event tracing is enabled. Oct 2 20:38:29.111517 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 20:38:29.111524 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 20:38:29.111530 kernel: Tracing variant of Tasks RCU enabled. Oct 2 20:38:29.111536 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 20:38:29.111542 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 20:38:29.111549 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 20:38:29.111555 kernel: GICv3: 960 SPIs implemented Oct 2 20:38:29.111561 kernel: GICv3: 0 Extended SPIs implemented Oct 2 20:38:29.111567 kernel: GICv3: Distributor has no Range Selector support Oct 2 20:38:29.111573 kernel: Root IRQ handler: gic_handle_irq Oct 2 20:38:29.111579 kernel: GICv3: 16 PPIs implemented Oct 2 20:38:29.111585 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Oct 2 20:38:29.111591 kernel: ITS: No ITS available, not enabling LPIs Oct 2 20:38:29.111597 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:38:29.111603 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 2 20:38:29.111610 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 2 20:38:29.111616 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 2 20:38:29.111623 kernel: Console: colour dummy device 80x25 Oct 2 20:38:29.111629 kernel: printk: console [tty1] enabled Oct 2 20:38:29.111636 kernel: ACPI: Core revision 20210730 Oct 2 20:38:29.111642 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 2 20:38:29.111649 kernel: pid_max: default: 32768 minimum: 301 Oct 2 20:38:29.111655 kernel: LSM: Security Framework initializing Oct 2 20:38:29.111661 kernel: SELinux: Initializing. Oct 2 20:38:29.111667 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:38:29.111674 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:38:29.111681 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Oct 2 20:38:29.111688 kernel: Hyper-V: Host Build 10.0.22477.1341-1-0 Oct 2 20:38:29.111694 kernel: rcu: Hierarchical SRCU implementation. Oct 2 20:38:29.111700 kernel: Remapping and enabling EFI services. Oct 2 20:38:29.111706 kernel: smp: Bringing up secondary CPUs ... Oct 2 20:38:29.111712 kernel: Detected PIPT I-cache on CPU1 Oct 2 20:38:29.111718 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Oct 2 20:38:29.111725 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:38:29.111731 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 2 20:38:29.111738 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 20:38:29.111744 kernel: SMP: Total of 2 processors activated. Oct 2 20:38:29.111750 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 20:38:29.111757 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Oct 2 20:38:29.111763 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 2 20:38:29.111769 kernel: CPU features: detected: CRC32 instructions Oct 2 20:38:29.111776 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 2 20:38:29.111782 kernel: CPU features: detected: LSE atomic instructions Oct 2 20:38:29.111788 kernel: CPU features: detected: Privileged Access Never Oct 2 20:38:29.111796 kernel: CPU: All CPU(s) started at EL1 Oct 2 20:38:29.111802 kernel: alternatives: patching kernel code Oct 2 20:38:29.111812 kernel: devtmpfs: initialized Oct 2 20:38:29.111819 kernel: KASLR enabled Oct 2 20:38:29.111826 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 20:38:29.111833 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 20:38:29.111839 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 20:38:29.111845 kernel: SMBIOS 3.1.0 present. Oct 2 20:38:29.111852 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/16/2022 Oct 2 20:38:29.111859 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 20:38:29.111866 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 20:38:29.111873 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 20:38:29.111880 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 20:38:29.111886 kernel: audit: initializing netlink subsys (disabled) Oct 2 20:38:29.111893 kernel: audit: type=2000 audit(0.095:1): state=initialized audit_enabled=0 res=1 Oct 2 20:38:29.111899 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 20:38:29.111906 kernel: cpuidle: using governor menu Oct 2 20:38:29.111914 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 20:38:29.111920 kernel: ASID allocator initialised with 32768 entries Oct 2 20:38:29.111927 kernel: ACPI: bus type PCI registered Oct 2 20:38:29.111933 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 20:38:29.111940 kernel: Serial: AMBA PL011 UART driver Oct 2 20:38:29.111946 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 20:38:29.111953 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 20:38:29.111959 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 20:38:29.111966 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 20:38:29.111974 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 20:38:29.111980 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 20:38:29.111987 kernel: ACPI: Added _OSI(Module Device) Oct 2 20:38:29.111993 kernel: ACPI: Added _OSI(Processor Device) Oct 2 20:38:29.111999 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 20:38:29.112006 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 20:38:29.112012 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 20:38:29.112019 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 20:38:29.112025 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 20:38:29.115102 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 20:38:29.115115 kernel: ACPI: Interpreter enabled Oct 2 20:38:29.115122 kernel: ACPI: Using GIC for interrupt routing Oct 2 20:38:29.115129 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Oct 2 20:38:29.115136 kernel: printk: console [ttyAMA0] enabled Oct 2 20:38:29.115142 kernel: printk: bootconsole [pl11] disabled Oct 2 20:38:29.115149 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Oct 2 20:38:29.115156 kernel: iommu: Default domain type: Translated Oct 2 20:38:29.115163 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 20:38:29.115172 kernel: vgaarb: loaded Oct 2 20:38:29.115179 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 20:38:29.115185 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 20:38:29.115192 kernel: PTP clock support registered Oct 2 20:38:29.115199 kernel: Registered efivars operations Oct 2 20:38:29.115205 kernel: No ACPI PMU IRQ for CPU0 Oct 2 20:38:29.115212 kernel: No ACPI PMU IRQ for CPU1 Oct 2 20:38:29.115218 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 20:38:29.115225 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 20:38:29.115233 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 20:38:29.115240 kernel: pnp: PnP ACPI init Oct 2 20:38:29.115246 kernel: pnp: PnP ACPI: found 0 devices Oct 2 20:38:29.115253 kernel: NET: Registered PF_INET protocol family Oct 2 20:38:29.115259 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:38:29.115266 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 20:38:29.115273 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 20:38:29.115280 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 20:38:29.115287 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 20:38:29.115294 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 20:38:29.115301 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:38:29.115308 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:38:29.115314 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 20:38:29.115321 kernel: PCI: CLS 0 bytes, default 64 Oct 2 20:38:29.115328 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Oct 2 20:38:29.115334 kernel: kvm [1]: HYP mode not available Oct 2 20:38:29.115341 kernel: Initialise system trusted keyrings Oct 2 20:38:29.115348 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 20:38:29.115356 kernel: Key type asymmetric registered Oct 2 20:38:29.115362 kernel: Asymmetric key parser 'x509' registered Oct 2 20:38:29.115369 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 20:38:29.115376 kernel: io scheduler mq-deadline registered Oct 2 20:38:29.115382 kernel: io scheduler kyber registered Oct 2 20:38:29.115389 kernel: io scheduler bfq registered Oct 2 20:38:29.115396 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 20:38:29.115402 kernel: thunder_xcv, ver 1.0 Oct 2 20:38:29.115409 kernel: thunder_bgx, ver 1.0 Oct 2 20:38:29.115416 kernel: nicpf, ver 1.0 Oct 2 20:38:29.115423 kernel: nicvf, ver 1.0 Oct 2 20:38:29.115603 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 20:38:29.115668 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T20:38:28 UTC (1696279108) Oct 2 20:38:29.115677 kernel: efifb: probing for efifb Oct 2 20:38:29.115684 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 20:38:29.115691 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 20:38:29.115697 kernel: efifb: scrolling: redraw Oct 2 20:38:29.115706 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 20:38:29.115713 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:38:29.115720 kernel: fb0: EFI VGA frame buffer device Oct 2 20:38:29.115727 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Oct 2 20:38:29.115734 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 20:38:29.115741 kernel: NET: Registered PF_INET6 protocol family Oct 2 20:38:29.115747 kernel: Segment Routing with IPv6 Oct 2 20:38:29.115754 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 20:38:29.115760 kernel: NET: Registered PF_PACKET protocol family Oct 2 20:38:29.115768 kernel: Key type dns_resolver registered Oct 2 20:38:29.115774 kernel: registered taskstats version 1 Oct 2 20:38:29.115781 kernel: Loading compiled-in X.509 certificates Oct 2 20:38:29.115788 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 20:38:29.115794 kernel: Key type .fscrypt registered Oct 2 20:38:29.115801 kernel: Key type fscrypt-provisioning registered Oct 2 20:38:29.115808 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 20:38:29.115814 kernel: ima: Allocated hash algorithm: sha1 Oct 2 20:38:29.115821 kernel: ima: No architecture policies found Oct 2 20:38:29.115829 kernel: Freeing unused kernel memory: 34560K Oct 2 20:38:29.115835 kernel: Run /init as init process Oct 2 20:38:29.115842 kernel: with arguments: Oct 2 20:38:29.115849 kernel: /init Oct 2 20:38:29.115855 kernel: with environment: Oct 2 20:38:29.115861 kernel: HOME=/ Oct 2 20:38:29.115868 kernel: TERM=linux Oct 2 20:38:29.115874 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 20:38:29.115883 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:38:29.115893 systemd[1]: Detected virtualization microsoft. Oct 2 20:38:29.115900 systemd[1]: Detected architecture arm64. Oct 2 20:38:29.115907 systemd[1]: Running in initrd. Oct 2 20:38:29.115913 systemd[1]: No hostname configured, using default hostname. Oct 2 20:38:29.115920 systemd[1]: Hostname set to . Oct 2 20:38:29.115928 systemd[1]: Initializing machine ID from random generator. Oct 2 20:38:29.115935 systemd[1]: Queued start job for default target initrd.target. Oct 2 20:38:29.115943 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:38:29.115950 systemd[1]: Reached target cryptsetup.target. Oct 2 20:38:29.115957 systemd[1]: Reached target paths.target. Oct 2 20:38:29.115964 systemd[1]: Reached target slices.target. Oct 2 20:38:29.115971 systemd[1]: Reached target swap.target. Oct 2 20:38:29.115978 systemd[1]: Reached target timers.target. Oct 2 20:38:29.115985 systemd[1]: Listening on iscsid.socket. Oct 2 20:38:29.115992 systemd[1]: Listening on iscsiuio.socket. Oct 2 20:38:29.116000 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 20:38:29.116007 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 20:38:29.116014 systemd[1]: Listening on systemd-journald.socket. Oct 2 20:38:29.116021 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:38:29.116048 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:38:29.116057 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:38:29.116064 systemd[1]: Reached target sockets.target. Oct 2 20:38:29.116071 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:38:29.116078 systemd[1]: Finished network-cleanup.service. Oct 2 20:38:29.116087 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 20:38:29.116094 systemd[1]: Starting systemd-journald.service... Oct 2 20:38:29.116101 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:38:29.116108 systemd[1]: Starting systemd-resolved.service... Oct 2 20:38:29.116115 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 20:38:29.116127 systemd-journald[276]: Journal started Oct 2 20:38:29.116169 systemd-journald[276]: Runtime Journal (/run/log/journal/6dcc6153dcd044008724f2a01be28d6a) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:38:29.095115 systemd-modules-load[277]: Inserted module 'overlay' Oct 2 20:38:29.132590 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 20:38:29.140742 systemd-modules-load[277]: Inserted module 'br_netfilter' Oct 2 20:38:29.158375 kernel: Bridge firewalling registered Oct 2 20:38:29.158400 systemd[1]: Started systemd-journald.service. Oct 2 20:38:29.162569 systemd-resolved[278]: Positive Trust Anchors: Oct 2 20:38:29.193075 kernel: SCSI subsystem initialized Oct 2 20:38:29.193099 kernel: audit: type=1130 audit(1696279109.169:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.162583 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:38:29.238912 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 20:38:29.238940 kernel: audit: type=1130 audit(1696279109.206:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.238951 kernel: device-mapper: uevent: version 1.0.3 Oct 2 20:38:29.238959 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 20:38:29.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.162613 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:38:29.169719 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:38:29.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.178382 systemd-resolved[278]: Defaulting to hostname 'linux'. Oct 2 20:38:29.206926 systemd[1]: Started systemd-resolved.service. Oct 2 20:38:29.282433 systemd-modules-load[277]: Inserted module 'dm_multipath' Oct 2 20:38:29.359084 kernel: audit: type=1130 audit(1696279109.287:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.359107 kernel: audit: type=1130 audit(1696279109.321:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.311597 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 20:38:29.321698 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:38:29.424601 kernel: audit: type=1130 audit(1696279109.352:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.424624 kernel: audit: type=1130 audit(1696279109.364:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.352481 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 20:38:29.365191 systemd[1]: Reached target nss-lookup.target. Oct 2 20:38:29.407428 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 20:38:29.435346 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:38:29.449767 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:38:29.474344 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:38:29.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.520954 kernel: audit: type=1130 audit(1696279109.483:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.515405 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:38:29.543428 kernel: audit: type=1130 audit(1696279109.520:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.544357 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 20:38:29.576341 kernel: audit: type=1130 audit(1696279109.549:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.573795 systemd[1]: Starting dracut-cmdline.service... Oct 2 20:38:29.590650 dracut-cmdline[299]: dracut-dracut-053 Oct 2 20:38:29.595522 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:38:29.723059 kernel: Loading iSCSI transport class v2.0-870. Oct 2 20:38:29.735054 kernel: iscsi: registered transport (tcp) Oct 2 20:38:29.756410 kernel: iscsi: registered transport (qla4xxx) Oct 2 20:38:29.756429 kernel: QLogic iSCSI HBA Driver Oct 2 20:38:29.835314 systemd[1]: Finished dracut-cmdline.service. Oct 2 20:38:29.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:29.842546 systemd[1]: Starting dracut-pre-udev.service... Oct 2 20:38:29.910051 kernel: raid6: neonx8 gen() 13823 MB/s Oct 2 20:38:29.930042 kernel: raid6: neonx8 xor() 10842 MB/s Oct 2 20:38:29.951049 kernel: raid6: neonx4 gen() 13558 MB/s Oct 2 20:38:29.972042 kernel: raid6: neonx4 xor() 11158 MB/s Oct 2 20:38:29.992043 kernel: raid6: neonx2 gen() 12960 MB/s Oct 2 20:38:30.012045 kernel: raid6: neonx2 xor() 10260 MB/s Oct 2 20:38:30.034042 kernel: raid6: neonx1 gen() 10489 MB/s Oct 2 20:38:30.055039 kernel: raid6: neonx1 xor() 8780 MB/s Oct 2 20:38:30.075046 kernel: raid6: int64x8 gen() 6298 MB/s Oct 2 20:38:30.096044 kernel: raid6: int64x8 xor() 3547 MB/s Oct 2 20:38:30.117040 kernel: raid6: int64x4 gen() 7258 MB/s Oct 2 20:38:30.138042 kernel: raid6: int64x4 xor() 3848 MB/s Oct 2 20:38:30.161041 kernel: raid6: int64x2 gen() 6139 MB/s Oct 2 20:38:30.182040 kernel: raid6: int64x2 xor() 3320 MB/s Oct 2 20:38:30.204041 kernel: raid6: int64x1 gen() 5040 MB/s Oct 2 20:38:30.228373 kernel: raid6: int64x1 xor() 2645 MB/s Oct 2 20:38:30.228383 kernel: raid6: using algorithm neonx8 gen() 13823 MB/s Oct 2 20:38:30.228392 kernel: raid6: .... xor() 10842 MB/s, rmw enabled Oct 2 20:38:30.232935 kernel: raid6: using neon recovery algorithm Oct 2 20:38:30.257787 kernel: xor: measuring software checksum speed Oct 2 20:38:30.257800 kernel: 8regs : 17289 MB/sec Oct 2 20:38:30.266528 kernel: 32regs : 20728 MB/sec Oct 2 20:38:30.266540 kernel: arm64_neon : 27788 MB/sec Oct 2 20:38:30.266549 kernel: xor: using function: arm64_neon (27788 MB/sec) Oct 2 20:38:30.329055 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 20:38:30.352593 systemd[1]: Finished dracut-pre-udev.service. Oct 2 20:38:30.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:30.363000 audit: BPF prog-id=7 op=LOAD Oct 2 20:38:30.363000 audit: BPF prog-id=8 op=LOAD Oct 2 20:38:30.364377 systemd[1]: Starting systemd-udevd.service... Oct 2 20:38:30.387328 systemd-udevd[475]: Using default interface naming scheme 'v252'. Oct 2 20:38:30.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:30.395164 systemd[1]: Started systemd-udevd.service. Oct 2 20:38:30.406455 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 20:38:30.439517 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Oct 2 20:38:30.498281 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 20:38:30.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:30.505260 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:38:30.552302 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:38:30.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:30.622312 kernel: hv_vmbus: Vmbus version:5.3 Oct 2 20:38:30.640056 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 20:38:30.640109 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 20:38:30.677047 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 20:38:30.677101 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 20:38:30.677111 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 20:38:30.677129 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 20:38:30.692870 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 20:38:30.692930 kernel: scsi host1: storvsc_host_t Oct 2 20:38:30.705920 kernel: scsi host0: storvsc_host_t Oct 2 20:38:30.706174 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 20:38:30.715058 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 20:38:30.742687 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 20:38:30.742980 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 20:38:30.744057 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 20:38:30.758949 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 20:38:30.759178 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 20:38:30.759269 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 20:38:30.773200 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 20:38:30.773400 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 20:38:30.783056 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:30.789063 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 20:38:30.828985 kernel: hv_netvsc 00224879-bd0f-0022-4879-bd0f00224879 eth0: VF slot 1 added Oct 2 20:38:30.837057 kernel: hv_vmbus: registering driver hv_pci Oct 2 20:38:30.845048 kernel: hv_pci a8c215af-239a-4acf-ad85-f0b8b33fa48c: PCI VMBus probing: Using version 0x10004 Oct 2 20:38:30.861620 kernel: hv_pci a8c215af-239a-4acf-ad85-f0b8b33fa48c: PCI host bridge to bus 239a:00 Oct 2 20:38:30.861793 kernel: pci_bus 239a:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Oct 2 20:38:30.868478 kernel: pci_bus 239a:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 20:38:30.876673 kernel: pci 239a:00:02.0: [15b3:1018] type 00 class 0x020000 Oct 2 20:38:30.890172 kernel: pci 239a:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:38:30.912098 kernel: pci 239a:00:02.0: enabling Extended Tags Oct 2 20:38:31.131443 kernel: pci 239a:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 239a:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Oct 2 20:38:31.150419 kernel: pci_bus 239a:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 20:38:31.150652 kernel: pci 239a:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:38:31.193061 kernel: mlx5_core 239a:00:02.0: firmware version: 16.31.2424 Oct 2 20:38:31.252065 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (531) Oct 2 20:38:31.265345 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 20:38:31.320561 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:38:31.362707 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 20:38:31.386423 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 20:38:31.399906 kernel: mlx5_core 239a:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Oct 2 20:38:31.398309 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 20:38:31.406386 systemd[1]: Starting disk-uuid.service... Oct 2 20:38:31.435072 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:31.447068 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:31.566082 kernel: hv_netvsc 00224879-bd0f-0022-4879-bd0f00224879 eth0: VF registering: eth1 Oct 2 20:38:31.566259 kernel: mlx5_core 239a:00:02.0 eth1: joined to eth0 Oct 2 20:38:31.590109 kernel: mlx5_core 239a:00:02.0 enP9114s1: renamed from eth1 Oct 2 20:38:32.456705 disk-uuid[600]: The operation has completed successfully. Oct 2 20:38:32.468447 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:38:32.539657 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 20:38:32.543224 systemd[1]: Finished disk-uuid.service. Oct 2 20:38:32.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.555045 systemd[1]: Starting verity-setup.service... Oct 2 20:38:32.602154 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 20:38:32.676131 systemd[1]: Found device dev-mapper-usr.device. Oct 2 20:38:32.683634 systemd[1]: Mounting sysusr-usr.mount... Oct 2 20:38:32.702483 systemd[1]: Finished verity-setup.service. Oct 2 20:38:32.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.769051 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 20:38:32.769804 systemd[1]: Mounted sysusr-usr.mount. Oct 2 20:38:32.774734 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 20:38:32.775593 systemd[1]: Starting ignition-setup.service... Oct 2 20:38:32.787541 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 20:38:32.836746 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:38:32.836789 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:38:32.842955 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:38:32.893152 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 20:38:32.950805 systemd[1]: Finished ignition-setup.service. Oct 2 20:38:32.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:32.961437 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 20:38:33.060983 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 20:38:33.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.083531 kernel: kauditd_printk_skb: 11 callbacks suppressed Oct 2 20:38:33.083577 kernel: audit: type=1130 audit(1696279113.067:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.080549 systemd[1]: Starting systemd-networkd.service... Oct 2 20:38:33.119948 kernel: audit: type=1334 audit(1696279113.079:23): prog-id=9 op=LOAD Oct 2 20:38:33.079000 audit: BPF prog-id=9 op=LOAD Oct 2 20:38:33.138442 systemd-networkd[849]: lo: Link UP Oct 2 20:38:33.138453 systemd-networkd[849]: lo: Gained carrier Oct 2 20:38:33.138870 systemd-networkd[849]: Enumeration completed Oct 2 20:38:33.186270 kernel: audit: type=1130 audit(1696279113.156:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.143670 systemd[1]: Started systemd-networkd.service. Oct 2 20:38:33.150496 systemd-networkd[849]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:38:33.183816 systemd[1]: Reached target network.target. Oct 2 20:38:33.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.192853 systemd[1]: Starting iscsiuio.service... Oct 2 20:38:33.209973 systemd[1]: Started iscsiuio.service. Oct 2 20:38:33.263791 kernel: audit: type=1130 audit(1696279113.215:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.263814 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:38:33.263814 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 20:38:33.263814 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 20:38:33.263814 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 20:38:33.263814 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 20:38:33.263814 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:38:33.263814 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 20:38:33.427954 kernel: audit: type=1130 audit(1696279113.269:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.427982 kernel: audit: type=1130 audit(1696279113.384:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.246820 systemd[1]: Starting iscsid.service... Oct 2 20:38:33.262226 systemd[1]: Started iscsid.service. Oct 2 20:38:33.302790 systemd[1]: Starting dracut-initqueue.service... Oct 2 20:38:33.375671 systemd[1]: Finished dracut-initqueue.service. Oct 2 20:38:33.408951 systemd[1]: Reached target remote-fs-pre.target. Oct 2 20:38:33.421912 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:38:33.432520 systemd[1]: Reached target remote-fs.target. Oct 2 20:38:33.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.461845 systemd[1]: Starting dracut-pre-mount.service... Oct 2 20:38:33.518908 kernel: audit: type=1130 audit(1696279113.488:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:33.482746 systemd[1]: Finished dracut-pre-mount.service. Oct 2 20:38:33.559061 kernel: mlx5_core 239a:00:02.0 enP9114s1: Link up Oct 2 20:38:33.789055 kernel: hv_netvsc 00224879-bd0f-0022-4879-bd0f00224879 eth0: Data path switched to VF: enP9114s1 Oct 2 20:38:33.798653 systemd-networkd[849]: enP9114s1: Link UP Oct 2 20:38:33.803608 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:38:33.798739 systemd-networkd[849]: eth0: Link UP Oct 2 20:38:33.798864 systemd-networkd[849]: eth0: Gained carrier Oct 2 20:38:33.809237 systemd-networkd[849]: enP9114s1: Gained carrier Oct 2 20:38:33.825141 systemd-networkd[849]: eth0: DHCPv4 address 10.200.20.43/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:38:34.039312 ignition[799]: Ignition 2.14.0 Oct 2 20:38:34.039326 ignition[799]: Stage: fetch-offline Oct 2 20:38:34.039402 ignition[799]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:34.039426 ignition[799]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:34.052616 ignition[799]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:34.058010 ignition[799]: parsed url from cmdline: "" Oct 2 20:38:34.058016 ignition[799]: no config URL provided Oct 2 20:38:34.058027 ignition[799]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:38:34.058067 ignition[799]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:38:34.058074 ignition[799]: failed to fetch config: resource requires networking Oct 2 20:38:34.089363 ignition[799]: Ignition finished successfully Oct 2 20:38:34.090256 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 20:38:34.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.119138 ignition[873]: Ignition 2.14.0 Oct 2 20:38:34.133482 kernel: audit: type=1130 audit(1696279114.099:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.100227 systemd[1]: Starting ignition-fetch.service... Oct 2 20:38:34.119145 ignition[873]: Stage: fetch Oct 2 20:38:34.119265 ignition[873]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:34.119294 ignition[873]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:34.122544 ignition[873]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:34.122680 ignition[873]: parsed url from cmdline: "" Oct 2 20:38:34.122684 ignition[873]: no config URL provided Oct 2 20:38:34.122689 ignition[873]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:38:34.122698 ignition[873]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:38:34.122737 ignition[873]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 20:38:34.153005 ignition[873]: GET result: OK Oct 2 20:38:34.184400 unknown[873]: fetched base config from "system" Oct 2 20:38:34.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.153080 ignition[873]: config has been read from IMDS userdata Oct 2 20:38:34.225573 kernel: audit: type=1130 audit(1696279114.193:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.184408 unknown[873]: fetched base config from "system" Oct 2 20:38:34.153122 ignition[873]: parsing config with SHA512: 840bd35775ac397a237855925dea70dbd3de635407f2932e52eaca8fba1e6f7828df0da1fffc32dd0c3fc5adb72079c7e6cef141c28d83795a1f3b7b723686da Oct 2 20:38:34.184414 unknown[873]: fetched user config from "azure" Oct 2 20:38:34.184867 ignition[873]: fetch: fetch complete Oct 2 20:38:34.186096 systemd[1]: Finished ignition-fetch.service. Oct 2 20:38:34.184872 ignition[873]: fetch: fetch passed Oct 2 20:38:34.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.215409 systemd[1]: Starting ignition-kargs.service... Oct 2 20:38:34.276680 kernel: audit: type=1130 audit(1696279114.253:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.184916 ignition[873]: Ignition finished successfully Oct 2 20:38:34.248862 systemd[1]: Finished ignition-kargs.service. Oct 2 20:38:34.234595 ignition[879]: Ignition 2.14.0 Oct 2 20:38:34.234603 ignition[879]: Stage: kargs Oct 2 20:38:34.234746 ignition[879]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:34.293233 systemd[1]: Starting ignition-disks.service... Oct 2 20:38:34.234767 ignition[879]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:34.238893 ignition[879]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:34.245059 ignition[879]: kargs: kargs passed Oct 2 20:38:34.245112 ignition[879]: Ignition finished successfully Oct 2 20:38:34.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.323912 systemd[1]: Finished ignition-disks.service. Oct 2 20:38:34.315538 ignition[885]: Ignition 2.14.0 Oct 2 20:38:34.328920 systemd[1]: Reached target initrd-root-device.target. Oct 2 20:38:34.315544 ignition[885]: Stage: disks Oct 2 20:38:34.338070 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:38:34.315648 ignition[885]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:34.348205 systemd[1]: Reached target local-fs.target. Oct 2 20:38:34.315666 ignition[885]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:34.357646 systemd[1]: Reached target sysinit.target. Oct 2 20:38:34.318621 ignition[885]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:34.367805 systemd[1]: Reached target basic.target. Oct 2 20:38:34.321576 ignition[885]: disks: disks passed Oct 2 20:38:34.376609 systemd[1]: Starting systemd-fsck-root.service... Oct 2 20:38:34.321636 ignition[885]: Ignition finished successfully Oct 2 20:38:34.451332 systemd-fsck[894]: ROOT: clean, 603/7326000 files, 481067/7359488 blocks Oct 2 20:38:34.461862 systemd[1]: Finished systemd-fsck-root.service. Oct 2 20:38:34.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.468230 systemd[1]: Mounting sysroot.mount... Oct 2 20:38:34.502062 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 20:38:34.502366 systemd[1]: Mounted sysroot.mount. Oct 2 20:38:34.506685 systemd[1]: Reached target initrd-root-fs.target. Oct 2 20:38:34.524783 systemd[1]: Mounting sysroot-usr.mount... Oct 2 20:38:34.530332 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 20:38:34.541370 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 20:38:34.541408 systemd[1]: Reached target ignition-diskful.target. Oct 2 20:38:34.557562 systemd[1]: Mounted sysroot-usr.mount. Oct 2 20:38:34.584610 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:38:34.592988 systemd[1]: Starting initrd-setup-root.service... Oct 2 20:38:34.619956 initrd-setup-root[909]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 20:38:34.629623 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (904) Oct 2 20:38:34.645848 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:38:34.645905 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:38:34.651411 initrd-setup-root[917]: cut: /sysroot/etc/group: No such file or directory Oct 2 20:38:34.659969 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:38:34.666190 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:38:34.679021 initrd-setup-root[943]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 20:38:34.691702 initrd-setup-root[951]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 20:38:34.862544 systemd[1]: Finished initrd-setup-root.service. Oct 2 20:38:34.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.869151 systemd[1]: Starting ignition-mount.service... Oct 2 20:38:34.878759 systemd[1]: Starting sysroot-boot.service... Oct 2 20:38:34.904371 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 20:38:34.904483 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 20:38:34.929854 systemd[1]: Finished sysroot-boot.service. Oct 2 20:38:34.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.946571 ignition[973]: INFO : Ignition 2.14.0 Oct 2 20:38:34.953049 ignition[973]: INFO : Stage: mount Oct 2 20:38:34.953049 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:34.953049 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:34.979272 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:34.979272 ignition[973]: INFO : mount: mount passed Oct 2 20:38:34.979272 ignition[973]: INFO : Ignition finished successfully Oct 2 20:38:34.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:34.979429 systemd[1]: Finished ignition-mount.service. Oct 2 20:38:35.083887 coreos-metadata[903]: Oct 02 20:38:35.083 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:38:35.092347 coreos-metadata[903]: Oct 02 20:38:35.086 INFO Fetch successful Oct 2 20:38:35.120093 coreos-metadata[903]: Oct 02 20:38:35.120 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:38:35.143946 coreos-metadata[903]: Oct 02 20:38:35.143 INFO Fetch successful Oct 2 20:38:35.150172 coreos-metadata[903]: Oct 02 20:38:35.150 INFO wrote hostname ci-3510.3.0-a-81258c5509 to /sysroot/etc/hostname Oct 2 20:38:35.152496 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 20:38:35.