Oct 2 19:08:28.146371 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:08:28.146409 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:28.146424 kernel: BIOS-provided physical RAM map: Oct 2 19:08:28.146435 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:08:28.146446 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:08:28.146457 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:08:28.146476 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:08:28.146488 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:08:28.146500 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:08:28.146511 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:08:28.146523 kernel: NX (Execute Disable) protection: active Oct 2 19:08:28.146535 kernel: SMBIOS 2.7 present. Oct 2 19:08:28.146546 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:08:28.146574 kernel: Hypervisor detected: KVM Oct 2 19:08:28.146593 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:08:28.146606 kernel: kvm-clock: cpu 0, msr 49f8a001, primary cpu clock Oct 2 19:08:28.146619 kernel: kvm-clock: using sched offset of 5804100086 cycles Oct 2 19:08:28.146633 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:08:28.146645 kernel: tsc: Detected 2500.006 MHz processor Oct 2 19:08:28.146658 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:08:28.146674 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:08:28.146687 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:08:28.146699 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:08:28.146712 kernel: Using GB pages for direct mapping Oct 2 19:08:28.146725 kernel: ACPI: Early table checksum verification disabled Oct 2 19:08:28.146738 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:08:28.146751 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:08:28.146764 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:08:28.146777 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:08:28.146792 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:08:28.146885 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:08:28.146901 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:08:28.146913 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:08:28.146925 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:08:28.146939 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:08:28.146952 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:08:28.146964 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:08:28.146981 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:08:28.146992 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:08:28.147004 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:08:28.147023 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:08:28.147036 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:08:28.147050 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:08:28.147064 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:08:28.147080 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:08:28.147094 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:08:28.147108 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:08:28.147122 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:08:28.147136 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:08:28.147150 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:08:28.147163 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:08:28.147177 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:08:28.147193 kernel: Zone ranges: Oct 2 19:08:28.147207 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:08:28.147221 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:08:28.147235 kernel: Normal empty Oct 2 19:08:28.147249 kernel: Movable zone start for each node Oct 2 19:08:28.147263 kernel: Early memory node ranges Oct 2 19:08:28.147276 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:08:28.147290 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:08:28.147304 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:08:28.147320 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:08:28.147334 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:08:28.147348 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:08:28.147362 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:08:28.147376 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:08:28.147390 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:08:28.147404 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:08:28.147418 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:08:28.147431 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:08:28.147448 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:08:28.147462 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:08:28.147475 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:08:28.147489 kernel: TSC deadline timer available Oct 2 19:08:28.147503 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:08:28.147517 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:08:28.147531 kernel: Booting paravirtualized kernel on KVM Oct 2 19:08:28.147545 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:08:28.147592 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:08:28.147609 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:08:28.147622 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:08:28.147635 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:08:28.147649 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:08:28.147662 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:08:28.147676 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:08:28.147690 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:08:28.147704 kernel: Policy zone: DMA32 Oct 2 19:08:28.147720 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:28.147737 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:08:28.147751 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:08:28.147766 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:08:28.147779 