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:35.166298 systemd[1]: Starting ignition-files.service... Oct 2 20:38:35.184506 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:38:35.207146 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (982) Oct 2 20:38:35.220503 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:38:35.220534 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:38:35.220545 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:38:35.230193 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:38:35.261645 ignition[1001]: INFO : Ignition 2.14.0 Oct 2 20:38:35.261645 ignition[1001]: INFO : Stage: files Oct 2 20:38:35.274681 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:35.274681 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:35.274681 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:35.274681 ignition[1001]: DEBUG : files: compiled without relabeling support, skipping Oct 2 20:38:35.274681 ignition[1001]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 20:38:35.274681 ignition[1001]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 20:38:35.266262 systemd-networkd[849]: eth0: Gained IPv6LL Oct 2 20:38:35.335726 ignition[1001]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 20:38:35.335726 ignition[1001]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 20:38:35.356997 ignition[1001]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 20:38:35.356997 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 20:38:35.356997 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Oct 2 20:38:35.346006 unknown[1001]: wrote ssh authorized keys file for user: core Oct 2 20:38:35.649999 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 20:38:35.916379 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Oct 2 20:38:35.933280 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 20:38:35.933280 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 20:38:35.933280 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Oct 2 20:38:36.137293 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 20:38:36.269733 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Oct 2 20:38:36.286109 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 20:38:36.286109 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:38:36.286109 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Oct 2 20:38:36.364020 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 20:38:37.209753 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Oct 2 20:38:37.229473 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:38:37.229473 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:38:37.229473 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Oct 2 20:38:37.280479 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 20:38:37.980900 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:38:38.002121 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:38:38.106127 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1004) Oct 2 20:38:38.066703 systemd[1]: mnt-oem2603713207.mount: Deactivated successfully. Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2603713207" Oct 2 20:38:38.112520 ignition[1001]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2603713207": device or resource busy Oct 2 20:38:38.112520 ignition[1001]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2603713207", trying btrfs: device or resource busy Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2603713207" Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2603713207" Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem2603713207" Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem2603713207" Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(e): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem831709327" Oct 2 20:38:38.112520 ignition[1001]: CRITICAL : files: createFilesystemsFiles: createFiles: op(d): op(e): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem831709327": device or resource busy Oct 2 20:38:38.112520 ignition[1001]: ERROR : files: createFilesystemsFiles: createFiles: op(d): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem831709327", trying btrfs: device or resource busy Oct 2 20:38:38.112520 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem831709327" Oct 2 20:38:38.508298 kernel: kauditd_printk_skb: 6 callbacks suppressed Oct 2 20:38:38.508326 kernel: audit: type=1130 audit(1696279118.118:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.508338 kernel: audit: type=1130 audit(1696279118.209:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.508347 kernel: audit: type=1131 audit(1696279118.209:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.508363 kernel: audit: type=1130 audit(1696279118.262:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.508373 kernel: audit: type=1130 audit(1696279118.391:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.508384 kernel: audit: type=1131 audit(1696279118.391:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.106519 systemd[1]: Finished ignition-files.service. Oct 2 20:38:38.514372 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(f): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem831709327" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(10): [started] unmounting "/mnt/oem831709327" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): op(10): [finished] unmounting "/mnt/oem831709327" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(11): [started] processing unit "waagent.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(11): [finished] processing unit "waagent.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Oct 2 20:38:38.514372 ignition[1001]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Oct 2 20:38:38.845124 kernel: audit: type=1130 audit(1696279118.576:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.845156 kernel: audit: type=1131 audit(1696279118.706:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.121571 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 20:38:38.860296 ignition[1001]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:38:38.860296 ignition[1001]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:38:38.860296 ignition[1001]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Oct 2 20:38:38.860296 ignition[1001]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 20:38:38.860296 ignition[1001]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:38:38.860296 ignition[1001]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:38:38.860296 ignition[1001]: INFO : files: files passed Oct 2 20:38:38.860296 ignition[1001]: INFO : Ignition finished successfully Oct 2 20:38:39.038022 kernel: audit: type=1131 audit(1696279118.935:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.038063 kernel: audit: type=1131 audit(1696279118.996:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.162869 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 20:38:39.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.060831 initrd-setup-root-after-ignition[1026]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 20:38:39.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.169307 systemd[1]: Starting ignition-quench.service... Oct 2 20:38:38.204276 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 20:38:39.109936 iscsid[854]: iscsid shutting down. Oct 2 20:38:39.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.204376 systemd[1]: Finished ignition-quench.service. Oct 2 20:38:39.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.209938 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 20:38:39.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.262322 systemd[1]: Reached target ignition-complete.target. Oct 2 20:38:39.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.313283 systemd[1]: Starting initrd-parse-etc.service... Oct 2 20:38:39.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.385949 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 20:38:39.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.217392 ignition[1039]: INFO : Ignition 2.14.0 Oct 2 20:38:39.217392 ignition[1039]: INFO : Stage: umount Oct 2 20:38:39.217392 ignition[1039]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:38:39.217392 ignition[1039]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:38:39.217392 ignition[1039]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:38:39.217392 ignition[1039]: INFO : umount: umount passed Oct 2 20:38:39.217392 ignition[1039]: INFO : Ignition finished successfully Oct 2 20:38:39.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.386060 systemd[1]: Finished initrd-parse-etc.service. Oct 2 20:38:38.391654 systemd[1]: Reached target initrd-fs.target. Oct 2 20:38:38.450861 systemd[1]: Reached target initrd.target. Oct 2 20:38:38.471255 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 20:38:39.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.472145 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 20:38:38.571018 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 20:38:39.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.615480 systemd[1]: Starting initrd-cleanup.service... Oct 2 20:38:39.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.643542 systemd[1]: Stopped target nss-lookup.target. Oct 2 20:38:38.657170 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 20:38:38.675414 systemd[1]: Stopped target timers.target. Oct 2 20:38:39.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.693353 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 20:38:38.693422 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 20:38:38.735078 systemd[1]: Stopped target initrd.target. Oct 2 20:38:39.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.754826 systemd[1]: Stopped target basic.target. Oct 2 20:38:39.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.772757 systemd[1]: Stopped target ignition-complete.target. Oct 2 20:38:39.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.788369 systemd[1]: Stopped target ignition-diskful.target. Oct 2 20:38:39.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.804079 systemd[1]: Stopped target initrd-root-device.target. Oct 2 20:38:38.819308 systemd[1]: Stopped target remote-fs.target. Oct 2 20:38:38.834076 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 20:38:39.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.853125 systemd[1]: Stopped target sysinit.target. Oct 2 20:38:39.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.865527 systemd[1]: Stopped target local-fs.target. Oct 2 20:38:39.540000 audit: BPF prog-id=6 op=UNLOAD Oct 2 20:38:38.882283 systemd[1]: Stopped target local-fs-pre.target. Oct 2 20:38:39.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.899563 systemd[1]: Stopped target swap.target. Oct 2 20:38:39.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.915576 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 20:38:39.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.915644 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 20:38:38.935783 systemd[1]: Stopped target cryptsetup.target. Oct 2 20:38:38.978133 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 20:38:38.978194 systemd[1]: Stopped dracut-initqueue.service. Oct 2 20:38:39.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.996573 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 20:38:39.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:38.996611 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 20:38:39.029736 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 20:38:39.666205 kernel: hv_netvsc 00224879-bd0f-0022-4879-bd0f00224879 eth0: Data path switched from VF: enP9114s1 Oct 2 20:38:39.029784 systemd[1]: Stopped ignition-files.service. Oct 2 20:38:39.045514 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 20:38:39.045562 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 20:38:39.078223 systemd[1]: Stopping ignition-mount.service... Oct 2 20:38:39.105732 systemd[1]: Stopping iscsid.service... Oct 2 20:38:39.110352 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 20:38:39.110409 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 20:38:39.117384 systemd[1]: Stopping sysroot-boot.service... Oct 2 20:38:39.128857 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 20:38:39.128954 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 20:38:39.136924 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 20:38:39.136975 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 20:38:39.156291 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 20:38:39.156394 systemd[1]: Stopped iscsid.service. Oct 2 20:38:39.162186 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 20:38:39.162269 systemd[1]: Finished initrd-cleanup.service. Oct 2 20:38:39.178040 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 20:38:39.178498 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 20:38:39.178590 systemd[1]: Stopped ignition-mount.service. Oct 2 20:38:39.188688 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 20:38:39.188729 systemd[1]: Stopped ignition-disks.service. Oct 2 20:38:39.201152 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 20:38:39.201194 systemd[1]: Stopped ignition-kargs.service. Oct 2 20:38:39.207140 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 20:38:39.207173 systemd[1]: Stopped ignition-fetch.service. Oct 2 20:38:39.229472 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 20:38:39.229523 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 20:38:39.242321 systemd[1]: Stopped target paths.target. Oct 2 20:38:39.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:39.258125 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 20:38:39.291321 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 20:38:39.298076 systemd[1]: Stopped target slices.target. Oct 2 20:38:39.309394 systemd[1]: Stopped target sockets.target. Oct 2 20:38:39.320429 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 20:38:39.320481 systemd[1]: Closed iscsid.socket. Oct 2 20:38:39.330057 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 20:38:39.330101 systemd[1]: Stopped ignition-setup.service. Oct 2 20:38:39.895119 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Oct 2 20:38:39.346041 systemd[1]: Stopping iscsiuio.service... Oct 2 20:38:39.362284 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 20:38:39.362378 systemd[1]: Stopped iscsiuio.service. Oct 2 20:38:39.371726 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 20:38:39.371797 systemd[1]: Stopped sysroot-boot.service. Oct 2 20:38:39.381462 systemd[1]: Stopped target network.target. Oct 2 20:38:39.391500 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 20:38:39.391533 systemd[1]: Closed iscsiuio.socket. Oct 2 20:38:39.401569 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 20:38:39.401615 systemd[1]: Stopped initrd-setup-root.service. Oct 2 20:38:39.412673 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:38:39.421446 systemd-networkd[849]: eth0: DHCPv6 lease lost Oct 2 20:38:39.895000 audit: BPF prog-id=9 op=UNLOAD Oct 2 20:38:39.423233 systemd[1]: Stopping systemd-resolved.service... Oct 2 20:38:39.434444 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:38:39.434546 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:38:39.447325 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 20:38:39.447364 systemd[1]: Closed systemd-networkd.socket. Oct 2 20:38:39.453930 systemd[1]: Stopping network-cleanup.service... Oct 2 20:38:39.465548 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 20:38:39.465611 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 20:38:39.471811 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 20:38:39.471853 systemd[1]: Stopped systemd-sysctl.service. Oct 2 20:38:39.486858 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 20:38:39.486903 systemd[1]: Stopped systemd-modules-load.service. Oct 2 20:38:39.492897 systemd[1]: Stopping systemd-udevd.service... Oct 2 20:38:39.509464 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 20:38:39.510007 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 20:38:39.510117 systemd[1]: Stopped systemd-resolved.service. Oct 2 20:38:39.518500 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 20:38:39.518623 systemd[1]: Stopped systemd-udevd.service. Oct 2 20:38:39.529310 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 20:38:39.529360 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 20:38:39.542972 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 20:38:39.543011 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 20:38:39.549405 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 20:38:39.549465 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 20:38:39.560390 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 20:38:39.560445 systemd[1]: Stopped dracut-cmdline.service. Oct 2 20:38:39.570270 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 20:38:39.570320 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 20:38:39.580836 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 20:38:39.608642 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 20:38:39.608725 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 20:38:39.621516 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 20:38:39.621621 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 20:38:39.816903 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 20:38:39.817023 systemd[1]: Stopped network-cleanup.service. Oct 2 20:38:39.826173 systemd[1]: Reached target initrd-switch-root.target. Oct 2 20:38:39.836354 systemd[1]: Starting initrd-switch-root.service... Oct 2 20:38:39.865825 systemd[1]: Switching root. Oct 2 20:38:39.896452 systemd-journald[276]: Journal stopped Oct 2 20:38:44.546022 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 20:38:44.546057 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 20:38:44.546068 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 20:38:44.546079 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 20:38:44.546087 kernel: SELinux: policy capability open_perms=1 Oct 2 20:38:44.546096 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 20:38:44.546105 kernel: SELinux: policy capability always_check_network=0 Oct 2 20:38:44.546114 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 20:38:44.546122 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 20:38:44.546130 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 20:38:44.546143 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 20:38:44.546153 systemd[1]: Successfully loaded SELinux policy in 139.789ms. Oct 2 20:38:44.546165 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 40.500ms. Oct 2 20:38:44.546175 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:38:44.546186 systemd[1]: Detected virtualization microsoft. Oct 2 20:38:44.546195 systemd[1]: Detected architecture arm64. Oct 2 20:38:44.546204 systemd[1]: Detected first boot. Oct 2 20:38:44.546214 systemd[1]: Hostname set to . Oct 2 20:38:44.546223 systemd[1]: Initializing machine ID from random generator. Oct 2 20:38:44.546439 kernel: mlx5_core 239a:00:02.0: poll_health:739:(pid 1049): device's health compromised - reached miss count Oct 2 20:38:44.546453 systemd[1]: Populated /etc with preset unit settings. Oct 2 20:38:44.546465 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:38:44.546476 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:38:44.546486 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:38:44.546496 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 2 20:38:44.546505 kernel: audit: type=1334 audit(1696279123.699:88): prog-id=12 op=LOAD Oct 2 20:38:44.546514 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 20:38:44.546524 kernel: audit: type=1334 audit(1696279123.699:89): prog-id=3 op=UNLOAD Oct 2 20:38:44.546533 systemd[1]: Stopped initrd-switch-root.service. Oct 2 20:38:44.546542 kernel: audit: type=1334 audit(1696279123.699:90): prog-id=13 op=LOAD Oct 2 20:38:44.546552 kernel: audit: type=1334 audit(1696279123.699:91): prog-id=14 op=LOAD Oct 2 20:38:44.546561 kernel: audit: type=1334 audit(1696279123.699:92): prog-id=4 op=UNLOAD Oct 2 20:38:44.546570 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 20:38:44.546579 kernel: audit: type=1334 audit(1696279123.699:93): prog-id=5 op=UNLOAD Oct 2 20:38:44.546590 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 20:38:44.546599 kernel: audit: type=1131 audit(1696279123.700:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.546608 kernel: audit: type=1334 audit(1696279123.733:95): prog-id=12 op=UNLOAD Oct 2 20:38:44.546617 kernel: audit: type=1130 audit(1696279123.759:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.546626 kernel: audit: type=1131 audit(1696279123.759:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.546635 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 20:38:44.546647 systemd[1]: Created slice system-getty.slice. Oct 2 20:38:44.546656 systemd[1]: Created slice system-modprobe.slice. Oct 2 20:38:44.546666 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 20:38:44.546676 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 20:38:44.546686 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 20:38:44.546696 systemd[1]: Created slice user.slice. Oct 2 20:38:44.546705 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:38:44.546714 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 20:38:44.546724 systemd[1]: Set up automount boot.automount. Oct 2 20:38:44.546733 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 20:38:44.546742 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 20:38:44.546753 systemd[1]: Stopped target initrd-fs.target. Oct 2 20:38:44.546764 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 20:38:44.546773 systemd[1]: Reached target integritysetup.target. Oct 2 20:38:44.546782 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:38:44.546792 systemd[1]: Reached target remote-fs.target. Oct 2 20:38:44.546802 systemd[1]: Reached target slices.target. Oct 2 20:38:44.546811 systemd[1]: Reached target swap.target. Oct 2 20:38:44.546821 systemd[1]: Reached target torcx.target. Oct 2 20:38:44.546832 systemd[1]: Reached target veritysetup.target. Oct 2 20:38:44.546841 systemd[1]: Listening on systemd-coredump.socket. Oct 2 20:38:44.546851 systemd[1]: Listening on systemd-initctl.socket. Oct 2 20:38:44.546860 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:38:44.546869 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:38:44.546881 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:38:44.546890 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 20:38:44.546900 systemd[1]: Mounting dev-hugepages.mount... Oct 2 20:38:44.546909 systemd[1]: Mounting dev-mqueue.mount... Oct 2 20:38:44.546919 systemd[1]: Mounting media.mount... Oct 2 20:38:44.546929 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 20:38:44.546938 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 20:38:44.546948 systemd[1]: Mounting tmp.mount... Oct 2 20:38:44.546959 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 20:38:44.546970 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 20:38:44.546979 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:38:44.546989 systemd[1]: Starting modprobe@configfs.service... Oct 2 20:38:44.546998 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 20:38:44.547007 systemd[1]: Starting modprobe@drm.service... Oct 2 20:38:44.547017 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 20:38:44.547026 systemd[1]: Starting modprobe@fuse.service... Oct 2 20:38:44.547049 systemd[1]: Starting modprobe@loop.service... Oct 2 20:38:44.548852 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 20:38:44.548869 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 20:38:44.548879 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 20:38:44.548889 kernel: fuse: init (API version 7.34) Oct 2 20:38:44.548899 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 20:38:44.548909 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 20:38:44.548919 systemd[1]: Stopped systemd-journald.service. Oct 2 20:38:44.548928 systemd[1]: systemd-journald.service: Consumed 3.562s CPU time. Oct 2 20:38:44.548937 kernel: loop: module loaded Oct 2 20:38:44.548947 systemd[1]: Starting systemd-journald.service... Oct 2 20:38:44.548958 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:38:44.548968 systemd[1]: Starting systemd-network-generator.service... Oct 2 20:38:44.548981 systemd[1]: Starting systemd-remount-fs.service... Oct 2 20:38:44.548990 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:38:44.549001 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 20:38:44.549011 systemd[1]: Stopped verity-setup.service. Oct 2 20:38:44.549025 systemd-journald[1180]: Journal started Oct 2 20:38:44.549098 systemd-journald[1180]: Runtime Journal (/run/log/journal/49d10fc38a544e5d8f6f6bdc524525c4) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:38:40.512000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 20:38:40.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:38:40.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:38:40.875000 audit: BPF prog-id=10 op=LOAD Oct 2 20:38:40.875000 audit: BPF prog-id=10 op=UNLOAD Oct 2 20:38:40.875000 audit: BPF prog-id=11 op=LOAD Oct 2 20:38:40.875000 audit: BPF prog-id=11 op=UNLOAD Oct 2 20:38:43.699000 audit: BPF prog-id=12 op=LOAD Oct 2 20:38:43.699000 audit: BPF prog-id=3 op=UNLOAD Oct 2 20:38:43.699000 audit: BPF prog-id=13 op=LOAD Oct 2 20:38:43.699000 audit: BPF prog-id=14 op=LOAD Oct 2 20:38:43.699000 audit: BPF prog-id=4 op=UNLOAD Oct 2 20:38:43.699000 audit: BPF prog-id=5 op=UNLOAD Oct 2 20:38:43.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:43.733000 audit: BPF prog-id=12 op=UNLOAD Oct 2 20:38:43.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:43.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.452000 audit: BPF prog-id=15 op=LOAD Oct 2 20:38:44.453000 audit: BPF prog-id=16 op=LOAD Oct 2 20:38:44.453000 audit: BPF prog-id=17 op=LOAD Oct 2 20:38:44.453000 audit: BPF prog-id=13 op=UNLOAD Oct 2 20:38:44.453000 audit: BPF prog-id=14 op=UNLOAD Oct 2 20:38:44.539000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:38:44.539000 audit[1180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffdcb764a0 a2=4000 a3=1 items=0 ppid=1 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.539000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 20:38:44.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:41.262515 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:38:43.697635 systemd[1]: Queued start job for default target multi-user.target. Oct 2 20:38:41.274534 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:38:43.700440 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 20:38:41.274560 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:38:43.700854 systemd[1]: systemd-journald.service: Consumed 3.562s CPU time. Oct 2 20:38:41.274597 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 20:38:41.274607 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 20:38:41.274642 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 20:38:41.274655 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 20:38:41.274852 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 20:38:41.274883 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:38:41.274895 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:38:41.275288 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 20:38:41.275324 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 20:38:41.275341 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 20:38:41.275356 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 20:38:41.275374 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 20:38:41.275387 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 20:38:43.196013 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:43Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:43.196292 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:43Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:43.196391 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:43Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:43.196544 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:43Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:38:43.196591 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:43Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 20:38:43.196645 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2023-10-02T20:38:43Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 20:38:44.560764 systemd[1]: Started systemd-journald.service. Oct 2 20:38:44.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.561599 systemd[1]: Mounted dev-hugepages.mount. Oct 2 20:38:44.566699 systemd[1]: Mounted dev-mqueue.mount. Oct 2 20:38:44.571561 systemd[1]: Mounted media.mount. Oct 2 20:38:44.576023 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 20:38:44.581255 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 20:38:44.586357 systemd[1]: Mounted tmp.mount. Oct 2 20:38:44.590605 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 20:38:44.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.596338 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:38:44.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.601911 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 20:38:44.602059 systemd[1]: Finished modprobe@configfs.service. Oct 2 20:38:44.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.607868 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 20:38:44.607994 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 20:38:44.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.613389 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 20:38:44.613516 systemd[1]: Finished modprobe@drm.service. Oct 2 20:38:44.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.618648 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 20:38:44.618787 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 20:38:44.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.625421 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 20:38:44.625550 systemd[1]: Finished modprobe@fuse.service. Oct 2 20:38:44.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.630902 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 20:38:44.631059 systemd[1]: Finished modprobe@loop.service. Oct 2 20:38:44.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.636673 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:38:44.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.642949 systemd[1]: Finished systemd-network-generator.service. Oct 2 20:38:44.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.654482 systemd[1]: Finished systemd-remount-fs.service. Oct 2 20:38:44.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.662824 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:38:44.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.669309 systemd[1]: Reached target network-pre.target. Oct 2 20:38:44.675894 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 20:38:44.682496 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 20:38:44.687919 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 20:38:44.697490 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 20:38:44.703736 systemd[1]: Starting systemd-journal-flush.service... Oct 2 20:38:44.709089 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 20:38:44.710330 systemd[1]: Starting systemd-random-seed.service... Oct 2 20:38:44.716811 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 20:38:44.720410 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:38:44.726700 systemd[1]: Starting systemd-sysusers.service... Oct 2 20:38:44.735534 systemd[1]: Starting systemd-udev-settle.service... Oct 2 20:38:44.745637 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 20:38:44.750468 systemd-journald[1180]: Time spent on flushing to /var/log/journal/49d10fc38a544e5d8f6f6bdc524525c4 is 18.179ms for 1082 entries. Oct 2 20:38:44.750468 systemd-journald[1180]: System Journal (/var/log/journal/49d10fc38a544e5d8f6f6bdc524525c4) is 8.0M, max 2.6G, 2.6G free. Oct 2 20:38:44.810895 systemd-journald[1180]: Received client request to flush runtime journal. Oct 2 20:38:44.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.812146 udevadm[1194]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 20:38:44.759490 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 20:38:44.769724 systemd[1]: Finished systemd-random-seed.service. Oct 2 20:38:44.779442 systemd[1]: Reached target first-boot-complete.target. Oct 2 20:38:44.797271 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:38:44.812361 systemd[1]: Finished systemd-journal-flush.service. Oct 2 20:38:44.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:44.964694 systemd[1]: Finished systemd-sysusers.service. Oct 2 20:38:44.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:47.259312 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 20:38:47.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:47.266000 audit: BPF prog-id=18 op=LOAD Oct 2 20:38:47.266000 audit: BPF prog-id=19 op=LOAD Oct 2 20:38:47.266000 audit: BPF prog-id=7 op=UNLOAD Oct 2 20:38:47.266000 audit: BPF prog-id=8 op=UNLOAD Oct 2 20:38:47.267119 systemd[1]: Starting systemd-udevd.service... Oct 2 20:38:47.289324 systemd-udevd[1197]: Using default interface naming scheme 'v252'. Oct 2 20:38:47.622517 systemd[1]: Started systemd-udevd.service. Oct 2 20:38:47.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:47.634000 audit: BPF prog-id=20 op=LOAD Oct 2 20:38:47.635323 systemd[1]: Starting systemd-networkd.service... Oct 2 20:38:47.716492 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 2 20:38:47.948633 systemd[1]: Starting systemd-userdbd.service... Oct 2 20:38:47.947000 audit: BPF prog-id=21 op=LOAD Oct 2 20:38:47.947000 audit: BPF prog-id=22 op=LOAD Oct 2 20:38:47.947000 audit: BPF prog-id=23 op=LOAD Oct 2 20:38:47.965000 audit[1206]: AVC avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:38:47.977232 kernel: hv_vmbus: registering driver hv_balloon Oct 2 20:38:47.977310 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 20:38:47.977348 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 20:38:47.989215 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 20:38:47.989291 kernel: hv_balloon: Memory hot add disabled on ARM64 Oct 2 20:38:48.002061 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 20:38:48.018902 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 20:38:48.018986 kernel: Console: switching to colour dummy device 80x25 Oct 2 20:38:48.027226 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:38:47.965000 audit[1206]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac702d3a0 a1=aa2c a2=ffffbb9a24b0 a3=aaaac6f8b010 items=10 ppid=1197 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.965000 audit: CWD cwd="/" Oct 2 20:38:47.965000 audit: PATH item=0 name=(null) inode=10652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=1 name=(null) inode=10653 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=2 name=(null) inode=10652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=3 name=(null) inode=10654 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=4 name=(null) inode=10652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=5 name=(null) inode=10655 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=6 name=(null) inode=10652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=7 name=(null) inode=10656 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=8 name=(null) inode=10652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PATH item=9 name=(null) inode=10657 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:47.965000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 20:38:48.036717 kernel: hv_vmbus: registering driver hv_utils Oct 2 20:38:48.044373 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 20:38:48.044452 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 20:38:48.049059 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 20:38:48.049137 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 20:38:47.811103 systemd[1]: Started systemd-userdbd.service. Oct 2 20:38:48.597496 systemd-journald[1180]: Time jumped backwards, rotating. Oct 2 20:38:47.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:48.946378 systemd-networkd[1217]: lo: Link UP Oct 2 20:38:48.946712 systemd-networkd[1217]: lo: Gained carrier Oct 2 20:38:48.947213 systemd-networkd[1217]: Enumeration completed Oct 2 20:38:48.947377 systemd[1]: Started systemd-networkd.service. Oct 2 20:38:48.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:48.956039 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:38:48.959377 kernel: kauditd_printk_skb: 61 callbacks suppressed Oct 2 20:38:48.959447 kernel: audit: type=1130 audit(1696279128.953:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:49.093650 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1205) Oct 2 20:38:49.116924 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:38:49.122751 systemd[1]: Finished systemd-udev-settle.service. Oct 2 20:38:49.