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:08:28.147794 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:08:28.147809 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:08:28.147823 kernel: Kernel/User page tables isolation: enabled Oct 2 19:08:28.147836 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:08:28.147853 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:08:28.147866 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:08:28.147881 kernel: rcu: RCU event tracing is enabled. Oct 2 19:08:28.147895 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:08:28.147909 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:08:28.147923 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:08:28.147937 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:08:28.147951 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:08:28.147964 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:08:28.147981 kernel: random: crng init done Oct 2 19:08:28.147995 kernel: Console: colour VGA+ 80x25 Oct 2 19:08:28.148009 kernel: printk: console [ttyS0] enabled Oct 2 19:08:28.148023 kernel: ACPI: Core revision 20210730 Oct 2 19:08:28.148037 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:08:28.148051 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:08:28.148065 kernel: x2apic enabled Oct 2 19:08:28.148078 kernel: Switched APIC routing to physical x2apic. Oct 2 19:08:28.148093 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns Oct 2 19:08:28.148110 kernel: Calibrating delay loop (skipped) preset value.. 5000.01 BogoMIPS (lpj=2500006) Oct 2 19:08:28.148124 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:08:28.148138 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:08:28.148152 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:08:28.148176 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:08:28.148193 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:08:28.148207 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:08:28.148222 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:08:28.148236 kernel: RETBleed: Vulnerable Oct 2 19:08:28.148250 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:08:28.148265 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:08:28.148279 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:08:28.148293 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:08:28.148308 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:08:28.148325 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:08:28.148339 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:08:28.148354 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:08:28.148368 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:08:28.148383 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:08:28.148398 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:08:28.148415 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:08:28.148429 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:08:28.148444 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:08:28.148458 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:08:28.148472 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:08:28.148487 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:08:28.148502 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:08:28.148516 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:08:28.148531 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:08:28.148545 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:08:28.148574 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:08:28.148590 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:08:28.148601 kernel: LSM: Security Framework initializing Oct 2 19:08:28.148613 kernel: SELinux: Initializing. Oct 2 19:08:28.148627 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:08:28.148640 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:08:28.148653 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:08:28.148665 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:08:28.148677 kernel: signal: max sigframe size: 3632 Oct 2 19:08:28.148689 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:08:28.148702 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:08:28.148718 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:08:28.148731 kernel: x86: Booting SMP configuration: Oct 2 19:08:28.148745 kernel: .... node #0, CPUs: #1 Oct 2 19:08:28.148758 kernel: kvm-clock: cpu 1, msr 49f8a041, secondary cpu clock Oct 2 19:08:28.148772 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:08:28.148787 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:08:28.148802 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:08:28.148816 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:08:28.148830 kernel: smpboot: Max logical packages: 1 Oct 2 19:08:28.148846 kernel: smpboot: Total of 2 processors activated (10000.02 BogoMIPS) Oct 2 19:08:28.148860 kernel: devtmpfs: initialized Oct 2 19:08:28.148874 kernel: x86/mm: Memory block size: 128MB Oct 2 19:08:28.148888 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:08:28.148902 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:08:28.148915 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:08:28.148928 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:08:28.148942 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:08:28.148955 kernel: audit: type=2000 audit(1696273707.771:1): state=initialized audit_enabled=0 res=1 Oct 2 19:08:28.148970 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:08:28.148984 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:08:28.148998 kernel: cpuidle: using governor menu Oct 2 19:08:28.149009 kernel: ACPI: bus type PCI registered Oct 2 19:08:28.149023 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:08:28.149037 kernel: dca service started, version 1.12.1 Oct 2 19:08:28.149051 kernel: PCI: Using configuration type 1 for base access Oct 2 19:08:28.149066 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:08:28.149079 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:08:28.149097 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:08:28.149111 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:08:28.149126 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:08:28.149138 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:08:28.149152 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:08:28.149163 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:08:28.149176 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:08:28.149188 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:08:28.149201 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:08:28.149216 kernel: ACPI: Interpreter enabled Oct 2 19:08:28.149228 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:08:28.149241 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:08:28.149253 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:08:28.149265 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:08:28.149277 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:08:28.149580 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:08:28.149733 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:08:28.149757 kernel: acpiphp: Slot [3] registered Oct 2 19:08:28.149772 kernel: acpiphp: Slot [4] registered Oct 2 19:08:28.149785 kernel: acpiphp: Slot [5] registered Oct 2 19:08:28.149800 kernel: acpiphp: Slot [6] registered Oct 2 19:08:28.149815 kernel: acpiphp: Slot [7] registered Oct 2 19:08:28.149830 kernel: acpiphp: Slot [8] registered Oct 2 19:08:28.149844 kernel: acpiphp: Slot [9] registered Oct 2 19:08:28.149859 kernel: acpiphp: Slot [10] registered Oct 2 19:08:28.149873 kernel: acpiphp: Slot [11] registered Oct 2 19:08:28.149897 kernel: acpiphp: Slot [12] registered Oct 2 19:08:28.149912 kernel: acpiphp: Slot [13] registered Oct 2 19:08:28.149927 kernel: acpiphp: Slot [14] registered Oct 2 19:08:28.149941 kernel: acpiphp: Slot [15] registered Oct 2 19:08:28.149956 kernel: acpiphp: Slot [16] registered Oct 2 19:08:28.149970 kernel: acpiphp: Slot [17] registered Oct 2 19:08:28.149985 kernel: acpiphp: Slot [18] registered Oct 2 19:08:28.149999 kernel: acpiphp: Slot [19] registered Oct 2 19:08:28.150013 kernel: acpiphp: Slot [20] registered Oct 2 19:08:28.150031 kernel: acpiphp: Slot [21] registered Oct 2 19:08:28.150046 kernel: acpiphp: Slot [22] registered Oct 2 19:08:28.150060 kernel: acpiphp: Slot [23] registered Oct 2 19:08:28.150075 kernel: acpiphp: Slot [24] registered Oct 2 19:08:28.150089 kernel: acpiphp: Slot [25] registered Oct 2 19:08:28.150103 kernel: acpiphp: Slot [26] registered Oct 2 19:08:28.150118 kernel: acpiphp: Slot [27] registered Oct 2 19:08:28.150132 kernel: acpiphp: Slot [28] registered Oct 2 19:08:28.150146 kernel: acpiphp: Slot [29] registered Oct 2 19:08:28.150160 kernel: acpiphp: Slot [30] registered Oct 2 19:08:28.150177 kernel: acpiphp: Slot [31] registered Oct 2 19:08:28.150191 kernel: PCI host bridge to bus 0000:00 Oct 2 19:08:28.150324 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:08:28.150443 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:08:28.150556 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:08:28.150688 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:08:28.150802 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:08:28.150956 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:08:28.151093 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:08:28.151233 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:08:28.151361 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:08:28.151489 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:08:28.151628 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:08:28.151756 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:08:28.151887 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:08:28.152014 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:08:28.152140 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:08:28.152267 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:08:28.152392 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 12695 usecs Oct 2 19:08:28.152527 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:08:28.152668 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:08:28.152799 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:08:28.152927 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:08:28.153061 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:08:28.153190 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:08:28.153324 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:08:28.153451 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:08:28.153473 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:08:28.153489 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:08:28.153504 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:08:28.153519 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:08:28.153535 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:08:28.153550 kernel: iommu: Default domain type: Translated Oct 2 19:08:28.153581 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:08:28.153725 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:08:28.153949 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:08:28.154076 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:08:28.154093 kernel: vgaarb: loaded Oct 2 19:08:28.154106 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:08:28.154120 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Oct 2 19:08:28.154133 kernel: PTP clock support registered Oct 2 19:08:28.154146 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:08:28.154159 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:08:28.154172 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:08:28.154189 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:08:28.154202 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:08:28.154215 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:08:28.154229 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:08:28.154373 