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:49.129864 systemd[1]: Starting lvm2-activation-early.service... Oct 2 20:38:49.150255 kernel: audit: type=1130 audit(1696279129.127:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:49.241064 systemd-networkd[1217]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:38:49.292618 kernel: mlx5_core 239a:00:02.0 enP9114s1: Link up Oct 2 20:38:49.335612 kernel: hv_netvsc 00224879-bd0f-0022-4879-bd0f00224879 eth0: Data path switched to VF: enP9114s1 Oct 2 20:38:49.336626 systemd-networkd[1217]: enP9114s1: Link UP Oct 2 20:38:49.336818 systemd-networkd[1217]: eth0: Link UP Oct 2 20:38:49.336872 systemd-networkd[1217]: eth0: Gained carrier Oct 2 20:38:49.342913 systemd-networkd[1217]: enP9114s1: Gained carrier Oct 2 20:38:49.350729 systemd-networkd[1217]: eth0: DHCPv4 address 10.200.20.43/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:38:51.224718 systemd-networkd[1217]: eth0: Gained IPv6LL Oct 2 20:38:51.238208 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:38:51.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:51.263645 kernel: audit: type=1130 audit(1696279131.244:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:53.772909 lvm[1275]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:38:53.800784 systemd[1]: Finished lvm2-activation-early.service. Oct 2 20:38:54.147988 kernel: audit: type=1130 audit(1696279133.805:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.148072 kernel: audit: type=1130 audit(1696279133.861:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:54.148097 kernel: audit: type=1130 audit(1696279133.967:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:53.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:53.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:53.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:53.806530 systemd[1]: Reached target cryptsetup.target. Oct 2 20:38:54.148378 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:38:53.829866 systemd[1]: Starting lvm2-activation.service... Oct 2 20:38:53.857815 systemd[1]: Finished lvm2-activation.service. Oct 2 20:38:53.862541 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:38:53.883337 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 20:38:53.883372 systemd[1]: Reached target local-fs.target. Oct 2 20:38:53.887818 systemd[1]: Reached target machines.target. Oct 2 20:38:53.893238 systemd[1]: Starting ldconfig.service... Oct 2 20:38:53.897143 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 20:38:53.897208 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:38:53.898584 systemd[1]: Starting systemd-boot-update.service... Oct 2 20:38:53.904144 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 20:38:53.911264 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 20:38:53.916366 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:38:53.916461 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:38:53.917555 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 20:38:53.931091 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1279 (bootctl) Oct 2 20:38:53.932166 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 20:38:53.961522 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 20:38:54.150641 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 20:38:55.413881 systemd-fsck[1287]: fsck.fat 4.2 (2021-01-31) Oct 2 20:38:55.413881 systemd-fsck[1287]: /dev/sda1: 236 files, 113463/258078 clusters Oct 2 20:38:55.719327 kernel: audit: type=1130 audit(1696279135.423:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.719366 kernel: audit: type=1130 audit(1696279135.664:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:55.418083 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 20:38:55.425955 systemd[1]: Mounting boot.mount... Oct 2 20:38:55.448667 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 20:38:55.647544 systemd[1]: Mounted boot.mount. Oct 2 20:38:55.659621 systemd[1]: Finished systemd-boot-update.service. Oct 2 20:38:59.709266 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 20:39:01.153052 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 20:39:01.154016 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 20:39:01.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.180640 kernel: audit: type=1130 audit(1696279141.159:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.458318 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 20:39:01.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.464919 systemd[1]: Starting audit-rules.service... Oct 2 20:39:01.483635 kernel: audit: type=1130 audit(1696279141.462:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.488275 systemd[1]: Starting clean-ca-certificates.service... Oct 2 20:39:01.494135 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 20:39:01.500000 audit: BPF prog-id=24 op=LOAD Oct 2 20:39:01.501629 systemd[1]: Starting systemd-resolved.service... Oct 2 20:39:01.511021 kernel: audit: type=1334 audit(1696279141.500:154): prog-id=24 op=LOAD Oct 2 20:39:01.511000 audit: BPF prog-id=25 op=LOAD Oct 2 20:39:01.513443 systemd[1]: Starting systemd-timesyncd.service... Oct 2 20:39:01.523488 kernel: audit: type=1334 audit(1696279141.511:155): prog-id=25 op=LOAD Oct 2 20:39:01.525219 systemd[1]: Starting systemd-update-utmp.service... Oct 2 20:39:01.555142 systemd[1]: Finished clean-ca-certificates.service. Oct 2 20:39:01.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.562826 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 20:39:01.587621 kernel: audit: type=1130 audit(1696279141.562:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.951000 audit[1300]: SYSTEM_BOOT pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.957265 systemd[1]: Finished systemd-update-utmp.service. Oct 2 20:39:01.977838 kernel: audit: type=1127 audit(1696279141.951:157): pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.977922 kernel: audit: type=1130 audit(1696279141.977:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:01.977817 systemd[1]: Started systemd-timesyncd.service. Oct 2 20:39:02.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:02.002696 systemd[1]: Reached target time-set.target. Oct 2 20:39:02.024765 kernel: audit: type=1130 audit(1696279142.001:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:02.358178 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 20:39:02.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:02.383722 kernel: audit: type=1130 audit(1696279142.363:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:02.448078 systemd-resolved[1297]: Positive Trust Anchors: Oct 2 20:39:02.448093 systemd-resolved[1297]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:39:02.448120 systemd-resolved[1297]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:39:02.843842 systemd-resolved[1297]: Using system hostname 'ci-3510.3.0-a-81258c5509'. Oct 2 20:39:02.846156 systemd[1]: Started systemd-resolved.service. Oct 2 20:39:02.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:02.851886 systemd[1]: Reached target network.target. Oct 2 20:39:02.875201 kernel: audit: type=1130 audit(1696279142.851:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:02.875581 systemd[1]: Reached target network-online.target. Oct 2 20:39:02.880691 systemd[1]: Reached target nss-lookup.target. Oct 2 20:39:03.398000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:39:03.398000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff31cc770 a2=420 a3=0 items=0 ppid=1294 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:03.398000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:39:03.539781 augenrules[1315]: No rules Oct 2 20:39:03.541143 systemd[1]: Finished audit-rules.service. Oct 2 20:39:06.397299 ldconfig[1278]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 20:39:06.450453 systemd[1]: Finished ldconfig.service. Oct 2 20:39:06.457550 systemd[1]: Starting systemd-update-done.service... Oct 2 20:39:06.477118 systemd[1]: Finished systemd-update-done.service. Oct 2 20:39:06.482224 systemd[1]: Reached target sysinit.target. Oct 2 20:39:06.486869 systemd[1]: Started motdgen.path. Oct 2 20:39:06.490977 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 20:39:06.497722 systemd[1]: Started logrotate.timer. Oct 2 20:39:06.501764 systemd[1]: Started mdadm.timer. Oct 2 20:39:06.505462 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 20:39:06.510439 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 20:39:06.510469 systemd[1]: Reached target paths.target. Oct 2 20:39:06.514729 systemd[1]: Reached target timers.target. Oct 2 20:39:06.519263 systemd[1]: Listening on dbus.socket. Oct 2 20:39:06.524396 systemd[1]: Starting docker.socket... Oct 2 20:39:06.531065 systemd[1]: Listening on sshd.socket. Oct 2 20:39:06.535316 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:39:06.535802 systemd[1]: Listening on docker.socket. Oct 2 20:39:06.541028 systemd[1]: Reached target sockets.target. Oct 2 20:39:06.546564 systemd[1]: Reached target basic.target. Oct 2 20:39:06.552343 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:39:06.552385 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:39:06.553624 systemd[1]: Starting containerd.service... Oct 2 20:39:06.559583 systemd[1]: Starting dbus.service... Oct 2 20:39:06.564283 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 20:39:06.569778 systemd[1]: Starting extend-filesystems.service... Oct 2 20:39:06.577749 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 20:39:06.578732 systemd[1]: Starting motdgen.service... Oct 2 20:39:06.583386 systemd[1]: Started nvidia.service. Oct 2 20:39:06.591914 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 20:39:06.597323 systemd[1]: Starting prepare-critools.service... Oct 2 20:39:06.604077 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 20:39:06.610370 systemd[1]: Starting sshd-keygen.service... Oct 2 20:39:06.617735 systemd[1]: Starting systemd-logind.service... Oct 2 20:39:06.623823 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:39:06.623879 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 20:39:06.624871 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 20:39:06.625536 systemd[1]: Starting update-engine.service... Oct 2 20:39:06.634170 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 20:39:06.649641 jq[1325]: false Oct 2 20:39:06.651467 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 20:39:06.651699 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 20:39:06.662631 jq[1343]: true Oct 2 20:39:06.665536 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 20:39:06.665697 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda1 Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda2 Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda3 Oct 2 20:39:06.673436 extend-filesystems[1326]: Found usr Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda4 Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda6 Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda7 Oct 2 20:39:06.673436 extend-filesystems[1326]: Found sda9 Oct 2 20:39:06.673436 extend-filesystems[1326]: Checking size of /dev/sda9 Oct 2 20:39:06.923923 update_engine[1341]: I1002 20:39:06.890048 1341 main.cc:92] Flatcar Update Engine starting Oct 2 20:39:06.923923 update_engine[1341]: I1002 20:39:06.914712 1341 update_check_scheduler.cc:74] Next update check in 4m14s Oct 2 20:39:06.924156 env[1356]: time="2023-10-02T20:39:06.853117880Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 20:39:06.924156 env[1356]: time="2023-10-02T20:39:06.922391880Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 20:39:06.773186 dbus-daemon[1324]: [system] SELinux support is enabled Oct 2 20:39:06.734385 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 20:39:06.924584 jq[1355]: true Oct 2 20:39:06.924662 tar[1345]: ./ Oct 2 20:39:06.924662 tar[1345]: ./loopback Oct 2 20:39:06.924662 tar[1345]: ./bandwidth Oct 2 20:39:06.924849 tar[1347]: crictl Oct 2 20:39:06.925214 extend-filesystems[1326]: Old size kept for /dev/sda9 Oct 2 20:39:06.925214 extend-filesystems[1326]: Found sr0 Oct 2 20:39:06.872502 dbus-daemon[1324]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 20:39:06.734534 systemd[1]: Finished motdgen.service. Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.942053400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.951449240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.951487160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.953987600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.954020680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.954036520Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.954046840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.954201240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.954889560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:39:06.956571 env[1356]: time="2023-10-02T20:39:06.955313320Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:39:06.778000 systemd[1]: Started dbus.service. Oct 2 20:39:06.956881 env[1356]: time="2023-10-02T20:39:06.955333440Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 20:39:06.822248 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 20:39:06.822417 systemd[1]: Finished extend-filesystems.service. Oct 2 20:39:06.826901 systemd-logind[1338]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 2 20:39:06.827751 systemd-logind[1338]: New seat seat0. Oct 2 20:39:06.871780 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 20:39:06.871808 systemd[1]: Reached target system-config.target. Oct 2 20:39:06.890148 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 20:39:06.963154 bash[1387]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:39:06.963230 env[1356]: time="2023-10-02T20:39:06.957424000Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 20:39:06.963230 env[1356]: time="2023-10-02T20:39:06.957448040Z" level=info msg="metadata content store policy set" policy=shared Oct 2 20:39:06.890168 systemd[1]: Reached target user-config.target. Oct 2 20:39:06.898838 systemd[1]: Started systemd-logind.service. Oct 2 20:39:06.914668 systemd[1]: Started update-engine.service. Oct 2 20:39:06.924396 systemd[1]: Started locksmithd.service. Oct 2 20:39:06.950825 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 20:39:06.977334 tar[1345]: ./ptp Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980267240Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980311360Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980325480Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980359880Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980377320Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980391760Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.980623 env[1356]: time="2023-10-02T20:39:06.980404720Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.980958520Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.980988680Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.981003480Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.981015480Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.981027960Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.981152080Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 20:39:06.981410 env[1356]: time="2023-10-02T20:39:06.981232040Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.008984880Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009035400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009049800Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009121560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009135920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009149400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009161760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009174680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009186840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009198960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009216320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009231680Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009380200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009396560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010039 env[1356]: time="2023-10-02T20:39:07.009409280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010406 env[1356]: time="2023-10-02T20:39:07.009421440Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 20:39:07.010406 env[1356]: time="2023-10-02T20:39:07.009437240Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 20:39:07.010406 env[1356]: time="2023-10-02T20:39:07.009449120Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 20:39:07.010406 env[1356]: time="2023-10-02T20:39:07.009466720Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 20:39:07.010406 env[1356]: time="2023-10-02T20:39:07.009502920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 20:39:07.010503 env[1356]: time="2023-10-02T20:39:07.009729520Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 20:39:07.010503 env[1356]: time="2023-10-02T20:39:07.009786200Z" level=info msg="Connect containerd service" Oct 2 20:39:07.010503 env[1356]: time="2023-10-02T20:39:07.009829160Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020038600Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020249200Z" level=info msg="Start subscribing containerd event" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020292520Z" level=info msg="Start recovering state" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020355120Z" level=info msg="Start event monitor" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020426000Z" level=info msg="Start snapshots syncer" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020437440Z" level=info msg="Start cni network conf syncer for default" Oct 2 20:39:07.020553 env[1356]: time="2023-10-02T20:39:07.020446000Z" level=info msg="Start streaming server" Oct 2 20:39:07.021133 env[1356]: time="2023-10-02T20:39:07.021114680Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 20:39:07.021252 env[1356]: time="2023-10-02T20:39:07.021230800Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 20:39:07.021494 env[1356]: time="2023-10-02T20:39:07.021478600Z" level=info msg="containerd successfully booted in 0.169193s" Oct 2 20:39:07.051029 tar[1345]: ./vlan Oct 2 20:39:07.122606 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 20:39:07.128751 systemd[1]: Started containerd.service. Oct 2 20:39:07.130366 tar[1345]: ./host-device Oct 2 20:39:07.238197 tar[1345]: ./tuning Oct 2 20:39:07.272210 tar[1345]: ./vrf Oct 2 20:39:07.305398 tar[1345]: ./sbr Oct 2 20:39:07.339777 tar[1345]: ./tap Oct 2 20:39:07.378964 tar[1345]: ./dhcp Oct 2 20:39:07.473161 tar[1345]: ./static Oct 2 20:39:07.501431 tar[1345]: ./firewall Oct 2 20:39:07.545142 tar[1345]: ./macvlan Oct 2 20:39:07.576919 systemd[1]: Finished prepare-critools.service. Oct 2 20:39:07.592044 tar[1345]: ./dummy Oct 2 20:39:07.625481 tar[1345]: ./bridge Oct 2 20:39:07.661527 tar[1345]: ./ipvlan Oct 2 20:39:07.694220 tar[1345]: ./portmap Oct 2 20:39:07.725433 tar[1345]: ./host-local Oct 2 20:39:07.775832 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 20:39:08.107549 locksmithd[1408]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 20:39:08.754531 sshd_keygen[1351]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 20:39:08.785512 systemd[1]: Finished sshd-keygen.service. Oct 2 20:39:08.791460 systemd[1]: Starting issuegen.service... Oct 2 20:39:08.796349 systemd[1]: Started waagent.service. Oct 2 20:39:08.803772 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 20:39:08.803939 systemd[1]: Finished issuegen.service. Oct 2 20:39:08.809758 systemd[1]: Starting systemd-user-sessions.service... Oct 2 20:39:08.830542 systemd[1]: Finished systemd-user-sessions.service. Oct 2 20:39:08.838376 systemd[1]: Started getty@tty1.service. Oct 2 20:39:08.851745 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 2 20:39:08.858299 systemd[1]: Reached target getty.target. Oct 2 20:39:08.863377 systemd[1]: Reached target multi-user.target. Oct 2 20:39:08.869700 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 20:39:08.885920 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 20:39:08.886099 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 20:39:08.894818 systemd[1]: Startup finished in 776ms (kernel) + 11.678s (initrd) + 28.861s (userspace) = 41.317s. Oct 2 20:39:09.066063 login[1459]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 20:39:09.069579 login[1458]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:39:09.089141 systemd[1]: Created slice user-500.slice. Oct 2 20:39:09.090309 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 20:39:09.093912 systemd-logind[1338]: New session 2 of user core. Oct 2 20:39:09.110143 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 20:39:09.112526 systemd[1]: Starting user@500.service... Oct 2 20:39:09.124516 (systemd)[1462]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:09.259995 systemd[1462]: Queued start job for default target default.target. Oct 2 20:39:09.260860 systemd[1462]: Reached target paths.target. Oct 2 20:39:09.260982 systemd[1462]: Reached target sockets.target. Oct 2 20:39:09.261049 systemd[1462]: Reached target timers.target. Oct 2 20:39:09.261119 systemd[1462]: Reached target basic.target. Oct 2 20:39:09.261218 systemd[1462]: Reached target default.target. Oct 2 20:39:09.261324 systemd[1]: Started user@500.service. Oct 2 20:39:09.261324 systemd[1462]: Startup finished in 128ms. Oct 2 20:39:09.262321 systemd[1]: Started session-2.scope. Oct 2 20:39:10.067802 login[1459]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:39:10.072266 systemd[1]: Started session-1.scope. Oct 2 20:39:10.073361 systemd-logind[1338]: New session 1 of user core. Oct 2 20:39:10.914748 waagent[1452]: 2023-10-02T20:39:10.914646Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 20:39:10.921507 waagent[1452]: 2023-10-02T20:39:10.921434Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 20:39:10.926658 waagent[1452]: 2023-10-02T20:39:10.926582Z INFO Daemon Daemon Python: 3.9.16 Oct 2 20:39:10.931458 waagent[1452]: 2023-10-02T20:39:10.931391Z INFO Daemon Daemon Run daemon Oct 2 20:39:10.936232 waagent[1452]: 2023-10-02T20:39:10.936170Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 20:39:10.959284 waagent[1452]: 2023-10-02T20:39:10.959158Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:39:10.974874 waagent[1452]: 2023-10-02T20:39:10.974745Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:39:10.984970 waagent[1452]: 2023-10-02T20:39:10.984890Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:39:10.990714 waagent[1452]: 2023-10-02T20:39:10.990639Z INFO Daemon Daemon Using waagent for provisioning Oct 2 20:39:10.996713 waagent[1452]: 2023-10-02T20:39:10.996645Z INFO Daemon Daemon Activate resource disk Oct 2 20:39:11.001679 waagent[1452]: 2023-10-02T20:39:11.001615Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 20:39:11.016699 waagent[1452]: 2023-10-02T20:39:11.016631Z INFO Daemon Daemon Found device: None Oct 2 20:39:11.021705 waagent[1452]: 2023-10-02T20:39:11.021641Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 20:39:11.030362 waagent[1452]: 2023-10-02T20:39:11.030295Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 20:39:11.044414 waagent[1452]: 2023-10-02T20:39:11.044332Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:39:11.051638 waagent[1452]: 2023-10-02T20:39:11.051536Z INFO Daemon Daemon Running default provisioning handler Oct 2 20:39:11.069848 waagent[1452]: 2023-10-02T20:39:11.069713Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:39:11.085723 waagent[1452]: 2023-10-02T20:39:11.085566Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:39:11.096243 waagent[1452]: 2023-10-02T20:39:11.096150Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:39:11.102268 waagent[1452]: 2023-10-02T20:39:11.102195Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 20:39:11.159728 waagent[1452]: 2023-10-02T20:39:11.159539Z INFO Daemon Daemon Successfully mounted dvd Oct 2 20:39:11.205195 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 20:39:11.240227 waagent[1452]: 2023-10-02T20:39:11.240056Z INFO Daemon Daemon Detect protocol endpoint Oct 2 20:39:11.247468 waagent[1452]: 2023-10-02T20:39:11.247379Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:39:11.254457 waagent[1452]: 2023-10-02T20:39:11.254382Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 20:39:11.261726 waagent[1452]: 2023-10-02T20:39:11.261662Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 20:39:11.267313 waagent[1452]: 2023-10-02T20:39:11.267256Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 20:39:11.272716 waagent[1452]: 2023-10-02T20:39:11.272660Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 20:39:11.320642 waagent[1452]: 2023-10-02T20:39:11.320539Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 20:39:11.327949 waagent[1452]: 2023-10-02T20:39:11.327908Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 20:39:11.333567 waagent[1452]: 2023-10-02T20:39:11.333509Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 20:39:12.763700 waagent[1452]: 2023-10-02T20:39:12.763525Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 20:39:12.779490 waagent[1452]: 2023-10-02T20:39:12.779410Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 20:39:12.785712 waagent[1452]: 2023-10-02T20:39:12.785641Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 20:39:12.875190 waagent[1452]: 2023-10-02T20:39:12.875063Z INFO Daemon Daemon Found private key matching thumbprint 1D00DB21CD0DB8A91813EB84F5DCB88E8F3303C8 Oct 2 20:39:12.884318 waagent[1452]: 2023-10-02T20:39:12.884231Z INFO Daemon Daemon Certificate with thumbprint 311D639E44AAF270E114D4B8EE01A5D679B44465 has no matching private key. Oct 2 20:39:12.894400 waagent[1452]: 2023-10-02T20:39:12.894326Z INFO Daemon Daemon Fetch goal state completed Oct 2 20:39:12.921220 waagent[1452]: 2023-10-02T20:39:12.921161Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: b1ce1f70-cb2f-4b55-acec-96f4b5cd253c New eTag: 4278640660558166595] Oct 2 20:39:12.933642 waagent[1452]: 2023-10-02T20:39:12.933554Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:39:12.949929 waagent[1452]: 2023-10-02T20:39:12.949863Z INFO Daemon Daemon Starting provisioning Oct 2 20:39:12.956072 waagent[1452]: 2023-10-02T20:39:12.955984Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 20:39:12.961979 waagent[1452]: 2023-10-02T20:39:12.961904Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-81258c5509] Oct 2 20:39:12.982798 waagent[1452]: 2023-10-02T20:39:12.982670Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-81258c5509] Oct 2 20:39:12.989749 waagent[1452]: 2023-10-02T20:39:12.989669Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 20:39:12.996946 waagent[1452]: 2023-10-02T20:39:12.996876Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 20:39:13.017107 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 20:39:13.017271 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 20:39:13.017327 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 20:39:13.017553 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:39:13.022652 systemd-networkd[1217]: eth0: DHCPv6 lease lost Oct 2 20:39:13.023708 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.025025 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:39:13.025190 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:39:13.027128 systemd[1]: Starting systemd-networkd.service... Oct 2 20:39:13.063563 systemd-networkd[1505]: enP9114s1: Link UP Oct 2 20:39:13.063573 systemd-networkd[1505]: enP9114s1: Gained carrier Oct 2 20:39:13.064650 systemd-networkd[1505]: eth0: Link UP Oct 2 20:39:13.064668 systemd-networkd[1505]: eth0: Gained carrier Oct 2 20:39:13.064979 systemd-networkd[1505]: lo: Link UP Oct 2 20:39:13.064988 systemd-networkd[1505]: lo: Gained carrier Oct 2 20:39:13.065213 systemd-networkd[1505]: eth0: Gained IPv6LL Oct 2 20:39:13.065442 systemd-networkd[1505]: Enumeration completed Oct 2 20:39:13.065473 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.065540 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.065558 systemd[1]: Started systemd-networkd.service. Oct 2 20:39:13.067390 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:39:13.068398 waagent[1452]: 2023-10-02T20:39:13.068217Z INFO Daemon Daemon Create user account if not exists Oct 2 20:39:13.075585 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.075693 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.076751 waagent[1452]: 2023-10-02T20:39:13.076660Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 20:39:13.078477 systemd-networkd[1505]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:39:13.082955 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.083884 waagent[1452]: 2023-10-02T20:39:13.083796Z INFO Daemon Daemon Configure sudoer Oct 2 20:39:13.089507 waagent[1452]: 2023-10-02T20:39:13.089431Z INFO Daemon Daemon Configure sshd Oct 2 20:39:13.094188 waagent[1452]: 2023-10-02T20:39:13.094092Z INFO Daemon Daemon Deploy ssh public key. Oct 2 20:39:13.099344 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.112723 systemd-networkd[1505]: eth0: DHCPv4 address 10.200.20.43/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:39:13.113138 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.114082 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.114748 systemd-timesyncd[1298]: Network configuration changed, trying to establish connection. Oct 2 20:39:13.116124 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:39:14.314641 waagent[1452]: 2023-10-02T20:39:14.314555Z INFO Daemon Daemon Provisioning complete Oct 2 20:39:14.335457 waagent[1452]: 2023-10-02T20:39:14.335390Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 20:39:14.343228 waagent[1452]: 2023-10-02T20:39:14.343134Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 20:39:14.356988 waagent[1452]: 2023-10-02T20:39:14.356900Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 20:39:14.669951 waagent[1514]: 2023-10-02T20:39:14.669806Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 20:39:14.670780 waagent[1514]: 2023-10-02T20:39:14.670724Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:14.671316 waagent[1514]: 2023-10-02T20:39:14.670941Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:14.683908 waagent[1514]: 2023-10-02T20:39:14.683829Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 20:39:14.684081 waagent[1514]: 2023-10-02T20:39:14.684030Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 20:39:14.771239 waagent[1514]: 2023-10-02T20:39:14.771097Z INFO ExtHandler ExtHandler Found private key matching thumbprint 1D00DB21CD0DB8A91813EB84F5DCB88E8F3303C8 Oct 2 20:39:14.771492 waagent[1514]: 2023-10-02T20:39:14.771438Z INFO ExtHandler ExtHandler Certificate with thumbprint 311D639E44AAF270E114D4B8EE01A5D679B44465 has no matching private key. Oct 2 20:39:14.771758 waagent[1514]: 2023-10-02T20:39:14.771706Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 20:39:14.784927 waagent[1514]: 2023-10-02T20:39:14.784874Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b8a715db-f629-4f18-acff-e30c7aa40490 New eTag: 4278640660558166595] Oct 2 20:39:14.785534 waagent[1514]: 2023-10-02T20:39:14.785475Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:39:14.826637 waagent[1514]: 2023-10-02T20:39:14.826489Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:39:14.836614 waagent[1514]: 2023-10-02T20:39:14.836523Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1514 Oct 2 20:39:14.840639 waagent[1514]: 2023-10-02T20:39:14.840544Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:39:14.842102 waagent[1514]: 2023-10-02T20:39:14.842038Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:39:14.880122 waagent[1514]: 2023-10-02T20:39:14.880063Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:39:14.880741 waagent[1514]: 2023-10-02T20:39:14.880683Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:39:14.891872 waagent[1514]: 2023-10-02T20:39:14.891823Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:39:14.892521 waagent[1514]: 2023-10-02T20:39:14.892466Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:39:14.893769 waagent[1514]: 2023-10-02T20:39:14.893707Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 20:39:14.895191 waagent[1514]: 2023-10-02T20:39:14.895125Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:39:14.895578 waagent[1514]: 2023-10-02T20:39:14.895507Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:14.896064 waagent[1514]: 2023-10-02T20:39:14.895995Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:14.896687 waagent[1514]: 2023-10-02T20:39:14.896580Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:39:14.897127 waagent[1514]: 2023-10-02T20:39:14.897063Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:39:14.897668 waagent[1514]: 2023-10-02T20:39:14.897565Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:39:14.897668 waagent[1514]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:39:14.897668 waagent[1514]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:39:14.897668 waagent[1514]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:39:14.897668 waagent[1514]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:14.897668 waagent[1514]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:14.897668 waagent[1514]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:14.898265 waagent[1514]: 2023-10-02T20:39:14.898194Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:14.900405 waagent[1514]: 2023-10-02T20:39:14.900202Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:39:14.900682 waagent[1514]: 2023-10-02T20:39:14.900592Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:39:14.901181 waagent[1514]: 2023-10-02T20:39:14.901111Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:14.902145 waagent[1514]: 2023-10-02T20:39:14.902083Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:39:14.902741 waagent[1514]: 2023-10-02T20:39:14.902662Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:39:14.903094 waagent[1514]: 2023-10-02T20:39:14.903021Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:39:14.903339 waagent[1514]: 2023-10-02T20:39:14.903262Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:39:14.906027 waagent[1514]: 2023-10-02T20:39:14.905950Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:39:14.908363 waagent[1514]: 2023-10-02T20:39:14.908277Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:39:14.920073 waagent[1514]: 2023-10-02T20:39:14.919959Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 20:39:14.921016 waagent[1514]: 2023-10-02T20:39:14.920963Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:39:14.922774 waagent[1514]: 2023-10-02T20:39:14.922717Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 20:39:14.932641 waagent[1514]: 2023-10-02T20:39:14.932555Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1505' Oct 2 20:39:14.953194 waagent[1514]: 2023-10-02T20:39:14.953035Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:39:14.953194 waagent[1514]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:39:14.953194 waagent[1514]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:39:14.953194 waagent[1514]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:79:bd:0f brd ff:ff:ff:ff:ff:ff Oct 2 20:39:14.953194 waagent[1514]: 3: enP9114s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:79:bd:0f brd ff:ff:ff:ff:ff:ff\ altname enP9114p0s2 Oct 2 20:39:14.953194 waagent[1514]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:39:14.953194 waagent[1514]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:39:14.953194 waagent[1514]: 2: eth0 inet 10.200.20.43/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:39:14.953194 waagent[1514]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:39:14.953194 waagent[1514]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:39:14.953194 waagent[1514]: 2: eth0 inet6 fe80::222:48ff:fe79:bd0f/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:39:14.963962 waagent[1514]: 2023-10-02T20:39:14.963898Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 20:39:15.068460 waagent[1514]: 2023-10-02T20:39:15.068387Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Oct 2 20:39:15.360836 waagent[1452]: 2023-10-02T20:39:15.360654Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 20:39:15.367055 waagent[1452]: 2023-10-02T20:39:15.366993Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Oct 2 20:39:16.521631 waagent[1554]: 2023-10-02T20:39:16.521513Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Oct 2 20:39:16.522643 waagent[1554]: 2023-10-02T20:39:16.522569Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 20:39:16.522885 waagent[1554]: 2023-10-02T20:39:16.522835Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 20:39:16.533013 waagent[1554]: 2023-10-02T20:39:16.532909Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:39:16.533570 