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:08:28.154387 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:08:28.154401 kernel: pnp: PnP ACPI init Oct 2 19:08:28.154414 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:08:28.154428 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:08:28.154446 kernel: NET: Registered PF_INET protocol family Oct 2 19:08:28.154459 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:08:28.154473 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:08:28.154486 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:08:28.154499 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:08:28.154512 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:08:28.154525 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:08:28.154538 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:08:28.154618 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:08:28.154638 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:08:28.154652 kernel: NET: Registered PF_XDP protocol family Oct 2 19:08:28.154849 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:08:28.154966 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:08:28.155155 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:08:28.155266 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:08:28.155489 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:08:28.155630 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:08:28.155652 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:08:28.155666 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:08:28.155679 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns Oct 2 19:08:28.155693 kernel: clocksource: Switched to clocksource tsc Oct 2 19:08:28.155706 kernel: Initialise system trusted keyrings Oct 2 19:08:28.155720 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:08:28.155733 kernel: Key type asymmetric registered Oct 2 19:08:28.155746 kernel: Asymmetric key parser 'x509' registered Oct 2 19:08:28.155762 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:08:28.155775 kernel: io scheduler mq-deadline registered Oct 2 19:08:28.155787 kernel: io scheduler kyber registered Oct 2 19:08:28.155798 kernel: io scheduler bfq registered Oct 2 19:08:28.155810 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:08:28.155822 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:08:28.155834 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:08:28.155847 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:08:28.155860 kernel: i8042: Warning: Keylock active Oct 2 19:08:28.155876 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:08:28.156892 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:08:28.157066 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:08:28.157198 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:08:28.157323 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:08:27 UTC (1696273707) Oct 2 19:08:28.157445 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:08:28.157465 kernel: intel_pstate: CPU model not supported Oct 2 19:08:28.157480 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:08:28.157500 kernel: Segment Routing with IPv6 Oct 2 19:08:28.157515 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:08:28.157530 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:08:28.157545 kernel: Key type dns_resolver registered Oct 2 19:08:28.157571 kernel: IPI shorthand broadcast: enabled Oct 2 19:08:28.157586 kernel: sched_clock: Marking stable (528186159, 344242760)->(988078924, -115650005) Oct 2 19:08:28.157601 kernel: registered taskstats version 1 Oct 2 19:08:28.157616 kernel: Loading compiled-in X.509 certificates Oct 2 19:08:28.157632 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:08:28.157651 kernel: Key type .fscrypt registered Oct 2 19:08:28.157666 kernel: Key type fscrypt-provisioning registered Oct 2 19:08:28.157681 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:08:28.157696 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:08:28.157711 kernel: ima: No architecture policies found Oct 2 19:08:28.157726 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:08:28.157742 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:08:28.157756 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:08:28.157772 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:08:28.157790 kernel: Run /init as init process Oct 2 19:08:28.157805 kernel: with arguments: Oct 2 19:08:28.157821 kernel: /init Oct 2 19:08:28.157836 kernel: with environment: Oct 2 19:08:28.157850 kernel: HOME=/ Oct 2 19:08:28.157864 kernel: TERM=linux Oct 2 19:08:28.157879 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:08:28.157907 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:08:28.157930 systemd[1]: Detected virtualization amazon. Oct 2 19:08:28.157946 systemd[1]: Detected architecture x86-64. Oct 2 19:08:28.157962 systemd[1]: Running in initrd. Oct 2 19:08:28.157978 systemd[1]: No hostname configured, using default hostname. Oct 2 19:08:28.158011 systemd[1]: Hostname set to <localhost>. Oct 2 19:08:28.158035 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:08:28.158050 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:08:28.158151 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:08:28.158170 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:08:28.158186 systemd[1]: Reached target cryptsetup.target. Oct 2 19:08:28.158202 systemd[1]: Reached target paths.target. Oct 2 19:08:28.158218 systemd[1]: Reached target slices.target. Oct 2 19:08:28.158231 systemd[1]: Reached target swap.target. Oct 2 19:08:28.158244 systemd[1]: Reached target timers.target. Oct 2 19:08:28.158264 systemd[1]: Listening on iscsid.socket. Oct 2 19:08:28.158281 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:08:28.158295 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:08:28.158310 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:08:28.158325 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:08:28.158339 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:08:28.158354 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:08:28.158369 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:08:28.158388 systemd[1]: Reached target sockets.target. Oct 2 19:08:28.158403 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:08:28.158420 systemd[1]: Finished network-cleanup.service. Oct 2 19:08:28.158437 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:08:28.158454 systemd[1]: Starting systemd-journald.service... Oct 2 19:08:28.158471 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:08:28.158488 systemd[1]: Starting systemd-resolved.service... Oct 2 19:08:28.158505 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:08:28.158527 systemd-journald[185]: Journal started Oct 2 19:08:28.158629 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:08:28.167587 systemd[1]: Started systemd-journald.service. Oct 2 19:08:28.191987 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:08:28.355453 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:08:28.355478 kernel: Bridge firewalling registered Oct 2 19:08:28.355491 kernel: SCSI subsystem initialized Oct 2 19:08:28.355501 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:08:28.355517 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:08:28.355530 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:08:28.193616 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:08:28.370124 kernel: audit: type=1130 audit(1696273708.352:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.370313 kernel: audit: type=1130 audit(1696273708.360:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.370329 kernel: audit: type=1130 audit(1696273708.368:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.193676 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:08:28.194766 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:08:28.392426 kernel: audit: type=1130 audit(1696273708.384:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.202113 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:08:28.255716 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:08:28.302189 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:08:28.354875 systemd[1]: Started systemd-resolved.service. Oct 2 19:08:28.403288 kernel: audit: type=1130 audit(1696273708.395:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.362392 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:08:28.371795 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:08:28.412621 kernel: audit: type=1130 audit(1696273708.402:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.394166 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:08:28.403247 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:08:28.404726 systemd[1]: Reached target nss-lookup.target. Oct 2 19:08:28.412443 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:08:28.415444 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:08:28.418065 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:08:28.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.443586 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:08:28.451620 kernel: audit: type=1130 audit(1696273708.443:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.452828 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:08:28.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.461330 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:08:28.465695 kernel: audit: type=1130 audit(1696273708.459:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.473858 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:08:28.476371 kernel: audit: type=1130 audit(1696273708.467:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.485205 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:08:28.488674 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:28.569585 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:08:28.582589 kernel: iscsi: registered transport (tcp) Oct 2 19:08:28.607441 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:08:28.607517 kernel: QLogic iSCSI HBA Driver Oct 2 19:08:28.643150 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:08:28.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:28.646545 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:08:28.722621 kernel: raid6: avx512x4 gen() 15703 MB/s Oct 2 19:08:28.747470 kernel: raid6: avx512x4 xor() 6357 MB/s Oct 2 19:08:28.764771 kernel: raid6: avx512x2 gen() 10801 MB/s Oct 2 19:08:28.781647 kernel: raid6: avx512x2 xor() 20343 MB/s Oct 2 19:08:28.798614 kernel: raid6: avx512x1 gen() 14967 MB/s Oct 2 19:08:28.816596 kernel: raid6: avx512x1 xor() 17734 MB/s Oct 2 19:08:28.838771 kernel: raid6: avx2x4 gen() 14893 MB/s Oct 2 19:08:28.867611 kernel: raid6: avx2x4 xor() 1872 MB/s Oct 2 19:08:28.886620 kernel: raid6: avx2x2 gen() 11525 MB/s Oct 2 19:08:28.904601 kernel: raid6: avx2x2 xor() 14477 MB/s Oct 2 19:08:28.921666 kernel: raid6: avx2x1 gen() 11418 MB/s Oct 2 19:08:28.941641 kernel: raid6: avx2x1 xor() 12673 MB/s Oct 2 19:08:28.959617 kernel: raid6: sse2x4 gen() 3854 MB/s Oct 2 19:08:28.977874 kernel: raid6: sse2x4 xor() 2549 MB/s Oct 2 19:08:29.000676 kernel: raid6: sse2x2 gen() 6435 MB/s Oct 2 19:08:29.018773 kernel: raid6: sse2x2 xor() 3076 MB/s Oct 2 19:08:29.036607 kernel: raid6: sse2x1 gen() 7138 MB/s Oct 2 19:08:29.056188 kernel: raid6: sse2x1 xor() 3169 MB/s Oct 2 19:08:29.056251 kernel: raid6: using algorithm avx512x4 gen() 15703 MB/s Oct 2 19:08:29.056264 kernel: raid6: .... xor() 6357 MB/s, rmw enabled Oct 2 19:08:29.057518 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:08:29.076597 kernel: xor: automatically using best checksumming function avx Oct 2 19:08:29.209714 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:08:29.221029 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:08:29.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.224395 systemd[1]: Starting systemd-udevd.service... Oct 2 19:08:29.222000 audit: BPF prog-id=7 op=LOAD Oct 2 19:08:29.222000 audit: BPF prog-id=8 op=LOAD Oct 2 19:08:29.243401 systemd-udevd[383]: Using default interface naming scheme 'v252'. Oct 2 19:08:29.250487 systemd[1]: Started systemd-udevd.service. Oct 2 19:08:29.