waagent[1554]: 2023-10-02T20:39:16.533516Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:16.533903 waagent[1554]: 2023-10-02T20:39:16.533850Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:16.547993 waagent[1554]: 2023-10-02T20:39:16.547907Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 20:39:16.557231 waagent[1554]: 2023-10-02T20:39:16.557168Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 20:39:16.558454 waagent[1554]: 2023-10-02T20:39:16.558397Z INFO ExtHandler Oct 2 20:39:16.558710 waagent[1554]: 2023-10-02T20:39:16.558658Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: a8f8472c-4753-4b9b-a89e-887eab1919d0 eTag: 4278640660558166595 source: Fabric] Oct 2 20:39:16.559564 waagent[1554]: 2023-10-02T20:39:16.559509Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 20:39:16.560922 waagent[1554]: 2023-10-02T20:39:16.560862Z INFO ExtHandler Oct 2 20:39:16.561137 waagent[1554]: 2023-10-02T20:39:16.561088Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 20:39:16.567432 waagent[1554]: 2023-10-02T20:39:16.567379Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 20:39:16.568080 waagent[1554]: 2023-10-02T20:39:16.568033Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:39:16.587684 waagent[1554]: 2023-10-02T20:39:16.587614Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 20:39:16.676425 waagent[1554]: 2023-10-02T20:39:16.676238Z INFO ExtHandler Downloaded certificate {'thumbprint': '311D639E44AAF270E114D4B8EE01A5D679B44465', 'hasPrivateKey': False} Oct 2 20:39:16.677757 waagent[1554]: 2023-10-02T20:39:16.677696Z INFO ExtHandler Downloaded certificate {'thumbprint': '1D00DB21CD0DB8A91813EB84F5DCB88E8F3303C8', 'hasPrivateKey': True} Oct 2 20:39:16.678958 waagent[1554]: 2023-10-02T20:39:16.678896Z INFO ExtHandler Fetch goal state completed Oct 2 20:39:16.703876 waagent[1554]: 2023-10-02T20:39:16.703792Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1554 Oct 2 20:39:16.707625 waagent[1554]: 2023-10-02T20:39:16.707535Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:39:16.709256 waagent[1554]: 2023-10-02T20:39:16.709196Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:39:16.716133 waagent[1554]: 2023-10-02T20:39:16.716081Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:39:16.716762 waagent[1554]: 2023-10-02T20:39:16.716704Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:39:16.728880 waagent[1554]: 2023-10-02T20:39:16.728825Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:39:16.729623 waagent[1554]: 2023-10-02T20:39:16.729546Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:39:16.738560 waagent[1554]: 2023-10-02T20:39:16.738439Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Oct 2 20:39:16.742959 waagent[1554]: 2023-10-02T20:39:16.742886Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 20:39:16.745142 waagent[1554]: 2023-10-02T20:39:16.745039Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:39:16.745380 waagent[1554]: 2023-10-02T20:39:16.745288Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:16.745681 waagent[1554]: 2023-10-02T20:39:16.745576Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:16.746386 waagent[1554]: 2023-10-02T20:39:16.746304Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:39:16.747184 waagent[1554]: 2023-10-02T20:39:16.747102Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:39:16.747184 waagent[1554]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:39:16.747184 waagent[1554]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:39:16.747184 waagent[1554]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:39:16.747184 waagent[1554]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:16.747184 waagent[1554]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:16.747184 waagent[1554]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:39:16.750240 waagent[1554]: 2023-10-02T20:39:16.750050Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:39:16.750866 waagent[1554]: 2023-10-02T20:39:16.750758Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:39:16.751389 waagent[1554]: 2023-10-02T20:39:16.751316Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:39:16.751978 waagent[1554]: 2023-10-02T20:39:16.751900Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:39:16.752482 waagent[1554]: 2023-10-02T20:39:16.752398Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:39:16.752630 waagent[1554]: 2023-10-02T20:39:16.752555Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:39:16.755768 waagent[1554]: 2023-10-02T20:39:16.755568Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:39:16.756490 waagent[1554]: 2023-10-02T20:39:16.756404Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:39:16.765101 waagent[1554]: 2023-10-02T20:39:16.765019Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:39:16.767074 waagent[1554]: 2023-10-02T20:39:16.764735Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:39:16.769399 waagent[1554]: 2023-10-02T20:39:16.769332Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:39:16.776806 waagent[1554]: 2023-10-02T20:39:16.776678Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:39:16.776806 waagent[1554]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:39:16.776806 waagent[1554]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:39:16.776806 waagent[1554]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:79:bd:0f brd ff:ff:ff:ff:ff:ff Oct 2 20:39:16.776806 waagent[1554]: 3: enP9114s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:79:bd:0f brd ff:ff:ff:ff:ff:ff\ altname enP9114p0s2 Oct 2 20:39:16.776806 waagent[1554]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:39:16.776806 waagent[1554]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:39:16.776806 waagent[1554]: 2: eth0 inet 10.200.20.43/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:39:16.776806 waagent[1554]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:39:16.776806 waagent[1554]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:39:16.776806 waagent[1554]: 2: eth0 inet6 fe80::222:48ff:fe79:bd0f/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:39:16.789863 waagent[1554]: 2023-10-02T20:39:16.789763Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Oct 2 20:39:16.791214 waagent[1554]: 2023-10-02T20:39:16.791141Z INFO ExtHandler ExtHandler Downloading manifest Oct 2 20:39:16.826389 waagent[1554]: 2023-10-02T20:39:16.826301Z INFO ExtHandler ExtHandler Oct 2 20:39:16.827868 waagent[1554]: 2023-10-02T20:39:16.827799Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d877eb2a-2252-4fe1-8252-07964fb9b70c correlation f4168991-7302-4861-a95b-f50f3b1c9979 created: 2023-10-02T20:38:06.252823Z] Oct 2 20:39:16.829123 waagent[1554]: 2023-10-02T20:39:16.829057Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 20:39:16.835044 waagent[1554]: 2023-10-02T20:39:16.834844Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 8 ms] Oct 2 20:39:16.875224 waagent[1554]: 2023-10-02T20:39:16.875135Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 20:39:16.895105 waagent[1554]: 2023-10-02T20:39:16.895017Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A1AD2A80-6C77-4414-8CF2-DC0128851EDE;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 20:39:16.904319 waagent[1554]: 2023-10-02T20:39:16.904188Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Oct 2 20:39:16.904319 waagent[1554]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:16.904319 waagent[1554]: pkts bytes target prot opt in out source destination Oct 2 20:39:16.904319 waagent[1554]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:16.904319 waagent[1554]: pkts bytes target prot opt in out source destination Oct 2 20:39:16.904319 waagent[1554]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:16.904319 waagent[1554]: pkts bytes target prot opt in out source destination Oct 2 20:39:16.904319 waagent[1554]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:39:16.904319 waagent[1554]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:39:16.904319 waagent[1554]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:39:16.915437 waagent[1554]: 2023-10-02T20:39:16.915264Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 20:39:16.915437 waagent[1554]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:16.915437 waagent[1554]: pkts bytes target prot opt in out source destination Oct 2 20:39:16.915437 waagent[1554]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:16.915437 waagent[1554]: pkts bytes target prot opt in out source destination Oct 2 20:39:16.915437 waagent[1554]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:39:16.915437 waagent[1554]: pkts bytes target prot opt in out source destination Oct 2 20:39:16.915437 waagent[1554]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:39:16.915437 waagent[1554]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:39:16.915437 waagent[1554]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:39:16.916356 waagent[1554]: 2023-10-02T20:39:16.916306Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 20:39:35.821531 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Oct 2 20:39:42.654927 systemd[1]: Created slice system-sshd.slice. Oct 2 20:39:42.656081 systemd[1]: Started sshd@0-10.200.20.43:22-10.200.12.6:58718.service. Oct 2 20:39:43.114781 sshd[1599]: Accepted publickey for core from 10.200.12.6 port 58718 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:43.121705 sshd[1599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:43.126139 systemd-logind[1338]: New session 3 of user core. Oct 2 20:39:43.126203 systemd[1]: Started session-3.scope. Oct 2 20:39:43.353490 systemd-timesyncd[1298]: Contacted time server 64.142.54.12:123 (0.flatcar.pool.ntp.org). Oct 2 20:39:43.353552 systemd-timesyncd[1298]: Initial clock synchronization to Mon 2023-10-02 20:39:43.375346 UTC. Oct 2 20:39:43.469564 systemd[1]: Started sshd@1-10.200.20.43:22-10.200.12.6:58726.service. Oct 2 20:39:43.867445 sshd[1604]: Accepted publickey for core from 10.200.12.6 port 58726 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:43.869517 sshd[1604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:43.874146 systemd[1]: Started session-4.scope. Oct 2 20:39:43.875299 systemd-logind[1338]: New session 4 of user core. Oct 2 20:39:44.162532 sshd[1604]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:44.165868 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 20:39:44.165869 systemd-logind[1338]: Session 4 logged out. Waiting for processes to exit. Oct 2 20:39:44.166845 systemd[1]: sshd@1-10.200.20.43:22-10.200.12.6:58726.service: Deactivated successfully. Oct 2 20:39:44.167877 systemd-logind[1338]: Removed session 4. Oct 2 20:39:44.229140 systemd[1]: Started sshd@2-10.200.20.43:22-10.200.12.6:58738.service. Oct 2 20:39:44.628062 sshd[1610]: Accepted publickey for core from 10.200.12.6 port 58738 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:44.629732 sshd[1610]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:44.633652 systemd-logind[1338]: New session 5 of user core. Oct 2 20:39:44.634130 systemd[1]: Started session-5.scope. Oct 2 20:39:44.983972 systemd[1]: Started sshd@3-10.200.20.43:22-10.200.12.6:58740.service. Oct 2 20:39:45.249575 sshd[1610]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:45.252615 systemd[1]: sshd@2-10.200.20.43:22-10.200.12.6:58738.service: Deactivated successfully. Oct 2 20:39:45.253389 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 20:39:45.254024 systemd-logind[1338]: Session 5 logged out. Waiting for processes to exit. Oct 2 20:39:45.255047 systemd-logind[1338]: Removed session 5. Oct 2 20:39:45.383128 sshd[1615]: Accepted publickey for core from 10.200.12.6 port 58740 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:45.385070 sshd[1615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:45.389439 systemd[1]: Started session-6.scope. Oct 2 20:39:45.390041 systemd-logind[1338]: New session 6 of user core. Oct 2 20:39:45.748191 systemd[1]: Started sshd@4-10.200.20.43:22-10.200.12.6:58752.service. Oct 2 20:39:46.010616 sshd[1615]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:46.013104 systemd[1]: sshd@3-10.200.20.43:22-10.200.12.6:58740.service: Deactivated successfully. Oct 2 20:39:46.013838 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 20:39:46.014733 systemd-logind[1338]: Session 6 logged out. Waiting for processes to exit. Oct 2 20:39:46.015699 systemd-logind[1338]: Removed session 6. Oct 2 20:39:46.148807 sshd[1621]: Accepted publickey for core from 10.200.12.6 port 58752 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:46.151660 sshd[1621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:46.155654 systemd-logind[1338]: New session 7 of user core. Oct 2 20:39:46.156366 systemd[1]: Started session-7.scope. Oct 2 20:39:46.448508 sudo[1625]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 20:39:46.448753 sudo[1625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:46.470740 dbus-daemon[1324]: avc: received setenforce notice (enforcing=1) Oct 2 20:39:46.472412 sudo[1625]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:46.540066 sshd[1621]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:46.543782 systemd-logind[1338]: Session 7 logged out. Waiting for processes to exit. Oct 2 20:39:46.544290 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 20:39:46.544852 systemd[1]: sshd@4-10.200.20.43:22-10.200.12.6:58752.service: Deactivated successfully. Oct 2 20:39:46.545858 systemd-logind[1338]: Removed session 7. Oct 2 20:39:46.608020 systemd[1]: Started sshd@5-10.200.20.43:22-10.200.12.6:58760.service. Oct 2 20:39:47.012840 sshd[1629]: Accepted publickey for core from 10.200.12.6 port 58760 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:47.014553 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:47.018497 systemd-logind[1338]: New session 8 of user core. Oct 2 20:39:47.018939 systemd[1]: Started session-8.scope. Oct 2 20:39:47.252557 sudo[1633]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 20:39:47.252778 sudo[1633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:47.257760 sudo[1633]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:47.265564 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 20:39:47.266137 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:47.277764 systemd[1]: Stopping audit-rules.service... Oct 2 20:39:47.279000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:39:47.280570 auditctl[1636]: No rules Oct 2 20:39:47.284348 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 20:39:47.284396 kernel: audit: type=1305 audit(1696279187.279:163): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:39:47.284682 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 20:39:47.284862 systemd[1]: Stopped audit-rules.service. Oct 2 20:39:47.286365 systemd[1]: Starting audit-rules.service... Oct 2 20:39:47.279000 audit[1636]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcb952e30 a2=420 a3=0 items=0 ppid=1 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:47.319882 kernel: audit: type=1300 audit(1696279187.279:163): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcb952e30 a2=420 a3=0 items=0 ppid=1 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:47.279000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:39:47.327947 kernel: audit: type=1327 audit(1696279187.279:163): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:39:47.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.345732 kernel: audit: type=1131 audit(1696279187.284:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.366669 augenrules[1653]: No rules Oct 2 20:39:47.367721 systemd[1]: Finished audit-rules.service. Oct 2 20:39:47.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.369871 sudo[1632]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:47.369000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.404246 kernel: audit: type=1130 audit(1696279187.367:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.404309 kernel: audit: type=1106 audit(1696279187.369:166): pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.369000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.421866 kernel: audit: type=1104 audit(1696279187.369:167): pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.434540 sshd[1629]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:47.434000 audit[1629]: USER_END pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.437089 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 20:39:47.437669 systemd[1]: sshd@5-10.200.20.43:22-10.200.12.6:58760.service: Deactivated successfully. Oct 2 20:39:47.439118 systemd-logind[1338]: Session 8 logged out. Waiting for processes to exit. Oct 2 20:39:47.439819 systemd-logind[1338]: Removed session 8. Oct 2 20:39:47.434000 audit[1629]: CRED_DISP pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.480952 kernel: audit: type=1106 audit(1696279187.434:168): pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.481020 kernel: audit: type=1104 audit(1696279187.434:169): pid=1629 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.43:22-10.200.12.6:58760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.499162 kernel: audit: type=1131 audit(1696279187.437:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.43:22-10.200.12.6:58760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.499490 systemd[1]: Started sshd@6-10.200.20.43:22-10.200.12.6:34002.service. Oct 2 20:39:47.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.43:22-10.200.12.6:34002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:47.898000 audit[1659]: USER_ACCT pid=1659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.899533 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 34002 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:47.900000 audit[1659]: CRED_ACQ pid=1659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.900000 audit[1659]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7cd7e30 a2=3 a3=1 items=0 ppid=1 pid=1659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:47.900000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:39:47.901421 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:47.905425 systemd-logind[1338]: New session 9 of user core. Oct 2 20:39:47.905924 systemd[1]: Started session-9.scope. Oct 2 20:39:47.909000 audit[1659]: USER_START pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:47.912000 audit[1664]: CRED_ACQ pid=1664 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:48.130000 audit[1665]: USER_ACCT pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.131130 sudo[1665]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 20:39:48.130000 audit[1665]: CRED_REFR pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.131697 sudo[1665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:39:48.132000 audit[1665]: USER_START pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:48.701002 systemd[1]: Reloading. Oct 2 20:39:48.794949 /usr/lib/systemd/system-generators/torcx-generator[1694]: time="2023-10-02T20:39:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:39:48.795388 /usr/lib/systemd/system-generators/torcx-generator[1694]: time="2023-10-02T20:39:48Z" level=info msg="torcx already run" Oct 2 20:39:48.917280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:39:48.917462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:39:48.932935 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:39:49.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.001000 audit: BPF prog-id=32 op=LOAD Oct 2 20:39:49.001000 audit: BPF prog-id=21 op=UNLOAD Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit: BPF prog-id=33 op=LOAD Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.002000 audit: BPF prog-id=34 op=LOAD Oct 2 20:39:49.003000 audit: BPF prog-id=22 op=UNLOAD Oct 2 20:39:49.003000 audit: BPF prog-id=23 op=UNLOAD Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.004000 audit: BPF prog-id=35 op=LOAD Oct 2 20:39:49.004000 audit: BPF prog-id=31 op=UNLOAD Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit: BPF prog-id=36 op=LOAD Oct 2 20:39:49.006000 audit: BPF prog-id=25 op=UNLOAD Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit: BPF prog-id=37 op=LOAD Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.007000 audit: BPF prog-id=38 op=LOAD Oct 2 20:39:49.007000 audit: BPF prog-id=18 op=UNLOAD Oct 2 20:39:49.007000 audit: BPF prog-id=19 op=UNLOAD Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.008000 audit: BPF prog-id=39 op=LOAD Oct 2 20:39:49.009000 audit: BPF prog-id=26 op=UNLOAD Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit: BPF prog-id=40 op=LOAD Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.009000 audit: BPF prog-id=41 op=LOAD Oct 2 20:39:49.010000 audit: BPF prog-id=27 op=UNLOAD Oct 2 20:39:49.010000 audit: BPF prog-id=28 op=UNLOAD Oct 2 20:39:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit: BPF prog-id=42 op=LOAD Oct 2 20:39:49.013000 audit: BPF prog-id=24 op=UNLOAD Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.014000 audit: BPF prog-id=43 op=LOAD Oct 2 20:39:49.014000 audit: BPF prog-id=29 op=UNLOAD Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.015000 audit: BPF prog-id=44 op=LOAD Oct 2 20:39:49.016000 audit: BPF prog-id=15 op=UNLOAD Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit: BPF prog-id=45 op=LOAD Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:49.016000 audit: BPF prog-id=46 op=LOAD Oct 2 20:39:49.017000 audit: BPF prog-id=16 op=UNLOAD Oct 2 20:39:49.017000 audit: BPF prog-id=17 op=UNLOAD Oct 2 20:39:49.033049 systemd[1]: Started kubelet.service. Oct 2 20:39:49.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:49.048336 systemd[1]: Starting coreos-metadata.service... Oct 2 20:39:49.094147 coreos-metadata[1761]: Oct 02 20:39:49.094 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:39:49.097226 coreos-metadata[1761]: Oct 02 20:39:49.097 INFO Fetch successful Oct 2 20:39:49.097226 coreos-metadata[1761]: Oct 02 20:39:49.097 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Oct 2 20:39:49.099116 coreos-metadata[1761]: Oct 02 20:39:49.098 INFO Fetch successful Oct 2 20:39:49.099116 coreos-metadata[1761]: Oct 02 20:39:49.099 INFO Fetching http://168.63.129.16/machine/3dd98479-5b57-47ae-bf36-d2b91a8fc29f/ba09efc1%2Da8ab%2D48a3%2D9e7c%2Dc0d9639c6dbd.%5Fci%2D3510.3.0%2Da%2D81258c5509?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Oct 2 20:39:49.100970 coreos-metadata[1761]: Oct 02 20:39:49.100 INFO Fetch successful Oct 2 20:39:49.130164 kubelet[1753]: E1002 20:39:49.130111 1753 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:39:49.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:39:49.132508 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:39:49.132677 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:39:49.138366 coreos-metadata[1761]: Oct 02 20:39:49.138 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:39:49.151594 coreos-metadata[1761]: Oct 02 20:39:49.151 INFO Fetch successful Oct 2 20:39:49.165199 systemd[1]: Finished coreos-metadata.service. Oct 2 20:39:49.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:50.169835 systemd[1]: Stopped kubelet.service. Oct 2 20:39:50.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:50.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:50.195799 systemd[1]: Reloading. Oct 2 20:39:50.277651 /usr/lib/systemd/system-generators/torcx-generator[1817]: time="2023-10-02T20:39:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:39:50.277689 /usr/lib/systemd/system-generators/torcx-generator[1817]: time="2023-10-02T20:39:50Z" level=info msg="torcx already run" Oct 2 20:39:50.415345 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:39:50.415366 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:39:50.430558 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit: BPF prog-id=47 op=LOAD Oct 2 20:39:50.498000 audit: BPF prog-id=32 op=UNLOAD Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit: BPF prog-id=48 op=LOAD Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.498000 audit: BPF prog-id=49 op=LOAD Oct 2 20:39:50.498000 audit: BPF prog-id=33 op=UNLOAD Oct 2 20:39:50.498000 audit: BPF prog-id=34 op=UNLOAD Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.499000 audit: BPF prog-id=50 op=LOAD Oct 2 20:39:50.499000 audit: BPF prog-id=35 op=UNLOAD Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit: BPF prog-id=51 op=LOAD Oct 2 20:39:50.500000 audit: BPF prog-id=36 op=UNLOAD Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit: BPF prog-id=52 op=LOAD Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit: BPF prog-id=53 op=LOAD Oct 2 20:39:50.501000 audit: BPF prog-id=37 op=UNLOAD Oct 2 20:39:50.501000 audit: BPF prog-id=38 op=UNLOAD Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit: BPF prog-id=54 op=LOAD Oct 2 20:39:50.501000 audit: BPF prog-id=39 op=UNLOAD Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit: BPF prog-id=55 op=LOAD Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.502000 audit: BPF prog-id=56 op=LOAD Oct 2 20:39:50.502000 audit: BPF prog-id=40 op=UNLOAD Oct 2 20:39:50.502000 audit: BPF prog-id=41 op=UNLOAD Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.504000 audit: BPF prog-id=57 op=LOAD Oct 2 20:39:50.504000 audit: BPF prog-id=42 op=UNLOAD Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.505000 audit: BPF prog-id=58 op=LOAD Oct 2 20:39:50.505000 audit: BPF prog-id=43 op=UNLOAD Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit: BPF prog-id=59 op=LOAD Oct 2 20:39:50.506000 audit: BPF prog-id=44 op=UNLOAD Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit: BPF prog-id=60 op=LOAD Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:50.506000 audit: BPF prog-id=61 op=LOAD Oct 2 20:39:50.506000 audit: BPF prog-id=45 op=UNLOAD Oct 2 20:39:50.506000 audit: BPF prog-id=46 op=UNLOAD Oct 2 20:39:50.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:50.530035 systemd[1]: Started kubelet.service. Oct 2 20:39:50.600161 kubelet[1877]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:39:50.600479 kubelet[1877]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 20:39:50.600524 kubelet[1877]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:39:50.600740 kubelet[1877]: I1002 20:39:50.600708 1877 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:39:51.199672 kubelet[1877]: I1002 20:39:51.199644 1877 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 20:39:51.199838 kubelet[1877]: I1002 20:39:51.199817 1877 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:39:51.200128 kubelet[1877]: I1002 20:39:51.200113 1877 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 20:39:51.203647 kubelet[1877]: I1002 20:39:51.203614 1877 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:39:51.206727 kubelet[1877]: W1002 20:39:51.206713 1877 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:39:51.207420 kubelet[1877]: I1002 20:39:51.207397 1877 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:39:51.207806 kubelet[1877]: I1002 20:39:51.207793 1877 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:39:51.207947 kubelet[1877]: I1002 20:39:51.207936 1877 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:39:51.208096 kubelet[1877]: I1002 20:39:51.208084 1877 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:39:51.208164 kubelet[1877]: I1002 20:39:51.208156 1877 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 20:39:51.208334 kubelet[1877]: I1002 20:39:51.208322 1877 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:39:51.214367 kubelet[1877]: I1002 20:39:51.214331 1877 kubelet.go:405] "Attempting to sync node with API server" Oct 2 20:39:51.214367 kubelet[1877]: I1002 20:39:51.214363 1877 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:39:51.214459 kubelet[1877]: I1002 20:39:51.214436 1877 kubelet.go:309] "Adding apiserver pod source" Oct 2 20:39:51.214500 kubelet[1877]: I1002 20:39:51.214474 1877 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:39:51.215393 kubelet[1877]: E1002 20:39:51.215373 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:51.215485 kubelet[1877]: E1002 20:39:51.215475 1877 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:51.215981 kubelet[1877]: I1002 20:39:51.215950 1877 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:39:51.216400 kubelet[1877]: W1002 20:39:51.216373 1877 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 20:39:51.217035 kubelet[1877]: I1002 20:39:51.217005 1877 server.go:1168] "Started kubelet" Oct 2 20:39:51.217719 kubelet[1877]: I1002 20:39:51.217694 1877 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:39:51.219410 kubelet[1877]: E1002 20:39:51.219396 1877 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:39:51.218000 audit[1877]: AVC avc: denied { mac_admin } for pid=1877 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.218000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:39:51.218000 audit[1877]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d47740 a1=4000d409a8 a2=4000d47710 a3=25 items=0 ppid=1 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.218000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:39:51.219717 kubelet[1877]: E1002 20:39:51.219702 1877 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:39:51.219964 kubelet[1877]: I1002 20:39:51.219936 1877 server.go:461] "Adding debug handlers to kubelet server" Oct 2 20:39:51.220057 kubelet[1877]: I1002 20:39:51.219450 1877 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:39:51.219000 audit[1877]: AVC avc: denied { mac_admin } for pid=1877 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.219000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:39:51.219000 audit[1877]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009de0c0 a1=40009c8090 a2=400098e1e0 a3=25 items=0 ppid=1 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.219000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:39:51.220376 kubelet[1877]: I1002 20:39:51.220317 1877 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:39:51.220604 kubelet[1877]: I1002 20:39:51.220583 1877 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:39:51.221029 kubelet[1877]: I1002 20:39:51.220999 1877 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 20:39:51.225000 audit[1888]: NETFILTER_CFG table=mangle:8 family=2 entries=2 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.225000 audit[1888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffdd2b2e0 a2=0 a3=1 items=0 ppid=1877 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:39:51.226860 kubelet[1877]: E1002 20:39:51.226792 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:51.226931 kubelet[1877]: I1002 20:39:51.226876 1877 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 20:39:51.227007 kubelet[1877]: I1002 20:39:51.226988 1877 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 20:39:51.227000 audit[1889]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.227000 audit[1889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd9c9d780 a2=0 a3=1 items=0 ppid=1877 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:39:51.229135 kubelet[1877]: W1002 20:39:51.229105 1877 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:51.229135 kubelet[1877]: E1002 20:39:51.229137 1877 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 20:39:51.229262 kubelet[1877]: E1002 20:39:51.229165 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efe860071d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 216981789, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 216981789, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.229421 kubelet[1877]: W1002 20:39:51.229374 1877 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:51.229421 kubelet[1877]: E1002 20:39:51.229410 1877 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 20:39:51.229493 kubelet[1877]: W1002 20:39:51.229436 1877 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:51.229493 kubelet[1877]: E1002 20:39:51.229445 1877 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:51.231000 audit[1891]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.231000 audit[1891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffddab3cf0 a2=0 a3=1 items=0 ppid=1877 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:39:51.234000 audit[1893]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.234000 audit[1893]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdc03de50 a2=0 a3=1 items=0 ppid=1877 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:39:51.251466 kubelet[1877]: E1002 20:39:51.251425 1877 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.43\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 2 20:39:51.251567 kubelet[1877]: E1002 20:39:51.251485 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efe8895678", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 219689080, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 219689080, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.257083 kubelet[1877]: I1002 20:39:51.257060 1877 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:39:51.257296 kubelet[1877]: I1002 20:39:51.257284 1877 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:39:51.257372 kubelet[1877]: I1002 20:39:51.257363 1877 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:39:51.257509 kubelet[1877]: E1002 20:39:51.257408 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab60e6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256174188, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256174188, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.258290 kubelet[1877]: E1002 20:39:51.258213 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab62609", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256180233, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256180233, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.259031 kubelet[1877]: E1002 20:39:51.258939 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab63174", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256183156, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256183156, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.258000 audit[1898]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.258000 audit[1898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc3ea42f0 a2=0 a3=1 items=0 ppid=1877 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 20:39:51.259488 kubelet[1877]: I1002 20:39:51.259474 1877 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:39:51.261000 audit[1902]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.261000 audit[1902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6b62b70 a2=0 a3=1 items=0 ppid=1877 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:39:51.261000 audit[1901]: NETFILTER_CFG table=mangle:14 family=10 entries=2 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:51.261000 audit[1901]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffede4b830 a2=0 a3=1 items=0 ppid=1877 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:39:51.262326 kubelet[1877]: I1002 20:39:51.262312 1877 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:39:51.262431 kubelet[1877]: I1002 20:39:51.262420 1877 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 20:39:51.262737 kubelet[1877]: I1002 20:39:51.262724 1877 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 20:39:51.262862 kubelet[1877]: E1002 20:39:51.262851 1877 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 20:39:51.264072 kubelet[1877]: W1002 20:39:51.264052 1877 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:51.264293 kubelet[1877]: E1002 20:39:51.264285 1877 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 20:39:51.264466 kubelet[1877]: I1002 20:39:51.264220 1877 policy_none.go:49] "None policy: Start" Oct 2 20:39:51.265336 kubelet[1877]: I1002 20:39:51.265321 1877 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:39:51.265514 kubelet[1877]: I1002 20:39:51.265504 1877 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:39:51.265000 audit[1903]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:51.265000 audit[1903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8fae630 a2=0 a3=1 items=0 ppid=1877 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:39:51.266000 audit[1905]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.266000 audit[1905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff3075580 a2=0 a3=1 items=0 ppid=1877 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:39:51.267000 audit[1906]: NETFILTER_CFG table=nat:17 family=10 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:51.267000 audit[1906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd74797c0 a2=0 a3=1 items=0 ppid=1877 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:39:51.269000 audit[1908]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:51.269000 audit[1908]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef5a1a20 a2=0 a3=1 items=0 ppid=1877 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:39:51.269000 audit[1907]: NETFILTER_CFG table=filter:19 family=10 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:51.269000 audit[1907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffff470fb0 a2=0 a3=1 items=0 ppid=1877 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:39:51.278135 systemd[1]: Created slice kubepods.slice. Oct 2 20:39:51.282013 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 20:39:51.285367 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 20:39:51.299351 kubelet[1877]: I1002 20:39:51.299324 1877 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:39:51.298000 audit[1877]: AVC avc: denied { mac_admin } for pid=1877 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:51.298000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:39:51.298000 audit[1877]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000eaade0 a1=4000ecf410 a2=4000eaadb0 a3=25 items=0 ppid=1 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:51.298000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:39:51.300788 kubelet[1877]: I1002 20:39:51.300758 1877 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:39:51.301051 kubelet[1877]: I1002 20:39:51.301021 1877 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:39:51.302418 kubelet[1877]: E1002 20:39:51.302253 1877 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.43\" not found" Oct 2 20:39:51.302893 kubelet[1877]: E1002 20:39:51.302674 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efed6a8a47", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 301556807, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 301556807, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.328050 kubelet[1877]: I1002 20:39:51.328008 1877 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.43" Oct 2 20:39:51.329925 kubelet[1877]: E1002 20:39:51.329905 1877 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.43" Oct 2 20:39:51.330043 kubelet[1877]: E1002 20:39:51.329896 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab60e6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256174188, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 327958406, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab60e6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.330943 kubelet[1877]: E1002 20:39:51.330890 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab62609", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256180233, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 327972899, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab62609" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.331783 kubelet[1877]: E1002 20:39:51.331725 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab63174", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256183156, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 327976101, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab63174" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.455645 kubelet[1877]: E1002 20:39:51.453369 1877 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.43\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 2 20:39:51.531501 kubelet[1877]: I1002 20:39:51.531478 1877 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.43" Oct 2 20:39:51.533026 kubelet[1877]: E1002 20:39:51.532942 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab60e6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256174188, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 531419286, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab60e6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.533506 kubelet[1877]: E1002 20:39:51.533489 1877 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.43" Oct 2 20:39:51.534060 kubelet[1877]: E1002 20:39:51.533993 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab62609", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256180233, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 531431897, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab62609" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.534956 kubelet[1877]: E1002 20:39:51.534881 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab63174", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256183156, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 531434739, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab63174" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.854685 kubelet[1877]: E1002 20:39:51.854570 1877 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.43\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 2 20:39:51.934708 kubelet[1877]: I1002 20:39:51.934681 1877 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.43" Oct 2 20:39:51.935692 kubelet[1877]: E1002 20:39:51.935614 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab60e6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.43 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256174188, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 934638484, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab60e6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.935930 kubelet[1877]: E1002 20:39:51.935794 1877 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.43" Oct 2 20:39:51.936638 kubelet[1877]: E1002 20:39:51.936565 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab62609", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.43 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256180233, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 934652096, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab62609" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:51.937459 kubelet[1877]: E1002 20:39:51.937406 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43.178a64efeab63174", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.43", UID:"10.200.20.43", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.43 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 256183156, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 39, 51, 934655178, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.43.178a64efeab63174" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 20:39:52.104959 kubelet[1877]: W1002 20:39:52.104860 1877 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:52.104959 kubelet[1877]: E1002 20:39:52.104894 1877 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.43" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 20:39:52.202328 kubelet[1877]: I1002 20:39:52.202294 1877 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 20:39:52.215722 kubelet[1877]: E1002 20:39:52.215701 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:52.579735 update_engine[1341]: I1002 20:39:52.579692 1341 update_attempter.cc:505] Updating boot flags... Oct 2 20:39:52.616340 kubelet[1877]: E1002 20:39:52.616318 1877 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.43" not found Oct 2 20:39:52.693844 kubelet[1877]: E1002 20:39:52.693809 1877 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.43\" not found" node="10.200.20.43" Oct 2 20:39:52.736722 kubelet[1877]: I1002 20:39:52.736690 1877 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.43" Oct 2 20:39:52.766648 kubelet[1877]: I1002 20:39:52.766493 1877 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.43" Oct 2 20:39:52.785009 kubelet[1877]: E1002 20:39:52.784985 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:52.885806 kubelet[1877]: E1002 20:39:52.885721 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:52.987265 kubelet[1877]: E1002 20:39:52.987229 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.044000 audit[1665]: USER_END pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.046273 sudo[1665]: pam_unix(sudo:session): session closed for user root Oct 2 20:39:53.051189 kernel: kauditd_printk_skb: 409 callbacks suppressed Oct 2 20:39:53.051251 kernel: audit: type=1106 audit(1696279193.044:545): pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.044000 audit[1665]: CRED_DISP pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.087568 kubelet[1877]: E1002 20:39:53.087524 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.091387 kernel: audit: type=1104 audit(1696279193.044:546): pid=1665 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.112830 sshd[1659]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:53.113000 audit[1659]: USER_END pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.115930 systemd[1]: sshd@6-10.200.20.43:22-10.200.12.6:34002.service: Deactivated successfully. Oct 2 20:39:53.116691 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 20:39:53.113000 audit[1659]: CRED_DISP pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.141649 kernel: audit: type=1106 audit(1696279193.113:547): pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.141702 kernel: audit: type=1104 audit(1696279193.113:548): pid=1659 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.141338 systemd-logind[1338]: Session 9 logged out. Waiting for processes to exit. Oct 2 20:39:53.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.43:22-10.200.12.6:34002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.184968 kernel: audit: type=1131 audit(1696279193.114:549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.43:22-10.200.12.6:34002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.185245 systemd-logind[1338]: Removed session 9. Oct 2 20:39:53.188242 kubelet[1877]: E1002 20:39:53.188216 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.216547 kubelet[1877]: E1002 20:39:53.216501 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:53.289134 kubelet[1877]: E1002 20:39:53.289108 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.389780 kubelet[1877]: E1002 20:39:53.389756 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.490236 kubelet[1877]: E1002 20:39:53.490210 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.590747 kubelet[1877]: E1002 20:39:53.590714 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.691178 kubelet[1877]: E1002 20:39:53.691161 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.791967 kubelet[1877]: E1002 20:39:53.791770 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.892281 kubelet[1877]: E1002 20:39:53.892257 1877 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.43\" not found" Oct 2 20:39:53.993283 kubelet[1877]: I1002 20:39:53.993255 1877 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 20:39:53.993712 env[1356]: time="2023-10-02T20:39:53.993626726Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 20:39:53.994105 kubelet[1877]: I1002 20:39:53.994092 1877 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 20:39:54.216667 kubelet[1877]: E1002 20:39:54.216641 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:54.216830 kubelet[1877]: I1002 20:39:54.216643 1877 apiserver.go:52] "Watching apiserver" Oct 2 20:39:54.219590 kubelet[1877]: I1002 20:39:54.219545 1877 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:39:54.219720 kubelet[1877]: I1002 20:39:54.219701 1877 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:39:54.226286 systemd[1]: Created slice kubepods-besteffort-pod882f9441_5825_4f65_b4d7_4cf3d5586dd7.slice. Oct 2 20:39:54.229898 kubelet[1877]: I1002 20:39:54.229849 1877 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 20:39:54.241237 systemd[1]: Created slice kubepods-besteffort-pod3e229853_b098_4e91_ba7c_c35e29e5babf.slice. Oct 2 20:39:54.246180 kubelet[1877]: I1002 20:39:54.246122 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-xtables-lock\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246180 kubelet[1877]: I1002 20:39:54.246164 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-policysync\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246338 kubelet[1877]: I1002 20:39:54.246185 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e229853-b098-4e91-ba7c-c35e29e5babf-tigera-ca-bundle\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246338 kubelet[1877]: I1002 20:39:54.246214 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-var-lib-calico\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246338 kubelet[1877]: I1002 20:39:54.246236 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-cni-log-dir\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246338 kubelet[1877]: I1002 20:39:54.246259 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x489k\" (UniqueName: \"kubernetes.io/projected/882f9441-5825-4f65-b4d7-4cf3d5586dd7-kube-api-access-x489k\") pod \"kube-proxy-mscr7\" (UID: \"882f9441-5825-4f65-b4d7-4cf3d5586dd7\") " pod="kube-system/kube-proxy-mscr7" Oct 2 20:39:54.246338 kubelet[1877]: I1002 20:39:54.246289 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-var-run-calico\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246451 kubelet[1877]: I1002 20:39:54.246308 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-cni-bin-dir\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246451 kubelet[1877]: I1002 20:39:54.246329 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-cni-net-dir\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246451 kubelet[1877]: I1002 20:39:54.246356 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/882f9441-5825-4f65-b4d7-4cf3d5586dd7-kube-proxy\") pod \"kube-proxy-mscr7\" (UID: \"882f9441-5825-4f65-b4d7-4cf3d5586dd7\") " pod="kube-system/kube-proxy-mscr7" Oct 2 20:39:54.246451 kubelet[1877]: I1002 20:39:54.246376 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/882f9441-5825-4f65-b4d7-4cf3d5586dd7-xtables-lock\") pod \"kube-proxy-mscr7\" (UID: \"882f9441-5825-4f65-b4d7-4cf3d5586dd7\") " pod="kube-system/kube-proxy-mscr7" Oct 2 20:39:54.246451 kubelet[1877]: I1002 20:39:54.246392 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/882f9441-5825-4f65-b4d7-4cf3d5586dd7-lib-modules\") pod \"kube-proxy-mscr7\" (UID: \"882f9441-5825-4f65-b4d7-4cf3d5586dd7\") " pod="kube-system/kube-proxy-mscr7" Oct 2 20:39:54.246557 kubelet[1877]: I1002 20:39:54.246415 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-lib-modules\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246557 kubelet[1877]: I1002 20:39:54.246446 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3e229853-b098-4e91-ba7c-c35e29e5babf-node-certs\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246557 kubelet[1877]: I1002 20:39:54.246469 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3e229853-b098-4e91-ba7c-c35e29e5babf-flexvol-driver-host\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246557 kubelet[1877]: I1002 20:39:54.246494 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7w8m\" (UniqueName: \"kubernetes.io/projected/3e229853-b098-4e91-ba7c-c35e29e5babf-kube-api-access-z7w8m\") pod \"calico-node-84kfj\" (UID: \"3e229853-b098-4e91-ba7c-c35e29e5babf\") " pod="calico-system/calico-node-84kfj" Oct 2 20:39:54.246557 kubelet[1877]: I1002 20:39:54.246512 1877 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:39:54.355614 kubelet[1877]: E1002 20:39:54.355563 1877 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:39:54.355722 kubelet[1877]: W1002 20:39:54.355594 1877 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:39:54.355722 kubelet[1877]: E1002 20:39:54.355645 1877 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:39:54.369371 kubelet[1877]: E1002 20:39:54.369158 1877 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:39:54.369371 kubelet[1877]: W1002 20:39:54.369185 1877 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:39:54.369371 kubelet[1877]: E1002 20:39:54.369207 1877 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:39:54.371047 kubelet[1877]: E1002 20:39:54.371025 1877 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:39:54.371047 kubelet[1877]: W1002 20:39:54.371041 1877 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:39:54.371161 kubelet[1877]: E1002 20:39:54.371057 1877 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:39:54.540996 env[1356]: time="2023-10-02T20:39:54.540153455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mscr7,Uid:882f9441-5825-4f65-b4d7-4cf3d5586dd7,Namespace:kube-system,Attempt:0,}" Oct 2 20:39:54.544986 env[1356]: time="2023-10-02T20:39:54.544929061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-84kfj,Uid:3e229853-b098-4e91-ba7c-c35e29e5babf,Namespace:calico-system,Attempt:0,}" Oct 2 20:39:55.217212 kubelet[1877]: E1002 20:39:55.217173 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:55.400813 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount361297096.mount: Deactivated successfully. Oct 2 20:39:55.433370 env[1356]: time="2023-10-02T20:39:55.433325525Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.447021 env[1356]: time="2023-10-02T20:39:55.446978882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.450378 env[1356]: time="2023-10-02T20:39:55.450322264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.458388 env[1356]: time="2023-10-02T20:39:55.458336046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.463435 env[1356]: time="2023-10-02T20:39:55.463397871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.468454 env[1356]: time="2023-10-02T20:39:55.468340775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.474814 env[1356]: time="2023-10-02T20:39:55.474774167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.483189 env[1356]: time="2023-10-02T20:39:55.483145031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:55.536748 env[1356]: time="2023-10-02T20:39:55.536619969Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:39:55.536748 env[1356]: time="2023-10-02T20:39:55.536674286Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:39:55.536748 env[1356]: time="2023-10-02T20:39:55.536684973Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:39:55.536941 env[1356]: time="2023-10-02T20:39:55.536841799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7 pid=1962 runtime=io.containerd.runc.v2 Oct 2 20:39:55.560580 systemd[1]: Started cri-containerd-d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7.scope. Oct 2 20:39:55.567004 env[1356]: time="2023-10-02T20:39:55.562711622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:39:55.567004 env[1356]: time="2023-10-02T20:39:55.562751769Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:39:55.567004 env[1356]: time="2023-10-02T20:39:55.562762696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:39:55.567004 env[1356]: time="2023-10-02T20:39:55.562934653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60fa38a500a00a08276c98a168ae41de634891ed1aa591a67c1a856051391848 pid=1986 runtime=io.containerd.runc.v2 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.616149 kernel: audit: type=1400 audit(1696279195.578:550): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.616220 kernel: audit: type=1400 audit(1696279195.578:551): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.633397 kernel: audit: type=1400 audit(1696279195.578:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.639945 systemd[1]: Started cri-containerd-60fa38a500a00a08276c98a168ae41de634891ed1aa591a67c1a856051391848.scope. Oct 2 20:39:55.653836 kernel: audit: type=1400 audit(1696279195.578:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.678894 kernel: audit: type=1400 audit(1696279195.578:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit: BPF prog-id=62 op=LOAD Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1962 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666430333165393431373034613135623330653633666466316134 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1962 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666430333165393431373034613135623330653633666466316134 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.595000 audit: BPF prog-id=63 op=LOAD Oct 2 20:39:55.595000 audit[1976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1962 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666430333165393431373034613135623330653633666466316134 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit: BPF prog-id=64 op=LOAD Oct 2 20:39:55.614000 audit[1976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1962 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666430333165393431373034613135623330653633666466316134 Oct 2 20:39:55.614000 audit: BPF prog-id=64 op=UNLOAD Oct 2 20:39:55.614000 audit: BPF prog-id=63 op=UNLOAD Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.614000 audit: BPF prog-id=65 op=LOAD Oct 2 20:39:55.614000 audit[1976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1962 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666430333165393431373034613135623330653633666466316134 Oct 2 20:39:55.689787 env[1356]: time="2023-10-02T20:39:55.689731597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-84kfj,Uid:3e229853-b098-4e91-ba7c-c35e29e5babf,Namespace:calico-system,Attempt:0,} returns sandbox id \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\"" Oct 2 20:39:55.692667 env[1356]: time="2023-10-02T20:39:55.691894140Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit: BPF prog-id=66 op=LOAD Oct 2 20:39:55.691000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.691000 audit[1997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1986 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666133386135303061303061303832373663393861313638616534 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1986 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666133386135303061303061303832373663393861313638616534 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.692000 audit: BPF prog-id=67 op=LOAD Oct 2 20:39:55.692000 audit[1997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1986 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666133386135303061303061303832373663393861313638616534 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.693000 audit: BPF prog-id=68 op=LOAD Oct 2 20:39:55.693000 audit[1997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1986 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666133386135303061303061303832373663393861313638616534 Oct 2 20:39:55.694000 audit: BPF prog-id=68 op=UNLOAD Oct 2 20:39:55.694000 audit: BPF prog-id=67 op=UNLOAD Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:55.694000 audit: BPF prog-id=69 op=LOAD Oct 2 20:39:55.694000 audit[1997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1986 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:55.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666133386135303061303061303832373663393861313638616534 Oct 2 20:39:55.714411 env[1356]: time="2023-10-02T20:39:55.714359019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mscr7,Uid:882f9441-5825-4f65-b4d7-4cf3d5586dd7,Namespace:kube-system,Attempt:0,} returns sandbox id \"60fa38a500a00a08276c98a168ae41de634891ed1aa591a67c1a856051391848\"" Oct 2 20:39:56.217348 kubelet[1877]: E1002 20:39:56.217295 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:56.968734 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1264899362.mount: Deactivated successfully. Oct 2 20:39:57.138947 env[1356]: time="2023-10-02T20:39:57.138893639Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:57.185862 env[1356]: time="2023-10-02T20:39:57.185679422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:57.206976 env[1356]: time="2023-10-02T20:39:57.206907846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:57.212687 env[1356]: time="2023-10-02T20:39:57.212651221Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:57.213287 env[1356]: time="2023-10-02T20:39:57.213255981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 20:39:57.214775 env[1356]: time="2023-10-02T20:39:57.214742825Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 20:39:57.215818 env[1356]: time="2023-10-02T20:39:57.215784324Z" level=info msg="CreateContainer within sandbox \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 20:39:57.218008 kubelet[1877]: E1002 20:39:57.217971 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:57.255497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2519611174.mount: Deactivated successfully. Oct 2 20:39:57.276648 env[1356]: time="2023-10-02T20:39:57.276588283Z" level=info msg="CreateContainer within sandbox \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2\"" Oct 2 20:39:57.277706 env[1356]: time="2023-10-02T20:39:57.277675930Z" level=info msg="StartContainer for \"01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2\"" Oct 2 20:39:57.300216 systemd[1]: Started cri-containerd-01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2.scope. Oct 2 20:39:57.320000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.320000 audit[2045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1962 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:57.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653364613932643335656333646438663038613662656364313231 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit: BPF prog-id=70 op=LOAD Oct 2 20:39:57.321000 audit[2045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1962 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:57.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653364613932643335656333646438663038613662656364313231 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit: BPF prog-id=71 op=LOAD Oct 2 20:39:57.321000 audit[2045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1962 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:57.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653364613932643335656333646438663038613662656364313231 Oct 2 20:39:57.321000 audit: BPF prog-id=71 op=UNLOAD Oct 2 20:39:57.321000 audit: BPF prog-id=70 op=UNLOAD Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:57.321000 audit: BPF prog-id=72 op=LOAD Oct 2 20:39:57.321000 audit[2045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1962 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:57.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653364613932643335656333646438663038613662656364313231 Oct 2 20:39:57.347828 systemd[1]: cri-containerd-01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2.scope: Deactivated successfully. Oct 2 20:39:57.350000 audit: BPF prog-id=72 op=UNLOAD Oct 2 20:39:57.353693 env[1356]: time="2023-10-02T20:39:57.353643986Z" level=info msg="StartContainer for \"01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2\" returns successfully" Oct 2 20:39:57.492765 env[1356]: time="2023-10-02T20:39:57.492721211Z" level=info msg="shim disconnected" id=01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2 Oct 2 20:39:57.493018 env[1356]: time="2023-10-02T20:39:57.493000377Z" level=warning msg="cleaning up after shim disconnected" id=01e3da92d35ec3dd8f08a6becd1217bb9677c5e31ade431026ca90b4777ec3c2 namespace=k8s.io Oct 2 20:39:57.493121 env[1356]: time="2023-10-02T20:39:57.493107121Z" level=info msg="cleaning up dead shim" Oct 2 20:39:57.506446 env[1356]: time="2023-10-02T20:39:57.506408511Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:39:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2083 runtime=io.containerd.runc.v2\n" Oct 2 20:39:58.218866 kubelet[1877]: E1002 20:39:58.218807 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:58.376667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3841538439.mount: Deactivated successfully. Oct 2 20:39:58.910229 env[1356]: time="2023-10-02T20:39:58.910184873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:58.921075 env[1356]: time="2023-10-02T20:39:58.921044608Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95195e68173b6cfcdd3125d7bbffa6759189df53b60ffe7a72256059cd5dd7af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:58.928971 env[1356]: time="2023-10-02T20:39:58.928947334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:58.932881 env[1356]: time="2023-10-02T20:39:58.932857474Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:39:58.933448 env[1356]: time="2023-10-02T20:39:58.933422388Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:95195e68173b6cfcdd3125d7bbffa6759189df53b60ffe7a72256059cd5dd7af\"" Oct 2 20:39:58.935118 env[1356]: time="2023-10-02T20:39:58.935075230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 20:39:58.935681 env[1356]: time="2023-10-02T20:39:58.935654473Z" level=info msg="CreateContainer within sandbox \"60fa38a500a00a08276c98a168ae41de634891ed1aa591a67c1a856051391848\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 20:39:58.975205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount89208914.mount: Deactivated successfully. Oct 2 20:39:58.979764 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3524627781.mount: Deactivated successfully. Oct 2 20:39:58.999147 env[1356]: time="2023-10-02T20:39:58.999078233Z" level=info msg="CreateContainer within sandbox \"60fa38a500a00a08276c98a168ae41de634891ed1aa591a67c1a856051391848\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7a9248a55e358b5e84769c1af51cda212c3c187ff1ca5dbc66a714bc16b86690\"" Oct 2 20:39:58.999832 env[1356]: time="2023-10-02T20:39:58.999812043Z" level=info msg="StartContainer for \"7a9248a55e358b5e84769c1af51cda212c3c187ff1ca5dbc66a714bc16b86690\"" Oct 2 20:39:59.028791 systemd[1]: Started cri-containerd-7a9248a55e358b5e84769c1af51cda212c3c187ff1ca5dbc66a714bc16b86690.scope. Oct 2 20:39:59.047000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.054743 kernel: kauditd_printk_skb: 153 callbacks suppressed Oct 2 20:39:59.054848 kernel: audit: type=1400 audit(1696279199.047:593): avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.047000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1986 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.101111 kernel: audit: type=1300 audit(1696279199.047:593): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1986 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393234386135356533353862356538343736396331616635316364 Oct 2 20:39:59.128034 kernel: audit: type=1327 audit(1696279199.047:593): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393234386135356533353862356538343736396331616635316364 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.147015 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.166488 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.186361 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.204321 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.204948 env[1356]: time="2023-10-02T20:39:59.204527870Z" level=info msg="StartContainer for \"7a9248a55e358b5e84769c1af51cda212c3c187ff1ca5dbc66a714bc16b86690\" returns successfully" Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.223030 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.223121 kubelet[1877]: E1002 20:39:59.222971 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.241958 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.265275 kernel: audit: type=1400 audit(1696279199.048:594): avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.048000 audit: BPF prog-id=73 op=LOAD Oct 2 20:39:59.048000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1986 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393234386135356533353862356538343736396331616635316364 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.053000 audit: BPF prog-id=74 op=LOAD Oct 2 20:39:59.053000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1986 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393234386135356533353862356538343736396331616635316364 Oct 2 20:39:59.071000 audit: BPF prog-id=74 op=UNLOAD Oct 2 20:39:59.071000 audit: BPF prog-id=73 op=UNLOAD Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:39:59.071000 audit: BPF prog-id=75 op=LOAD Oct 2 20:39:59.071000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1986 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393234386135356533353862356538343736396331616635316364 Oct 2 20:39:59.271000 audit[2155]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.271000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf6400f0 a2=0 a3=ffffb5a586c0 items=0 ppid=2117 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:39:59.274000 audit[2158]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.274000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa598c60 a2=0 a3=ffffa5dfd6c0 items=0 ppid=2117 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:39:59.276000 audit[2159]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.276000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe87cc6b0 a2=0 a3=ffffb37246c0 items=0 ppid=2117 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:39:59.279000 audit[2157]: NETFILTER_CFG table=mangle:23 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.279000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1b601c0 a2=0 a3=ffff885086c0 items=0 ppid=2117 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:39:59.281000 audit[2160]: NETFILTER_CFG table=nat:24 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.281000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd209b200 a2=0 a3=ffffac5a36c0 items=0 ppid=2117 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:39:59.283000 audit[2161]: NETFILTER_CFG table=filter:25 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.283000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7e58970 a2=0 a3=ffffb2c106c0 items=0 ppid=2117 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:39:59.295028 kubelet[1877]: I1002 20:39:59.294920 1877 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mscr7" podStartSLOduration=4.076256043 podCreationTimestamp="2023-10-02 20:39:52 +0000 UTC" firstStartedPulling="2023-10-02 20:39:55.715627317 +0000 UTC m=+5.175581987" lastFinishedPulling="2023-10-02 20:39:58.934252691 +0000 UTC m=+8.394207642" observedRunningTime="2023-10-02 20:39:59.29480978 +0000 UTC m=+8.754764490" watchObservedRunningTime="2023-10-02 20:39:59.294881698 +0000 UTC m=+8.754836408" Oct 2 20:39:59.376000 audit[2162]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.376000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffb6684e0 a2=0 a3=ffffb8c896c0 items=0 ppid=2117 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:39:59.380000 audit[2164]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.380000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffa0329b0 a2=0 a3=ffffac7a16c0 items=0 ppid=2117 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 20:39:59.385000 audit[2167]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.385000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff7f91690 a2=0 a3=ffffa49ea6c0 items=0 ppid=2117 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 20:39:59.387000 audit[2168]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.387000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1729b10 a2=0 a3=ffffad51e6c0 items=0 ppid=2117 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:39:59.391000 audit[2170]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.391000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffdeaf6b0 a2=0 a3=ffff8dd1b6c0 items=0 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:39:59.394000 audit[2171]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.394000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6ad0210 a2=0 a3=ffffbb5cc6c0 items=0 ppid=2117 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:39:59.397000 audit[2173]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.397000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe6b8ff60 a2=0 a3=ffffb2b716c0 items=0 ppid=2117 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:39:59.402000 audit[2176]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.402000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe3b28620 a2=0 a3=ffff85fe76c0 items=0 ppid=2117 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 20:39:59.403000 audit[2177]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.403000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9211850 a2=0 a3=ffffacdaa6c0 items=0 ppid=2117 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:39:59.407000 