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.255825 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:08:29.301392 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation Oct 2 19:08:29.346696 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:08:29.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.350306 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:08:29.405529 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:08:29.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.485621 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:08:29.522605 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:08:29.522861 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:08:29.524791 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:08:29.524855 kernel: AES CTR mode by8 optimization enabled Oct 2 19:08:29.524876 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:08:29.530594 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:fd:15:0b:8f:b5 Oct 2 19:08:29.532717 (udev-worker)[443]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:29.718842 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:08:29.719093 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:08:29.719115 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:08:29.719253 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:08:29.719271 kernel: GPT:9289727 != 16777215 Oct 2 19:08:29.719286 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:08:29.719300 kernel: GPT:9289727 != 16777215 Oct 2 19:08:29.719315 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:08:29.719331 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:29.719355 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (430) Oct 2 19:08:29.636934 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:08:29.729034 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:08:29.745831 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:08:29.747436 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:08:29.756932 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:08:29.760009 systemd[1]: Starting disk-uuid.service... Oct 2 19:08:29.767367 disk-uuid[584]: Primary Header is updated. Oct 2 19:08:29.767367 disk-uuid[584]: Secondary Entries is updated. Oct 2 19:08:29.767367 disk-uuid[584]: Secondary Header is updated. Oct 2 19:08:29.774585 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:29.779580 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:29.786760 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:30.788025 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:30.789868 disk-uuid[585]: The operation has completed successfully. Oct 2 19:08:30.943545 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:08:30.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.943740 systemd[1]: Finished disk-uuid.service. Oct 2 19:08:30.946295 systemd[1]: Starting verity-setup.service... Oct 2 19:08:30.980641 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:08:31.064046 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:08:31.066830 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:08:31.069776 systemd[1]: Finished verity-setup.service. Oct 2 19:08:31.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.166575 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:08:31.167669 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:08:31.169400 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:08:31.171806 systemd[1]: Starting ignition-setup.service... Oct 2 19:08:31.176843 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:08:31.193166 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:31.193230 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:08:31.193250 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:08:31.217723 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:08:31.231291 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:08:31.254475 systemd[1]: Finished ignition-setup.service. Oct 2 19:08:31.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.257181 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:08:31.276054 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:08:31.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.277000 audit: BPF prog-id=9 op=LOAD Oct 2 19:08:31.279300 systemd[1]: Starting systemd-networkd.service... Oct 2 19:08:31.303769 systemd-networkd[1097]: lo: Link UP Oct 2 19:08:31.303780 systemd-networkd[1097]: lo: Gained carrier Oct 2 19:08:31.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.304220 systemd-networkd[1097]: Enumeration completed Oct 2 19:08:31.304316 systemd[1]: Started systemd-networkd.service. Oct 2 19:08:31.304517 systemd-networkd[1097]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:08:31.307274 systemd[1]: Reached target network.target. Oct 2 19:08:31.316669 systemd[1]: Starting iscsiuio.service... Oct 2 19:08:31.323052 systemd-networkd[1097]: eth0: Link UP Oct 2 19:08:31.324819 systemd-networkd[1097]: eth0: Gained carrier Oct 2 19:08:31.329239 systemd[1]: Started iscsiuio.service. Oct 2 19:08:31.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.331998 systemd[1]: Starting iscsid.service... Oct 2 19:08:31.337614 iscsid[1102]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:08:31.337614 iscsid[1102]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Oct 2 19:08:31.337614 iscsid[1102]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:08:31.337614 iscsid[1102]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:08:31.337614 iscsid[1102]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:08:31.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.364540 iscsid[1102]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:08:31.340001 systemd[1]: Started iscsid.service. Oct 2 19:08:31.358734 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:08:31.360569 systemd-networkd[1097]: eth0: DHCPv4 address 172.31.31.246/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:08:31.386423 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:08:31.389092 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:08:31.391478 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:08:31.