audit[2179]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.407000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee55d5d0 a2=0 a3=ffffa9c4e6c0 items=0 ppid=2117 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:39:59.409000 audit[2180]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.409000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcdba1320 a2=0 a3=ffffae6c86c0 items=0 ppid=2117 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:39:59.412000 audit[2182]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.412000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4c5b560 a2=0 a3=ffff876dd6c0 items=0 ppid=2117 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:39:59.417000 audit[2185]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.417000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff39489f0 a2=0 a3=ffffb66da6c0 items=0 ppid=2117 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:39:59.422000 audit[2188]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.422000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe3a4c0f0 a2=0 a3=ffffa71546c0 items=0 ppid=2117 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:39:59.423000 audit[2189]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.423000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc35ad500 a2=0 a3=ffffba4196c0 items=0 ppid=2117 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:39:59.427000 audit[2191]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.427000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcb39a6f0 a2=0 a3=ffffaaae06c0 items=0 ppid=2117 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:39:59.461000 audit[2196]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.461000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe6ffc290 a2=0 a3=ffff95c1f6c0 items=0 ppid=2117 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:39:59.471000 audit[2201]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.471000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc188b0d0 a2=0 a3=ffffb00916c0 items=0 ppid=2117 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:39:59.475000 audit[2203]: NETFILTER_CFG table=nat:44 family=2 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:39:59.475000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeb98d830 a2=0 a3=ffff88f796c0 items=0 ppid=2117 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:39:59.557000 audit[2205]: NETFILTER_CFG table=filter:45 family=2 entries=6 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:39:59.557000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffffb6a6700 a2=0 a3=ffffadecd6c0 items=0 ppid=2117 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:39:59.598000 audit[2205]: NETFILTER_CFG table=nat:46 family=2 entries=54 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:39:59.598000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffffb6a6700 a2=0 a3=ffffadecd6c0 items=0 ppid=2117 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:39:59.615000 audit[2214]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.615000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd6f88490 a2=0 a3=ffffb31fa6c0 items=0 ppid=2117 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:39:59.619000 audit[2216]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.619000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd78f5960 a2=0 a3=ffff7fd856c0 items=0 ppid=2117 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 20:39:59.624000 audit[2219]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.624000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd7ec26d0 a2=0 a3=ffffbf4816c0 items=0 ppid=2117 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 20:39:59.626000 audit[2220]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.626000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc8e8c10 a2=0 a3=ffffa67d36c0 items=0 ppid=2117 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:39:59.630000 audit[2222]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.630000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff942ce20 a2=0 a3=ffffb4beb6c0 items=0 ppid=2117 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:39:59.631000 audit[2223]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.631000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc125f040 a2=0 a3=ffffb5f566c0 items=0 ppid=2117 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:39:59.635000 audit[2225]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.635000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffefa5ac60 a2=0 a3=ffff9e1716c0 items=0 ppid=2117 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 20:39:59.640000 audit[2228]: NETFILTER_CFG table=filter:54 family=10 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.640000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe9b83b20 a2=0 a3=ffffb2eca6c0 items=0 ppid=2117 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:39:59.642000 audit[2229]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.642000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc166f320 a2=0 a3=ffff8647b6c0 items=0 ppid=2117 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:39:59.645000 audit[2231]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.645000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc46ac5c0 a2=0 a3=ffff855296c0 items=0 ppid=2117 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:39:59.647000 audit[2232]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.647000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff86fe1e0 a2=0 a3=ffffacf316c0 items=0 ppid=2117 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:39:59.650000 audit[2234]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.650000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc84f77c0 a2=0 a3=ffff984b16c0 items=0 ppid=2117 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:39:59.657000 audit[2237]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.657000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd2fd3c0 a2=0 a3=ffff8c31d6c0 items=0 ppid=2117 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:39:59.663000 audit[2240]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.663000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff08e7f10 a2=0 a3=ffff9bb316c0 items=0 ppid=2117 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 20:39:59.665000 audit[2241]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.665000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffce606e50 a2=0 a3=ffff9c8656c0 items=0 ppid=2117 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:39:59.669000 audit[2243]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.669000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffefab75e0 a2=0 a3=ffffaee4f6c0 items=0 ppid=2117 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:39:59.674000 audit[2246]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.674000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffea9cf0c0 a2=0 a3=ffffa704e6c0 items=0 ppid=2117 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:39:59.676000 audit[2247]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.676000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4f6e3d0 a2=0 a3=ffff889216c0 items=0 ppid=2117 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:39:59.680000 audit[2249]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.680000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff3124310 a2=0 a3=ffff929316c0 items=0 ppid=2117 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:39:59.684000 audit[2252]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.684000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff7a91e90 a2=0 a3=ffffa09816c0 items=0 ppid=2117 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:39:59.686000 audit[2253]: NETFILTER_CFG table=nat:67 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.686000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd79c3250 a2=0 a3=ffff841976c0 items=0 ppid=2117 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:39:59.689000 audit[2255]: NETFILTER_CFG table=nat:68 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:39:59.689000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe5c2bb50 a2=0 a3=ffff9173f6c0 items=0 ppid=2117 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:39:59.693000 audit[2257]: NETFILTER_CFG table=filter:69 family=10 entries=3 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:39:59.693000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffc1a0900 a2=0 a3=ffff89f566c0 items=0 ppid=2117 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.693000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:39:59.694000 audit[2257]: NETFILTER_CFG table=nat:70 family=10 entries=7 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:39:59.694000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffffc1a0900 a2=0 a3=ffff89f566c0 items=0 ppid=2117 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:59.694000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:40:00.223251 kubelet[1877]: E1002 20:40:00.223204 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:00.232715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1584167918.mount: Deactivated successfully. Oct 2 20:40:01.223394 kubelet[1877]: E1002 20:40:01.223350 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:02.223821 kubelet[1877]: E1002 20:40:02.223769 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:03.224769 kubelet[1877]: E1002 20:40:03.224731 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:03.419414 env[1356]: time="2023-10-02T20:40:03.419363282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:03.425319 env[1356]: time="2023-10-02T20:40:03.425280591Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:03.429383 env[1356]: time="2023-10-02T20:40:03.429356437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:03.434743 env[1356]: time="2023-10-02T20:40:03.434707798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:03.435252 env[1356]: time="2023-10-02T20:40:03.435224727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 20:40:03.437843 env[1356]: time="2023-10-02T20:40:03.437797606Z" level=info msg="CreateContainer within sandbox \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 20:40:03.466836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3703958263.mount: Deactivated successfully. Oct 2 20:40:03.471615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount269089263.mount: Deactivated successfully. Oct 2 20:40:03.491007 env[1356]: time="2023-10-02T20:40:03.490902731Z" level=info msg="CreateContainer within sandbox \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515\"" Oct 2 20:40:03.492090 env[1356]: time="2023-10-02T20:40:03.492033627Z" level=info msg="StartContainer for \"8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515\"" Oct 2 20:40:03.516282 systemd[1]: Started cri-containerd-8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515.scope. Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1962 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:03.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863643438323565363931336230323364643664626138303762303165 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit: BPF prog-id=76 op=LOAD Oct 2 20:40:03.537000 audit[2265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1962 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:03.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863643438323565363931336230323364643664626138303762303165 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit: BPF prog-id=77 op=LOAD Oct 2 20:40:03.537000 audit[2265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1962 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:03.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863643438323565363931336230323364643664626138303762303165 Oct 2 20:40:03.537000 audit: BPF prog-id=77 op=UNLOAD Oct 2 20:40:03.537000 audit: BPF prog-id=76 op=UNLOAD Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:03.537000 audit: BPF prog-id=78 op=LOAD Oct 2 20:40:03.537000 audit[2265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1962 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:03.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863643438323565363931336230323364643664626138303762303165 Oct 2 20:40:03.564767 env[1356]: time="2023-10-02T20:40:03.564723781Z" level=info msg="StartContainer for \"8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515\" returns successfully" Oct 2 20:40:04.225374 kubelet[1877]: E1002 20:40:04.225334 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:04.868177 env[1356]: time="2023-10-02T20:40:04.868101227Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:40:04.871009 systemd[1]: cri-containerd-8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515.scope: Deactivated successfully. Oct 2 20:40:04.885624 kernel: kauditd_printk_skb: 229 callbacks suppressed Oct 2 20:40:04.885772 kernel: audit: type=1334 audit(1696279204.877:656): prog-id=78 op=UNLOAD Oct 2 20:40:04.877000 audit: BPF prog-id=78 op=UNLOAD Oct 2 20:40:04.891155 kubelet[1877]: I1002 20:40:04.891123 1877 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 20:40:04.906094 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515-rootfs.mount: Deactivated successfully. Oct 2 20:40:04.921123 kubelet[1877]: I1002 20:40:04.921086 1877 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:40:04.925874 systemd[1]: Created slice kubepods-besteffort-poda94af5d8_5aee_4efd_bb62_f75b33c7492e.slice. Oct 2 20:40:05.116651 kubelet[1877]: I1002 20:40:05.116615 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a94af5d8-5aee-4efd-bb62-f75b33c7492e-varrun\") pod \"csi-node-driver-dbgw2\" (UID: \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\") " pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:05.116651 kubelet[1877]: I1002 20:40:05.116660 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/a94af5d8-5aee-4efd-bb62-f75b33c7492e-etccalico\") pod \"csi-node-driver-dbgw2\" (UID: \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\") " pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:05.321299 kubelet[1877]: I1002 20:40:05.116682 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a94af5d8-5aee-4efd-bb62-f75b33c7492e-kubelet-dir\") pod \"csi-node-driver-dbgw2\" (UID: \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\") " pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:05.321299 kubelet[1877]: I1002 20:40:05.116706 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a94af5d8-5aee-4efd-bb62-f75b33c7492e-registration-dir\") pod \"csi-node-driver-dbgw2\" (UID: \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\") " pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:05.321299 kubelet[1877]: I1002 20:40:05.116728 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dsnfh\" (UniqueName: \"kubernetes.io/projected/a94af5d8-5aee-4efd-bb62-f75b33c7492e-kube-api-access-dsnfh\") pod \"csi-node-driver-dbgw2\" (UID: \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\") " pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:05.321299 kubelet[1877]: I1002 20:40:05.116752 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a94af5d8-5aee-4efd-bb62-f75b33c7492e-socket-dir\") pod \"csi-node-driver-dbgw2\" (UID: \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\") " pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:05.321299 kubelet[1877]: E1002 20:40:05.225808 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:05.529173 env[1356]: time="2023-10-02T20:40:05.529132027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dbgw2,Uid:a94af5d8-5aee-4efd-bb62-f75b33c7492e,Namespace:calico-system,Attempt:0,}" Oct 2 20:40:06.226149 kubelet[1877]: E1002 20:40:06.226100 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:06.437133 env[1356]: time="2023-10-02T20:40:06.437085023Z" level=info msg="shim disconnected" id=8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515 Oct 2 20:40:06.437133 env[1356]: time="2023-10-02T20:40:06.437128997Z" level=warning msg="cleaning up after shim disconnected" id=8cd4825e6913b023dd6dba807b01e3d40543af884fa505ff006656e9cbc9a515 namespace=k8s.io Oct 2 20:40:06.437133 env[1356]: time="2023-10-02T20:40:06.437138400Z" level=info msg="cleaning up dead shim" Oct 2 20:40:06.456098 env[1356]: time="2023-10-02T20:40:06.455994235Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2312 runtime=io.containerd.runc.v2\n" Oct 2 20:40:06.522667 kubelet[1877]: I1002 20:40:06.522272 1877 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:40:06.525456 env[1356]: time="2023-10-02T20:40:06.523313556Z" level=error msg="Failed to destroy network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.525456 env[1356]: time="2023-10-02T20:40:06.525167253Z" level=error msg="encountered an error cleaning up failed sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.525456 env[1356]: time="2023-10-02T20:40:06.525351955Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dbgw2,Uid:a94af5d8-5aee-4efd-bb62-f75b33c7492e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.524667 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38-shm.mount: Deactivated successfully. Oct 2 20:40:06.525866 kubelet[1877]: E1002 20:40:06.525590 1877 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.525866 kubelet[1877]: E1002 20:40:06.525648 1877 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:06.525866 kubelet[1877]: E1002 20:40:06.525667 1877 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dbgw2" Oct 2 20:40:06.525958 kubelet[1877]: E1002 20:40:06.525708 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:40:06.529592 systemd[1]: Created slice kubepods-besteffort-pode55c2f7b_bf4f_473b_b9fb_81f10c15cace.slice. Oct 2 20:40:06.622883 kubelet[1877]: I1002 20:40:06.622844 1877 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kdvzj\" (UniqueName: \"kubernetes.io/projected/e55c2f7b-bf4f-473b-b9fb-81f10c15cace-kube-api-access-kdvzj\") pod \"nginx-deployment-845c78c8b9-kg78z\" (UID: \"e55c2f7b-bf4f-473b-b9fb-81f10c15cace\") " pod="default/nginx-deployment-845c78c8b9-kg78z" Oct 2 20:40:06.832590 env[1356]: time="2023-10-02T20:40:06.832153206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kg78z,Uid:e55c2f7b-bf4f-473b-b9fb-81f10c15cace,Namespace:default,Attempt:0,}" Oct 2 20:40:06.948405 env[1356]: time="2023-10-02T20:40:06.948343590Z" level=error msg="Failed to destroy network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.950624 env[1356]: time="2023-10-02T20:40:06.949991939Z" level=error msg="encountered an error cleaning up failed sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.950624 env[1356]: time="2023-10-02T20:40:06.950050318Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kg78z,Uid:e55c2f7b-bf4f-473b-b9fb-81f10c15cace,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.950796 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3-shm.mount: Deactivated successfully. Oct 2 20:40:06.951830 kubelet[1877]: E1002 20:40:06.951400 1877 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:06.951830 kubelet[1877]: E1002 20:40:06.951450 1877 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-kg78z" Oct 2 20:40:06.951830 kubelet[1877]: E1002 20:40:06.951482 1877 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-kg78z" Oct 2 20:40:06.951978 kubelet[1877]: E1002 20:40:06.951535 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-kg78z_default(e55c2f7b-bf4f-473b-b9fb-81f10c15cace)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-kg78z_default(e55c2f7b-bf4f-473b-b9fb-81f10c15cace)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-kg78z" podUID=e55c2f7b-bf4f-473b-b9fb-81f10c15cace Oct 2 20:40:07.226553 kubelet[1877]: E1002 20:40:07.226518 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:07.300289 kubelet[1877]: I1002 20:40:07.300257 1877 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:40:07.300959 env[1356]: time="2023-10-02T20:40:07.300926117Z" level=info msg="StopPodSandbox for \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\"" Oct 2 20:40:07.305209 env[1356]: time="2023-10-02T20:40:07.305182125Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 20:40:07.306283 kubelet[1877]: I1002 20:40:07.305982 1877 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Oct 2 20:40:07.306537 env[1356]: time="2023-10-02T20:40:07.306515581Z" level=info msg="StopPodSandbox for \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\"" Oct 2 20:40:07.347807 env[1356]: time="2023-10-02T20:40:07.347746564Z" level=error msg="StopPodSandbox for \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\" failed" error="failed to destroy network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:07.348164 kubelet[1877]: E1002 20:40:07.348136 1877 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:40:07.348239 kubelet[1877]: E1002 20:40:07.348202 1877 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3} Oct 2 20:40:07.348239 kubelet[1877]: E1002 20:40:07.348237 1877 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e55c2f7b-bf4f-473b-b9fb-81f10c15cace\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:40:07.348319 kubelet[1877]: E1002 20:40:07.348264 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e55c2f7b-bf4f-473b-b9fb-81f10c15cace\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-kg78z" podUID=e55c2f7b-bf4f-473b-b9fb-81f10c15cace Oct 2 20:40:07.352184 env[1356]: time="2023-10-02T20:40:07.352129771Z" level=error msg="StopPodSandbox for \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\" failed" error="failed to destroy network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:40:07.352577 kubelet[1877]: E1002 20:40:07.352442 1877 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Oct 2 20:40:07.352577 kubelet[1877]: E1002 20:40:07.352486 1877 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38} Oct 2 20:40:07.352577 kubelet[1877]: E1002 20:40:07.352521 1877 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:40:07.352577 kubelet[1877]: E1002 20:40:07.352558 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a94af5d8-5aee-4efd-bb62-f75b33c7492e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:40:08.227209 kubelet[1877]: E1002 20:40:08.227167 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:09.228287 kubelet[1877]: E1002 20:40:09.228228 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:10.228656 kubelet[1877]: E1002 20:40:10.228607 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:11.215275 kubelet[1877]: E1002 20:40:11.215231 1877 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:11.229446 kubelet[1877]: E1002 20:40:11.229415 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:12.088911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4245637039.mount: Deactivated successfully. Oct 2 20:40:12.230258 kubelet[1877]: E1002 20:40:12.230206 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:12.232876 env[1356]: time="2023-10-02T20:40:12.232840085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:12.241054 env[1356]: time="2023-10-02T20:40:12.241024095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:12.244520 env[1356]: time="2023-10-02T20:40:12.244480396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:12.247968 env[1356]: time="2023-10-02T20:40:12.247940097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:12.248330 env[1356]: time="2023-10-02T20:40:12.248302619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 20:40:12.250473 env[1356]: time="2023-10-02T20:40:12.250442303Z" level=info msg="CreateContainer within sandbox \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 20:40:12.280096 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3443812694.mount: Deactivated successfully. Oct 2 20:40:12.284422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4106254813.mount: Deactivated successfully. Oct 2 20:40:12.307324 env[1356]: time="2023-10-02T20:40:12.307268662Z" level=info msg="CreateContainer within sandbox \"d1fd031e941704a15b30e63fdf1a45b090ea95c244c1dd942d74b608f63595b7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1\"" Oct 2 20:40:12.308203 env[1356]: time="2023-10-02T20:40:12.308172667Z" level=info msg="StartContainer for \"aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1\"" Oct 2 20:40:12.336363 systemd[1]: Started cri-containerd-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1.scope. Oct 2 20:40:12.356000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.356000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1962 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:12.405997 kernel: audit: type=1400 audit(1696279212.356:657): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.406155 kernel: audit: type=1300 audit(1696279212.356:657): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1962 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:12.406197 kernel: audit: type=1327 audit(1696279212.356:657): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326536383532333133643232646163363864343339656562376263 Oct 2 20:40:12.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326536383532333133643232646163363864343339656562376263 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.451938 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.475513 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.496035 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.517613 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.517735 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.534656 env[1356]: time="2023-10-02T20:40:12.534584624Z" level=info msg="StartContainer for \"aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1\" returns successfully" Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.558086 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.580015 kernel: audit: type=1400 audit(1696279212.359:658): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.359000 audit: BPF prog-id=79 op=LOAD Oct 2 20:40:12.359000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1962 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:12.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326536383532333133643232646163363864343339656562376263 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit: BPF prog-id=80 op=LOAD Oct 2 20:40:12.376000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1962 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:12.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326536383532333133643232646163363864343339656562376263 Oct 2 20:40:12.376000 audit: BPF prog-id=80 op=UNLOAD Oct 2 20:40:12.376000 audit: BPF prog-id=79 op=UNLOAD Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:12.376000 audit: BPF prog-id=81 op=LOAD Oct 2 20:40:12.376000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1962 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:12.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161326536383532333133643232646163363864343339656562376263 Oct 2 20:40:12.771099 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 20:40:12.771241 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 20:40:13.230523 kubelet[1877]: E1002 20:40:13.230489 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:13.341794 kubelet[1877]: I1002 20:40:13.341441 1877 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-84kfj" podStartSLOduration=4.784100298 podCreationTimestamp="2023-10-02 20:39:52 +0000 UTC" firstStartedPulling="2023-10-02 20:39:55.691304261 +0000 UTC m=+5.151258971" lastFinishedPulling="2023-10-02 20:40:12.248607328 +0000 UTC m=+21.708561998" observedRunningTime="2023-10-02 20:40:13.340312094 +0000 UTC m=+22.800266804" watchObservedRunningTime="2023-10-02 20:40:13.341403325 +0000 UTC m=+22.801357995" Oct 2 20:40:13.348173 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.BF2q6Z.mount: Deactivated successfully. Oct 2 20:40:14.130000 audit[2583]: AVC avc: denied { write } for pid=2583 comm="tee" name="fd" dev="proc" ino=18131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.130000 audit[2583]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd862397a a2=241 a3=1b6 items=1 ppid=2534 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.130000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 20:40:14.130000 audit: PATH item=0 name="/dev/fd/63" inode=18123 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.144000 audit[2581]: AVC avc: denied { write } for pid=2581 comm="tee" name="fd" dev="proc" ino=17293 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.130000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.149000 audit[2586]: AVC avc: denied { write } for pid=2586 comm="tee" name="fd" dev="proc" ino=17294 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.144000 audit[2581]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe26f6969 a2=241 a3=1b6 items=1 ppid=2531 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.144000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 20:40:14.144000 audit: PATH item=0 name="/dev/fd/63" inode=18122 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.152000 audit[2595]: AVC avc: denied { write } for pid=2595 comm="tee" name="fd" dev="proc" ino=17299 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.149000 audit[2586]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe8162979 a2=241 a3=1b6 items=1 ppid=2537 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.149000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 20:40:14.149000 audit: PATH item=0 name="/dev/fd/63" inode=17283 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.153000 audit[2592]: AVC avc: denied { write } for pid=2592 comm="tee" name="fd" dev="proc" ino=18138 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.153000 audit[2592]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed5fd97b a2=241 a3=1b6 items=1 ppid=2533 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.153000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 20:40:14.153000 audit: PATH item=0 name="/dev/fd/63" inode=18133 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.153000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.152000 audit[2595]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2ecf979 a2=241 a3=1b6 items=1 ppid=2530 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.152000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 20:40:14.152000 audit: PATH item=0 name="/dev/fd/63" inode=17290 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.171000 audit[2601]: AVC avc: denied { write } for pid=2601 comm="tee" name="fd" dev="proc" ino=18142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.171000 audit[2601]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc027396a a2=241 a3=1b6 items=1 ppid=2538 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.171000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 20:40:14.171000 audit: PATH item=0 name="/dev/fd/63" inode=17301 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.174000 audit[2599]: AVC avc: denied { write } for pid=2599 comm="tee" name="fd" dev="proc" ino=17305 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:40:14.174000 audit[2599]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd88ea979 a2=241 a3=1b6 items=1 ppid=2528 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.174000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 20:40:14.174000 audit: PATH item=0 name="/dev/fd/63" inode=17298 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:40:14.174000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:40:14.230967 kubelet[1877]: E1002 20:40:14.230890 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:14.353685 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.bKU0hS.mount: Deactivated successfully. Oct 2 20:40:14.442809 kernel: Initializing XFRM netlink socket Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit: BPF prog-id=82 op=LOAD Oct 2 20:40:14.593000 audit[2691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff0773aa8 a2=70 a3=0 items=0 ppid=2536 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.593000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:14.593000 audit: BPF prog-id=82 op=UNLOAD Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit: BPF prog-id=83 op=LOAD Oct 2 20:40:14.593000 audit[2691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff0773aa8 a2=70 a3=4a174c items=0 ppid=2536 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.593000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:14.593000 audit: BPF prog-id=83 op=UNLOAD Oct 2 20:40:14.593000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.593000 audit[2691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff0773ad8 a2=70 a3=ce079f items=0 ppid=2536 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.593000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.594000 audit: BPF prog-id=84 op=LOAD Oct 2 20:40:14.594000 audit[2691]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff0773a28 a2=70 a3=ce07b9 items=0 ppid=2536 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.594000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:40:14.597000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.597000 audit[2693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc9081a08 a2=70 a3=0 items=0 ppid=2536 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.597000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:40:14.599000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:14.599000 audit[2693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc90818e8 a2=70 a3=2 items=0 ppid=2536 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.599000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:40:14.609000 audit: BPF prog-id=84 op=UNLOAD Oct 2 20:40:14.782000 audit[2718]: NETFILTER_CFG table=mangle:71 family=2 entries=19 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:14.782000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffff884e280 a2=0 a3=ffffbee2cfa0 items=0 ppid=2536 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.782000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:14.829000 audit[2716]: NETFILTER_CFG table=nat:72 family=2 entries=16 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:14.829000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc7960fc0 a2=0 a3=ffff8decffa0 items=0 ppid=2536 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.829000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:14.830000 audit[2719]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:14.830000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd9aeaad0 a2=0 a3=ffff8d45ffa0 items=0 ppid=2536 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:14.862000 audit[2715]: NETFILTER_CFG table=raw:74 family=2 entries=19 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:14.862000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe1ba7020 a2=0 a3=ffff85441fa0 items=0 ppid=2536 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:14.862000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:15.231466 kubelet[1877]: E1002 20:40:15.231405 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:15.476340 systemd-networkd[1505]: vxlan.calico: Link UP Oct 2 20:40:15.476347 systemd-networkd[1505]: vxlan.calico: Gained carrier Oct 2 20:40:15.829445 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.ph5p49.mount: Deactivated successfully. Oct 2 20:40:16.232340 kubelet[1877]: E1002 20:40:16.232266 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:17.232652 kubelet[1877]: E1002 20:40:17.232617 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:17.496841 systemd-networkd[1505]: vxlan.calico: Gained IPv6LL Oct 2 20:40:18.233476 kubelet[1877]: E1002 20:40:18.233435 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:18.264537 env[1356]: time="2023-10-02T20:40:18.264465830Z" level=info msg="StopPodSandbox for \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\"" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.323 [INFO][2786] k8s.go 576: Cleaning up netns ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.323 [INFO][2786] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" iface="eth0" netns="/var/run/netns/cni-3fff7986-d177-3bf8-fe60-a89127890380" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.323 [INFO][2786] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" iface="eth0" netns="/var/run/netns/cni-3fff7986-d177-3bf8-fe60-a89127890380" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.324 [INFO][2786] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" iface="eth0" netns="/var/run/netns/cni-3fff7986-d177-3bf8-fe60-a89127890380" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.324 [INFO][2786] k8s.go 583: Releasing IP address(es) ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.324 [INFO][2786] utils.go 196: Calico CNI releasing IP address ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.359 [INFO][2792] ipam_plugin.go 416: Releasing address using handleID ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" HandleID="k8s-pod-network.f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Workload="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.373847 env[1356]: time="2023-10-02T20:40:18Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:18.373847 env[1356]: time="2023-10-02T20:40:18Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.370 [WARNING][2792] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" HandleID="k8s-pod-network.f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Workload="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.370 [INFO][2792] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" HandleID="k8s-pod-network.f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Workload="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.373847 env[1356]: time="2023-10-02T20:40:18Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:18.373847 env[1356]: 2023-10-02 20:40:18.372 [INFO][2786] k8s.go 589: Teardown processing complete. ContainerID="f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38" Oct 2 20:40:18.376381 env[1356]: time="2023-10-02T20:40:18.375464299Z" level=info msg="TearDown network for sandbox \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\" successfully" Oct 2 20:40:18.376381 env[1356]: time="2023-10-02T20:40:18.375503385Z" level=info msg="StopPodSandbox for \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\" returns successfully" Oct 2 20:40:18.375227 systemd[1]: run-netns-cni\x2d3fff7986\x2dd177\x2d3bf8\x2dfe60\x2da89127890380.mount: Deactivated successfully. Oct 2 20:40:18.376923 env[1356]: time="2023-10-02T20:40:18.376898239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dbgw2,Uid:a94af5d8-5aee-4efd-bb62-f75b33c7492e,Namespace:calico-system,Attempt:1,}" Oct 2 20:40:18.749206 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:40:18.749324 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali085f76cca5e: link becomes ready Oct 2 20:40:18.761544 systemd-networkd[1505]: cali085f76cca5e: Link UP Oct 2 20:40:18.761553 systemd-networkd[1505]: cali085f76cca5e: Gained carrier Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.651 [INFO][2798] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.43-k8s-csi--node--driver--dbgw2-eth0 csi-node-driver- calico-system a94af5d8-5aee-4efd-bb62-f75b33c7492e 1166 0 2023-10-02 20:40:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.43 csi-node-driver-dbgw2 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali085f76cca5e [] []}} ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.652 [INFO][2798] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.693 [INFO][2810] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" HandleID="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Workload="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.707 [INFO][2810] ipam_plugin.go 269: Auto assigning IP ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" HandleID="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Workload="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d840), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.43", "pod":"csi-node-driver-dbgw2", "timestamp":"2023-10-02 20:40:18.693950119 +0000 UTC"}, Hostname:"10.200.20.43", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:40:18.780081 env[1356]: time="2023-10-02T20:40:18Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:18.780081 env[1356]: time="2023-10-02T20:40:18Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.707 [INFO][2810] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.43' Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.709 [INFO][2810] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.712 [INFO][2810] ipam.go 372: Looking up existing affinities for host host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.715 [INFO][2810] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.717 [INFO][2810] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.719 [INFO][2810] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.719 [INFO][2810] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.720 [INFO][2810] ipam.go 1682: Creating new handle: k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.729 [INFO][2810] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.733 [INFO][2810] ipam.go 1216: Successfully claimed IPs: [192.168.113.1/26] block=192.168.113.0/26 handle="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.733 [INFO][2810] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.1/26] handle="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" host="10.200.20.43" Oct 2 20:40:18.780081 env[1356]: time="2023-10-02T20:40:18Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:18.780081 env[1356]: 2023-10-02 20:40:18.733 [INFO][2810] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.1/26] IPv6=[] ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" HandleID="k8s-pod-network.3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Workload="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.780697 env[1356]: 2023-10-02 20:40:18.735 [INFO][2798] k8s.go 383: Populated endpoint ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43-k8s-csi--node--driver--dbgw2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a94af5d8-5aee-4efd-bb62-f75b33c7492e", ResourceVersion:"1166", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.43", ContainerID:"", Pod:"csi-node-driver-dbgw2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali085f76cca5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:18.780697 env[1356]: 2023-10-02 20:40:18.735 [INFO][2798] k8s.go 384: Calico CNI using IPs: [192.168.113.1/32] ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.780697 env[1356]: 2023-10-02 20:40:18.735 [INFO][2798] dataplane_linux.go 68: Setting the host side veth name to cali085f76cca5e ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.780697 env[1356]: 2023-10-02 20:40:18.749 [INFO][2798] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.780697 env[1356]: 2023-10-02 20:40:18.762 [INFO][2798] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43-k8s-csi--node--driver--dbgw2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a94af5d8-5aee-4efd-bb62-f75b33c7492e", ResourceVersion:"1166", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.43", ContainerID:"3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e", Pod:"csi-node-driver-dbgw2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali085f76cca5e", MAC:"16:da:69:f5:d4:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:18.780697 env[1356]: 2023-10-02 20:40:18.771 [INFO][2798] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e" Namespace="calico-system" Pod="csi-node-driver-dbgw2" WorkloadEndpoint="10.200.20.43-k8s-csi--node--driver--dbgw2-eth0" Oct 2 20:40:18.798000 audit[2832]: NETFILTER_CFG table=filter:75 family=2 entries=36 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:18.805844 kernel: kauditd_printk_skb: 129 callbacks suppressed Oct 2 20:40:18.805907 kernel: audit: type=1325 audit(1696279218.798:683): table=filter:75 family=2 entries=36 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:18.798000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffce033370 a2=0 a3=ffff98f19fa0 items=0 ppid=2536 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.850118 kernel: audit: type=1300 audit(1696279218.798:683): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffce033370 a2=0 a3=ffff98f19fa0 items=0 ppid=2536 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.850221 env[1356]: time="2023-10-02T20:40:18.829028042Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:40:18.850221 env[1356]: time="2023-10-02T20:40:18.829065048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:40:18.850221 env[1356]: time="2023-10-02T20:40:18.829076090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:40:18.850221 env[1356]: time="2023-10-02T20:40:18.829216831Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e pid=2841 runtime=io.containerd.runc.v2 Oct 2 20:40:18.798000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:18.871066 kernel: audit: type=1327 audit(1696279218.798:683): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:18.872952 systemd[1]: Started cri-containerd-3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e.scope. Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.924123 kernel: audit: type=1400 audit(1696279218.886:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.924218 kernel: audit: type=1400 audit(1696279218.886:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.942133 kernel: audit: type=1400 audit(1696279218.886:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.960200 kernel: audit: type=1400 audit(1696279218.886:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.960647 kernel: audit: type=1400 audit(1696279218.886:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.997906 kernel: audit: type=1400 audit(1696279218.886:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:19.015571 kernel: audit: type=1400 audit(1696279218.886:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.905000 audit: BPF prog-id=85 op=LOAD Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323739323439663537356562616436346636643338666332373434 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323739323439663537356562616436346636643338666332373434 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit: BPF prog-id=86 op=LOAD Oct 2 20:40:18.923000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323739323439663537356562616436346636643338666332373434 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit: BPF prog-id=87 op=LOAD Oct 2 20:40:18.923000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323739323439663537356562616436346636643338666332373434 Oct 2 20:40:18.923000 audit: BPF prog-id=87 op=UNLOAD Oct 2 20:40:18.923000 audit: BPF prog-id=86 op=UNLOAD Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:18.923000 audit: BPF prog-id=88 op=LOAD Oct 2 20:40:18.923000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323739323439663537356562616436346636643338666332373434 Oct 2 20:40:19.032090 env[1356]: time="2023-10-02T20:40:19.032005830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dbgw2,Uid:a94af5d8-5aee-4efd-bb62-f75b33c7492e,Namespace:calico-system,Attempt:1,} returns sandbox id \"3b279249f575ebad64f6d38fc2744c4b6c7896dae4d88754bc1a4dbcb439b26e\"" Oct 2 20:40:19.033460 env[1356]: time="2023-10-02T20:40:19.033424474Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:19.200550 env[1356]: time="2023-10-02T20:40:19.200496824Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:19.205923 env[1356]: time="2023-10-02T20:40:19.205879918Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:19.206252 kubelet[1877]: E1002 20:40:19.206219 1877 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:19.206333 kubelet[1877]: E1002 20:40:19.206271 1877 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:19.206405 kubelet[1877]: E1002 20:40:19.206381 1877 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-dsnfh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:19.207406 env[1356]: time="2023-10-02T20:40:19.207380774Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:19.234259 kubelet[1877]: E1002 20:40:19.234202 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:19.394764 env[1356]: time="2023-10-02T20:40:19.393632322Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:19.402776 env[1356]: time="2023-10-02T20:40:19.402721229Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:19.403147 kubelet[1877]: E1002 20:40:19.403118 1877 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:19.403217 kubelet[1877]: E1002 20:40:19.403176 1877 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:19.403299 kubelet[1877]: E1002 20:40:19.403278 1877 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dsnfh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:19.403400 kubelet[1877]: E1002 20:40:19.403348 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:40:19.928702 systemd-networkd[1505]: cali085f76cca5e: Gained IPv6LL Oct 2 20:40:20.234728 kubelet[1877]: E1002 20:40:20.234622 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:20.340753 kubelet[1877]: E1002 20:40:20.340720 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:40:21.235659 kubelet[1877]: E1002 20:40:21.235627 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:22.237044 kubelet[1877]: E1002 20:40:22.237000 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:22.263828 env[1356]: time="2023-10-02T20:40:22.263790179Z" level=info msg="StopPodSandbox for \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\"" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.316 [INFO][2896] k8s.go 576: Cleaning up netns ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.317 [INFO][2896] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" iface="eth0" netns="/var/run/netns/cni-2e599d83-f774-bca7-30f6-efcd966727e5" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.317 [INFO][2896] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" iface="eth0" netns="/var/run/netns/cni-2e599d83-f774-bca7-30f6-efcd966727e5" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.317 [INFO][2896] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" iface="eth0" netns="/var/run/netns/cni-2e599d83-f774-bca7-30f6-efcd966727e5" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.317 [INFO][2896] k8s.go 583: Releasing IP address(es) ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.317 [INFO][2896] utils.go 196: Calico CNI releasing IP address ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.345 [INFO][2902] ipam_plugin.go 416: Releasing address using handleID ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" HandleID="k8s-pod-network.39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Workload="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.358370 env[1356]: time="2023-10-02T20:40:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:22.358370 env[1356]: time="2023-10-02T20:40:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.355 [WARNING][2902] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" HandleID="k8s-pod-network.39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Workload="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.355 [INFO][2902] ipam_plugin.go 444: Releasing address using workloadID ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" HandleID="k8s-pod-network.39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Workload="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.358370 env[1356]: time="2023-10-02T20:40:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:22.358370 env[1356]: 2023-10-02 20:40:22.357 [INFO][2896] k8s.go 589: Teardown processing complete. ContainerID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:40:22.360192 systemd[1]: run-netns-cni\x2d2e599d83\x2df774\x2dbca7\x2d30f6\x2defcd966727e5.mount: Deactivated successfully. Oct 2 20:40:22.361211 env[1356]: time="2023-10-02T20:40:22.361170440Z" level=info msg="TearDown network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\" successfully" Oct 2 20:40:22.361298 env[1356]: time="2023-10-02T20:40:22.361277533Z" level=info msg="StopPodSandbox for \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\" returns successfully" Oct 2 20:40:22.362088 env[1356]: time="2023-10-02T20:40:22.362062346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kg78z,Uid:e55c2f7b-bf4f-473b-b9fb-81f10c15cace,Namespace:default,Attempt:1,}" Oct 2 20:40:22.540166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:40:22.540286 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali822d0efb907: link becomes ready Oct 2 20:40:22.549097 systemd-networkd[1505]: cali822d0efb907: Link UP Oct 2 20:40:22.549103 systemd-networkd[1505]: cali822d0efb907: Gained carrier Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.460 [INFO][2909] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0 nginx-deployment-845c78c8b9- default e55c2f7b-bf4f-473b-b9fb-81f10c15cace 1189 0 2023-10-02 20:40:06 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.43 nginx-deployment-845c78c8b9-kg78z eth0 default [] [] [kns.default ksa.default.default] cali822d0efb907 [] []}} ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.461 [INFO][2909] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.493 [INFO][2921] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" HandleID="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Workload="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.506 [INFO][2921] ipam_plugin.go 269: Auto assigning IP ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" HandleID="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Workload="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d820), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.43", "pod":"nginx-deployment-845c78c8b9-kg78z", "timestamp":"2023-10-02 20:40:22.49356473 +0000 UTC"}, Hostname:"10.200.20.43", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:40:22.552941 env[1356]: time="2023-10-02T20:40:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:40:22.552941 env[1356]: time="2023-10-02T20:40:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.506 [INFO][2921] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.43' Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.508 [INFO][2921] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.511 [INFO][2921] ipam.go 372: Looking up existing affinities for host host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.514 [INFO][2921] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.516 [INFO][2921] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.517 [INFO][2921] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.517 [INFO][2921] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.518 [INFO][2921] ipam.go 1682: Creating new handle: k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1 Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.521 [INFO][2921] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.525 [INFO][2921] ipam.go 1216: Successfully claimed IPs: [192.168.113.2/26] block=192.168.113.0/26 handle="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.525 [INFO][2921] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.2/26] handle="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" host="10.200.20.43" Oct 2 20:40:22.552941 env[1356]: time="2023-10-02T20:40:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:40:22.552941 env[1356]: 2023-10-02 20:40:22.525 [INFO][2921] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.2/26] IPv6=[] ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" HandleID="k8s-pod-network.89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Workload="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.553559 env[1356]: 2023-10-02 20:40:22.526 [INFO][2909] k8s.go 383: Populated endpoint ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"e55c2f7b-bf4f-473b-b9fb-81f10c15cace", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.43", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-kg78z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali822d0efb907", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:22.553559 env[1356]: 2023-10-02 20:40:22.526 [INFO][2909] k8s.go 384: Calico CNI using IPs: [192.168.113.2/32] ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.553559 env[1356]: 2023-10-02 20:40:22.527 [INFO][2909] dataplane_linux.go 68: Setting the host side veth name to cali822d0efb907 ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.553559 env[1356]: 2023-10-02 20:40:22.540 [INFO][2909] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.553559 env[1356]: 2023-10-02 20:40:22.547 [INFO][2909] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"e55c2f7b-bf4f-473b-b9fb-81f10c15cace", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.43", ContainerID:"89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1", Pod:"nginx-deployment-845c78c8b9-kg78z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali822d0efb907", MAC:"de:e8:3f:05:7e:ac", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:40:22.553559 env[1356]: 2023-10-02 20:40:22.551 [INFO][2909] k8s.go 489: Wrote updated endpoint to datastore ContainerID="89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1" Namespace="default" Pod="nginx-deployment-845c78c8b9-kg78z" WorkloadEndpoint="10.200.20.43-k8s-nginx--deployment--845c78c8b9--kg78z-eth0" Oct 2 20:40:22.590000 audit[2943]: NETFILTER_CFG table=filter:76 family=2 entries=40 op=nft_register_chain pid=2943 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:40:22.590000 audit[2943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=ffffcaf98b50 a2=0 a3=ffff9af24fa0 items=0 ppid=2536 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:22.590000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:40:22.595834 env[1356]: time="2023-10-02T20:40:22.595762482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:40:22.596005 env[1356]: time="2023-10-02T20:40:22.595982788Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:40:22.596087 env[1356]: time="2023-10-02T20:40:22.596067558Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:40:22.596440 env[1356]: time="2023-10-02T20:40:22.596396117Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1 pid=2951 runtime=io.containerd.runc.v2 Oct 2 20:40:22.616136 systemd[1]: Started cri-containerd-89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1.scope. Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.635000 audit: BPF prog-id=89 op=LOAD Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2951 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:22.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839636432396330333461666561653562323666356638313533613866 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2951 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:22.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839636432396330333461666561653562323666356638313533613866 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit: BPF prog-id=90 op=LOAD Oct 2 20:40:22.636000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2951 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:22.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839636432396330333461666561653562323666356638313533613866 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit: BPF prog-id=91 op=LOAD Oct 2 20:40:22.636000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2951 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:22.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839636432396330333461666561653562323666356638313533613866 Oct 2 20:40:22.636000 audit: BPF prog-id=91 op=UNLOAD Oct 2 20:40:22.636000 audit: BPF prog-id=90 op=UNLOAD Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:22.636000 audit: BPF prog-id=92 op=LOAD Oct 2 20:40:22.636000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2951 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:22.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839636432396330333461666561653562323666356638313533613866 Oct 2 20:40:22.660044 env[1356]: time="2023-10-02T20:40:22.659977213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kg78z,Uid:e55c2f7b-bf4f-473b-b9fb-81f10c15cace,Namespace:default,Attempt:1,} returns sandbox id \"89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1\"" Oct 2 20:40:22.662778 env[1356]: time="2023-10-02T20:40:22.662744661Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 20:40:23.238170 kubelet[1877]: E1002 20:40:23.238137 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:23.360291 systemd[1]: run-containerd-runc-k8s.io-89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1-runc.Ddbmhp.mount: Deactivated successfully. Oct 2 20:40:24.152758 systemd-networkd[1505]: cali822d0efb907: Gained IPv6LL Oct 2 20:40:24.239282 kubelet[1877]: E1002 20:40:24.239230 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:25.167801 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1318387527.mount: Deactivated successfully. Oct 2 20:40:25.239898 kubelet[1877]: E1002 20:40:25.239858 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:25.833909 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.QJxrWt.mount: Deactivated successfully. Oct 2 20:40:26.239552 env[1356]: time="2023-10-02T20:40:26.239509597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:26.240759 kubelet[1877]: E1002 20:40:26.240722 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:26.248738 env[1356]: time="2023-10-02T20:40:26.248660355Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a57d753be2d9e69d7787326e21137e5f57448955d7294cea9891e593fc97821,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:26.254327 env[1356]: time="2023-10-02T20:40:26.254294311Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:26.260548 env[1356]: time="2023-10-02T20:40:26.260512320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:40:26.261176 env[1356]: time="2023-10-02T20:40:26.261145578Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7a57d753be2d9e69d7787326e21137e5f57448955d7294cea9891e593fc97821\"" Oct 2 20:40:26.263577 env[1356]: time="2023-10-02T20:40:26.263538877Z" level=info msg="CreateContainer within sandbox \"89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 20:40:26.298828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount761996528.mount: Deactivated successfully. Oct 2 20:40:26.302009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3341392663.mount: Deactivated successfully. Oct 2 20:40:26.319788 env[1356]: time="2023-10-02T20:40:26.319745863Z" level=info msg="CreateContainer within sandbox \"89cd29c034afeae5b26f5f8153a8f6f7f53d934ad0c10612810401cf1d03f6d1\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"2069cb8ee1c1f56ce697e9ea30acea411d1a4c7bbce3ed1cfe6f7d2078875280\"" Oct 2 20:40:26.320692 env[1356]: time="2023-10-02T20:40:26.320655546Z" level=info msg="StartContainer for \"2069cb8ee1c1f56ce697e9ea30acea411d1a4c7bbce3ed1cfe6f7d2078875280\"" Oct 2 20:40:26.343158 systemd[1]: Started cri-containerd-2069cb8ee1c1f56ce697e9ea30acea411d1a4c7bbce3ed1cfe6f7d2078875280.scope. Oct 2 20:40:26.367638 kernel: kauditd_printk_skb: 110 callbacks suppressed Oct 2 20:40:26.367787 kernel: audit: type=1400 audit(1696279226.358:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.406214 kernel: audit: type=1400 audit(1696279226.358:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.406313 kernel: audit: type=1400 audit(1696279226.358:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.441486 kernel: audit: type=1400 audit(1696279226.358:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.459467 kernel: audit: type=1400 audit(1696279226.358:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.481419 kernel: audit: type=1400 audit(1696279226.358:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.500253 kernel: audit: type=1400 audit(1696279226.358:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.520339 kernel: audit: type=1400 audit(1696279226.358:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.520621 kernel: audit: type=1400 audit(1696279226.358:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.556560 kernel: audit: type=1400 audit(1696279226.365:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.365000 audit: BPF prog-id=93 op=LOAD Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2951 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:26.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363963623865653163316635366365363937653965613330616365 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2951 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:26.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363963623865653163316635366365363937653965613330616365 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.387000 audit: BPF prog-id=94 op=LOAD Oct 2 20:40:26.387000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2951 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:26.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363963623865653163316635366365363937653965613330616365 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.404000 audit: BPF prog-id=95 op=LOAD Oct 2 20:40:26.404000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2951 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363963623865653163316635366365363937653965613330616365 Oct 2 20:40:26.422000 audit: BPF prog-id=95 op=UNLOAD Oct 2 20:40:26.422000 audit: BPF prog-id=94 op=UNLOAD Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:26.422000 audit: BPF prog-id=96 op=LOAD Oct 2 20:40:26.422000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2951 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:26.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363963623865653163316635366365363937653965613330616365 Oct 2 20:40:26.559294 env[1356]: time="2023-10-02T20:40:26.559227348Z" level=info msg="StartContainer for \"2069cb8ee1c1f56ce697e9ea30acea411d1a4c7bbce3ed1cfe6f7d2078875280\" returns successfully" Oct 2 20:40:27.240996 kubelet[1877]: E1002 20:40:27.240942 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:27.367308 kubelet[1877]: I1002 20:40:27.367272 1877 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-kg78z" podStartSLOduration=17.76796093 podCreationTimestamp="2023-10-02 20:40:06 +0000 UTC" firstStartedPulling="2023-10-02 20:40:22.662115426 +0000 UTC m=+32.122070136" lastFinishedPulling="2023-10-02 20:40:26.261393281 +0000 UTC m=+35.721347951" observedRunningTime="2023-10-02 20:40:27.366875634 +0000 UTC m=+36.826830344" watchObservedRunningTime="2023-10-02 20:40:27.367238745 +0000 UTC m=+36.827193455" Oct 2 20:40:28.241289 kubelet[1877]: E1002 20:40:28.241258 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:29.242092 kubelet[1877]: E1002 20:40:29.242054 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:30.242751 kubelet[1877]: E1002 20:40:30.242713 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:31.215059 kubelet[1877]: E1002 20:40:31.215027 1877 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:31.243187 kubelet[1877]: E1002 20:40:31.243158 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:32.244154 kubelet[1877]: E1002 20:40:32.244121 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:33.244769 kubelet[1877]: E1002 20:40:33.244738 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:34.245788 kubelet[1877]: E1002 20:40:34.245745 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:35.246676 kubelet[1877]: E1002 20:40:35.246644 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:35.266702 env[1356]: time="2023-10-02T20:40:35.266456170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:35.430919 env[1356]: time="2023-10-02T20:40:35.430740464Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:35.435119 env[1356]: time="2023-10-02T20:40:35.434991322Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:35.435909 kubelet[1877]: E1002 20:40:35.435403 1877 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:35.435909 kubelet[1877]: E1002 20:40:35.435455 1877 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:35.435909 kubelet[1877]: E1002 20:40:35.435551 1877 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-dsnfh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:35.436628 env[1356]: time="2023-10-02T20:40:35.436553442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:35.608748 env[1356]: time="2023-10-02T20:40:35.608625495Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:35.617995 env[1356]: time="2023-10-02T20:40:35.617933492Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:35.618220 kubelet[1877]: E1002 20:40:35.618194 1877 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:35.618298 kubelet[1877]: E1002 20:40:35.618246 1877 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:35.618383 kubelet[1877]: E1002 20:40:35.618363 1877 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dsnfh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:35.618489 kubelet[1877]: E1002 20:40:35.618431 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:40:35.828703 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.tFiEFj.mount: Deactivated successfully. Oct 2 20:40:36.247278 kubelet[1877]: E1002 20:40:36.247243 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:37.247517 kubelet[1877]: E1002 20:40:37.247474 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:38.248079 kubelet[1877]: E1002 20:40:38.248028 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:39.249144 kubelet[1877]: E1002 20:40:39.249113 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:40.250359 kubelet[1877]: E1002 20:40:40.250313 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:41.251278 kubelet[1877]: E1002 20:40:41.251247 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:42.252588 kubelet[1877]: E1002 20:40:42.252552 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:43.253470 kubelet[1877]: E1002 20:40:43.253435 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:43.303263 kubelet[1877]: E1002 20:40:43.303235 1877 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:40:44.253762 kubelet[1877]: E1002 20:40:44.253730 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:45.254531 kubelet[1877]: E1002 20:40:45.254497 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:45.717277 kubelet[1877]: I1002 20:40:45.717250 1877 status_manager.go:809] "Failed to get status for pod" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e pod="calico-system/csi-node-driver-dbgw2" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42630->10.200.20.27:2379: read: connection timed out" Oct 2 20:40:45.721013 kubelet[1877]: E1002 20:40:45.720932 1877 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"csi-node-driver-dbgw2.178a64f662597a3e", GenerateName:"", Namespace:"calico-system", SelfLink:"", UID:"", ResourceVersion:"1171", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"calico-system", Name:"csi-node-driver-dbgw2", UID:"a94af5d8-5aee-4efd-bb62-f75b33c7492e", APIVersion:"v1", ResourceVersion:"1095", FieldPath:"spec.containers{calico-csi}"}, Reason:"Pulling", Message:"Pulling image \"ghcr.io/flatcar/calico/csi:v3.25.0\"", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 40, 19, 0, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 40, 35, 266126753, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42550->10.200.20.27:2379: read: connection timed out' (will not retry!) Oct 2 20:40:45.828807 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.X6Pkar.mount: Deactivated successfully. Oct 2 20:40:46.255453 kubelet[1877]: E1002 20:40:46.255421 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:47.255993 kubelet[1877]: E1002 20:40:47.255957 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:48.256580 kubelet[1877]: E1002 20:40:48.256545 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:49.043435 kubelet[1877]: E1002 20:40:49.043404 1877 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42744->10.200.20.27:2379: read: connection timed out" Oct 2 20:40:49.258078 kubelet[1877]: E1002 20:40:49.258034 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:50.259326 kubelet[1877]: E1002 20:40:50.259279 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:50.264838 kubelet[1877]: E1002 20:40:50.264807 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:40:51.215066 kubelet[1877]: E1002 20:40:51.215031 1877 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:51.228661 env[1356]: time="2023-10-02T20:40:51.228626499Z" level=info msg="StopPodSandbox for \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\"" Oct 2 20:40:51.259855 kubelet[1877]: E1002 20:40:51.259824 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:52.260866 kubelet[1877]: E1002 20:40:52.260831 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:53.261850 kubelet[1877]: E1002 20:40:53.261820 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:54.262651 kubelet[1877]: E1002 20:40:54.262608 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:55.263241 kubelet[1877]: E1002 20:40:55.263207 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:55.829413 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.gGPhCr.mount: Deactivated successfully. Oct 2 20:40:56.263808 kubelet[1877]: E1002 20:40:56.263772 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:57.264470 kubelet[1877]: E1002 20:40:57.264430 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:58.265818 kubelet[1877]: E1002 20:40:58.265792 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:40:59.043863 kubelet[1877]: E1002 20:40:59.043830 1877 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:40:59.093133 kubelet[1877]: E1002 20:40:59.093095 1877 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:53Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:53Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:53Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T20:40:53Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001\\\",\\\"ghcr.io/flatcar/calico/node:v3.25.0\\\"],\\\"sizeBytes\\\":82231285},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35\\\",\\\"ghcr.io/flatcar/calico/cni:v3.25.0\\\"],\\\"sizeBytes\\\":81110848},{\\\"names\\\":[\\\"ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf\\\",\\\"ghcr.io/flatcar/nginx:latest\\\"],\\\"sizeBytes\\\":55605639},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef\\\",\\\"registry.k8s.io/kube-proxy:v1.27.6\\\"],\\\"sizeBytes\\\":21376262},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\\\"],\\\"sizeBytes\\\":5379891},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":253553}]}}\" for node \"10.200.20.43\": rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42628->10.200.20.27:2379: read: connection timed out" Oct 2 20:40:59.266247 kubelet[1877]: E1002 20:40:59.266214 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:00.267124 kubelet[1877]: E1002 20:41:00.267083 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:01.268514 env[1356]: time="2023-10-02T20:41:01.268468641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:41:01.269412 kubelet[1877]: E1002 20:41:01.269389 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:01.467408 env[1356]: time="2023-10-02T20:41:01.467352018Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:01.472306 env[1356]: time="2023-10-02T20:41:01.472251872Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:01.472515 kubelet[1877]: E1002 20:41:01.472493 1877 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:41:01.472656 kubelet[1877]: E1002 20:41:01.472645 1877 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:41:01.472816 kubelet[1877]: E1002 20:41:01.472804 1877 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-dsnfh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:01.473664 env[1356]: time="2023-10-02T20:41:01.473633268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:41:01.632759 env[1356]: time="2023-10-02T20:41:01.632636914Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:01.637419 env[1356]: time="2023-10-02T20:41:01.637337980Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:01.637672 kubelet[1877]: E1002 20:41:01.637647 1877 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:41:01.637781 kubelet[1877]: E1002 20:41:01.637772 1877 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:41:01.637967 kubelet[1877]: E1002 20:41:01.637954 1877 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dsnfh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-dbgw2_calico-system(a94af5d8-5aee-4efd-bb62-f75b33c7492e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:01.638206 kubelet[1877]: E1002 20:41:01.638192 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:41:02.270292 kubelet[1877]: E1002 20:41:02.270254 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:03.271417 kubelet[1877]: E1002 20:41:03.271388 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:04.272673 kubelet[1877]: E1002 20:41:04.272623 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:05.273124 kubelet[1877]: E1002 20:41:05.273099 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:05.834192 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.xDc5Nx.mount: Deactivated successfully. Oct 2 20:41:06.273977 kubelet[1877]: E1002 20:41:06.273948 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:07.274945 kubelet[1877]: E1002 20:41:07.274917 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:08.275502 kubelet[1877]: E1002 20:41:08.275462 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:09.044667 kubelet[1877]: E1002 20:41:09.044626 1877 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:09.094001 kubelet[1877]: E1002 20:41:09.093979 1877 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.43\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:09.276540 kubelet[1877]: E1002 20:41:09.276504 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:10.277398 kubelet[1877]: E1002 20:41:10.277356 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:11.214562 kubelet[1877]: E1002 20:41:11.214529 1877 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:11.277471 kubelet[1877]: E1002 20:41:11.277437 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:12.278620 kubelet[1877]: E1002 20:41:12.278559 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:13.278706 kubelet[1877]: E1002 20:41:13.278674 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:14.279797 kubelet[1877]: E1002 20:41:14.279764 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:15.280268 kubelet[1877]: E1002 20:41:15.280235 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:15.827707 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.zcKO5w.mount: Deactivated successfully. Oct 2 20:41:16.281242 kubelet[1877]: E1002 20:41:16.281202 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:17.266020 kubelet[1877]: E1002 20:41:17.265981 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:41:17.282315 kubelet[1877]: E1002 20:41:17.282288 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:18.283278 kubelet[1877]: E1002 20:41:18.283241 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:19.045501 kubelet[1877]: E1002 20:41:19.045443 1877 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:19.045501 kubelet[1877]: I1002 20:41:19.045483 1877 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Oct 2 20:41:19.095073 kubelet[1877]: E1002 20:41:19.094990 1877 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.43\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:19.284366 kubelet[1877]: E1002 20:41:19.284331 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:20.284859 kubelet[1877]: E1002 20:41:20.284822 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:21.285741 kubelet[1877]: E1002 20:41:21.285706 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:22.286518 kubelet[1877]: E1002 20:41:22.286490 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:23.287344 kubelet[1877]: E1002 20:41:23.287308 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:24.288352 kubelet[1877]: E1002 20:41:24.288322 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:25.289606 kubelet[1877]: E1002 20:41:25.289573 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:25.828486 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.hh5nF6.mount: Deactivated successfully. Oct 2 20:41:26.290684 kubelet[1877]: E1002 20:41:26.290647 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:27.291502 kubelet[1877]: E1002 20:41:27.291452 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:28.292100 kubelet[1877]: E1002 20:41:28.292040 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:29.046539 kubelet[1877]: E1002 20:41:29.046501 1877 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Oct 2 20:41:29.095820 kubelet[1877]: E1002 20:41:29.095796 1877 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.43\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:29.292171 kubelet[1877]: E1002 20:41:29.292134 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:30.293633 kubelet[1877]: E1002 20:41:30.293582 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:31.215107 kubelet[1877]: E1002 20:41:31.215080 1877 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:31.293906 kubelet[1877]: E1002 20:41:31.293879 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:32.265295 kubelet[1877]: E1002 20:41:32.265268 1877 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dbgw2" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e Oct 2 20:41:32.294531 kubelet[1877]: E1002 20:41:32.294501 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:33.295308 kubelet[1877]: E1002 20:41:33.295278 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:34.296402 kubelet[1877]: E1002 20:41:34.296365 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:35.297366 kubelet[1877]: E1002 20:41:35.297341 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:35.830870 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.1PJ6h9.mount: Deactivated successfully. Oct 2 20:41:36.297887 kubelet[1877]: E1002 20:41:36.297846 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:36.310061 env[1356]: time="2023-10-02T20:41:36.310002750Z" level=error msg="StopPodSandbox for \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\" failed" error="failed to destroy network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": http2: client connection lost" Oct 2 20:41:36.310345 kubelet[1877]: E1002 20:41:36.310264 1877 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": http2: client connection lost" podSandboxID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:41:36.310345 kubelet[1877]: E1002 20:41:36.310301 1877 kuberuntime_gc.go:180] "Failed to stop sandbox before removing" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3\": plugin type=\"calico\" failed (delete): error getting ClusterInformation: Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": http2: client connection lost" sandboxID="39accdf86afec678076d4cf32cf82d0998d431578c47e7041bb026fbca90d3d3" Oct 2 20:41:36.310680 env[1356]: time="2023-10-02T20:41:36.310636789Z" level=info msg="StopPodSandbox for \"f936894e546194508720083d4733dce741727f1b2d12d3119fb5324db9df5c38\"" Oct 2 20:41:37.298135 kubelet[1877]: E1002 20:41:37.298101 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:38.298553 kubelet[1877]: E1002 20:41:38.298516 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:39.096629 kubelet[1877]: E1002 20:41:39.096579 1877 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.43\": Get \"https://10.200.20.38:6443/api/v1/nodes/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:41:39.096629 kubelet[1877]: E1002 20:41:39.096622 1877 kubelet_node_status.go:527] "Unable to update node status" err="update node status exceeds retry count" Oct 2 20:41:39.248203 kubelet[1877]: E1002 20:41:39.248180 1877 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="400ms" Oct 2 20:41:39.299131 kubelet[1877]: E1002 20:41:39.299104 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:40.300389 kubelet[1877]: E1002 20:41:40.300356 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:41.301777 kubelet[1877]: E1002 20:41:41.301751 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:42.302942 kubelet[1877]: E1002 20:41:42.302907 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:43.303408 kubelet[1877]: E1002 20:41:43.303376 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:44.094349 kubelet[1877]: W1002 20:41:44.094293 1877 reflector.go:456] object-"calico-system"/"node-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094349 kubelet[1877]: W1002 20:41:44.094343 1877 reflector.go:456] object-"kube-system"/"kube-proxy": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094540 kubelet[1877]: W1002 20:41:44.094368 1877 reflector.go:456] object-"default"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094540 kubelet[1877]: E1002 20:41:44.094448 1877 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.43?timeout=10s\": http2: client connection lost" interval="800ms" Oct 2 20:41:44.094540 kubelet[1877]: W1002 20:41:44.094474 1877 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Node ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094540 kubelet[1877]: W1002 20:41:44.094498 1877 reflector.go:456] object-"calico-system"/"tigera-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094540 kubelet[1877]: W1002 20:41:44.094520 1877 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094540 kubelet[1877]: W1002 20:41:44.094540 1877 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094732 kubelet[1877]: W1002 20:41:44.094560 1877 reflector.go:456] pkg/kubelet/config/apiserver.go:66: watch of *v1.Pod ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094732 kubelet[1877]: I1002 20:41:44.094621 1877 status_manager.go:809] "Failed to get status for pod" podUID=a94af5d8-5aee-4efd-bb62-f75b33c7492e pod="calico-system/csi-node-driver-dbgw2" err="Get \"https://10.200.20.38:6443/api/v1/namespaces/calico-system/pods/csi-node-driver-dbgw2\": http2: client connection lost" Oct 2 20:41:44.094871 kubelet[1877]: W1002 20:41:44.094852 1877 reflector.go:456] object-"calico-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094940 kubelet[1877]: W1002 20:41:44.094865 1877 reflector.go:456] object-"kube-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.094993 kubelet[1877]: W1002 20:41:44.094885 1877 reflector.go:456] object-"calico-system"/"cni-config": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.095061 kubelet[1877]: W1002 20:41:44.094903 1877 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Oct 2 20:41:44.095125 kubelet[1877]: E1002 20:41:44.094940 1877 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"csi-node-driver-dbgw2.178a64f66caaf8f9", GenerateName:"", Namespace:"calico-system", SelfLink:"", UID:"", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"calico-system", Name:"csi-node-driver-dbgw2", UID:"a94af5d8-5aee-4efd-bb62-f75b33c7492e", APIVersion:"v1", ResourceVersion:"1095", FieldPath:"spec.containers{calico-csi}"}, Reason:"Failed", Message:"Failed to pull image \"ghcr.io/flatcar/calico/csi:v3.25.0\": rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.43"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 40, 19, 0, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 40, 35, 435466586, time.Local), Count:2, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Patch "https://10.200.20.38:6443/api/v1/namespaces/calico-system/events/csi-node-driver-dbgw2.178a64f66caaf8f9": http2: client connection lost'(may retry after sleeping) Oct 2 20:41:44.304340 kubelet[1877]: E1002 20:41:44.304272 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:45.187620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.205316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.221786 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.239219 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.255070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.271411 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.282767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.282940 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.299357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.299630 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.304964 kubelet[1877]: E1002 20:41:45.304935 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:45.317005 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.317212 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.334323 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.334479 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.351643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.351869 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.360623 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.378540 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.378803 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.396585 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.396758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.413470 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.413701 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.429884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.430069 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.446787 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.446987 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.463818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.464071 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.481478 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.481698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.500155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.500513 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.508611 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.524808 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.525041 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.541764 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.541976 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.558644 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.558833 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.575799 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.584612 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.584824 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.602009 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.602227 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.619296 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.619528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.635904 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.636112 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.652141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.652316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.668328 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.668631 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.685373 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.685570 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.703178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.703321 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.719746 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.719930 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.735925 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.736179 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.752003 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.752194 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.768325 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.768527 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.794971 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.795178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.795284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.811516 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.812633 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.828213 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.828494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.839842 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.843104 systemd[1]: run-containerd-runc-k8s.io-aa2e6852313d22dac68d439eeb7bcfc963bbd9b48a82b215ffe421cb051bf3e1-runc.jpQGS2.mount: Deactivated successfully. Oct 2 20:41:45.853531 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.853828 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.870747 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.871056 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.899364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.899725 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.899897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.915960 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.916288 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.932471 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.932753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.949013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.949273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.966312 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.966572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.983939 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:45.984198 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.000481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.040511 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.064777 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.064919 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.065023 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.065141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.065249 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.065344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.065441 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.065543 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.083203 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.083493 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.100761 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.101005 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.117308 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.117541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.133161 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.133401 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.149246 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.149511 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.165532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.174127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.190836 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.190956 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.209101 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.209326 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.209457 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.227289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.227507 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.248344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.248623 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.263750 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.264025 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.281532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.281748 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.299734 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.299981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.309026 kubelet[1877]: E1002 20:41:46.309003 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:46.316253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.316499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.333064 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.333299 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.349267 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.366079 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.366331 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.366458 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.385039 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.385294 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.402430 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.402705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.419816 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.420045 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.436452 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.436635 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.454149 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.454343 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.471332 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.471533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.490289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.490481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.507317 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.507580 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.524770 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.524974 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.533611 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.550096 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.550289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.567433 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.567681 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.585853 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.586054 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.602909 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.603100 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.620019 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.620272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.636839 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.636995 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.662809 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.663037 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.663129 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.680684 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.680933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.699219 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.699478 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.716522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.716744 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.733059 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.733221 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.750178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.750322 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.767372 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.767555 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.786196 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.786397 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.803247 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.803480 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.820897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.821089 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.837951 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.838236 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.855020 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.855230 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.873967 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.874202 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.892532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.892865 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.910029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.910288 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.926402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.926656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.943814 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.944029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.961064 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.961269 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.969686 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.988235 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:46.988499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.005966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.006194 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.023469 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.032002 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.049218 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.061907 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.062028 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.062131 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.076727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.076968 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.097822 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.098055 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.116908 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.140741 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.140887 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.140986 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.151558 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.151820 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.169364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.169619 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.188104 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.188364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.205344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.205508 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.222193 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.222468 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.239029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.262784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.262995 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.263147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.267617 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.267927 env[1356]: time="2023-10-02T20:41:47.266986842Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:41:47.274355 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.283589 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.291741 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.299978 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.309693 kubelet[1877]: E1002 20:41:47.309638 1877 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 20:41:47.317357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.317565 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.325607 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.333799 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.350399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.350575 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.358507 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.366917 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.384859 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.385081 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.393203 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.401658 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.421638 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.421868 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.430671 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.439613 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.457028 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.457243 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.465956 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.475209 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.484269 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.493128 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.501427 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.509386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.517510 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.526066 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.534236 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.542478 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.550351 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.558795 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.567242 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.575823 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.585312 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.595197 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.604736 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.612728 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.621088 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.629185 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.637670 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.645714 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.653967 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.662300 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.671681 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.681006 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.689482 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.697842 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.706659 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.714610 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.722703 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.730638 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.738914 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.747093 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.755350 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.763456 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.772751 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.781996 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.790339 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.798884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.807426 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.815572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.823572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.831706 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.839612 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.847348 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.855517 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.863621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.872334 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.881692 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.890403 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.898424 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.906336 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.914328 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.922431 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.930571 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.938952 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.947072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.955026 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.962941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.972319 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.980892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.989101 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:47.997590 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.005799 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.013873 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.022216 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.030346 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.038147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.046072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.054050 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.063437 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.076166 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.088720 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.099851 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.108315 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.116852 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.125235 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.133631 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.141987 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.150435 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.158780 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.167319 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.176874 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.186941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.195711 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#116 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.203786 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:48.212130 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001