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.392762 systemd[1]: Reached target remote-fs.target. Oct 2 19:08:31.396659 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:08:31.407728 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:08:31.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.935229 ignition[1086]: Ignition 2.14.0 Oct 2 19:08:31.935244 ignition[1086]: Stage: fetch-offline Oct 2 19:08:31.935586 ignition[1086]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:31.935639 ignition[1086]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:31.960605 ignition[1086]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:31.962743 ignition[1086]: Ignition finished successfully Oct 2 19:08:31.964948 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:08:31.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:31.967438 systemd[1]: Starting ignition-fetch.service... Oct 2 19:08:31.978087 ignition[1121]: Ignition 2.14.0 Oct 2 19:08:31.978107 ignition[1121]: Stage: fetch Oct 2 19:08:31.978314 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:31.978346 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:31.989347 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:31.991076 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:31.997532 ignition[1121]: INFO : PUT result: OK Oct 2 19:08:32.000042 ignition[1121]: DEBUG : parsed url from cmdline: "" Oct 2 19:08:32.000042 ignition[1121]: INFO : no config URL provided Oct 2 19:08:32.002249 ignition[1121]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:08:32.002249 ignition[1121]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:08:32.002249 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:32.012250 ignition[1121]: INFO : PUT result: OK Oct 2 19:08:32.012250 ignition[1121]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:08:32.014964 ignition[1121]: INFO : GET result: OK Oct 2 19:08:32.016061 ignition[1121]: DEBUG : parsing config with SHA512: 1b03cbf07b994ad64a518eb6688950cd40622c0323e9bf39c0b049a13d38093ad784de08ffd60e4953bb9781931eb9cd38b780b74bc276d616fcce4cd6f32eff Oct 2 19:08:32.034220 unknown[1121]: fetched base config from "system" Oct 2 19:08:32.034234 unknown[1121]: fetched base config from "system" Oct 2 19:08:32.034745 ignition[1121]: fetch: fetch complete Oct 2 19:08:32.034241 unknown[1121]: fetched user config from "aws" Oct 2 19:08:32.034751 ignition[1121]: fetch: fetch passed Oct 2 19:08:32.034787 ignition[1121]: Ignition finished successfully Oct 2 19:08:32.041747 systemd[1]: Finished ignition-fetch.service. Oct 2 19:08:32.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.042770 systemd[1]: Starting ignition-kargs.service... Oct 2 19:08:32.056835 ignition[1127]: Ignition 2.14.0 Oct 2 19:08:32.056846 ignition[1127]: Stage: kargs Oct 2 19:08:32.057051 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:32.057077 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:32.073634 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:32.075286 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:32.077005 ignition[1127]: INFO : PUT result: OK Oct 2 19:08:32.080916 ignition[1127]: kargs: kargs passed Oct 2 19:08:32.080970 ignition[1127]: Ignition finished successfully Oct 2 19:08:32.083536 systemd[1]: Finished ignition-kargs.service. Oct 2 19:08:32.093536 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 2 19:08:32.093662 kernel: audit: type=1130 audit(1696273712.084:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.086690 systemd[1]: Starting ignition-disks.service... Oct 2 19:08:32.099912 ignition[1133]: Ignition 2.14.0 Oct 2 19:08:32.100200 ignition[1133]: Stage: disks Oct 2 19:08:32.100404 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:32.100435 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:32.109774 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:32.111224 ignition[1133]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:32.113226 ignition[1133]: INFO : PUT result: OK Oct 2 19:08:32.116363 ignition[1133]: disks: disks passed Oct 2 19:08:32.116415 ignition[1133]: Ignition finished successfully Oct 2 19:08:32.119082 systemd[1]: Finished ignition-disks.service. Oct 2 19:08:32.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.120619 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:08:32.125638 kernel: audit: type=1130 audit(1696273712.119:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.127641 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:08:32.128810 systemd[1]: Reached target local-fs.target. Oct 2 19:08:32.129817 systemd[1]: Reached target sysinit.target. Oct 2 19:08:32.129857 systemd[1]: Reached target basic.target. Oct 2 19:08:32.133909 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:08:32.167226 systemd-fsck[1141]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:08:32.173497 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:08:32.182416 systemd[1]: Mounting sysroot.mount... Oct 2 19:08:32.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.192643 kernel: audit: type=1130 audit(1696273712.174:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.205075 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:08:32.210968 systemd[1]: Mounted sysroot.mount. Oct 2 19:08:32.212842 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:08:32.225788 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:08:32.231380 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:08:32.231440 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:08:32.231475 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:08:32.234328 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:08:32.246211 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:08:32.254486 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:08:32.268590 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1158) Oct 2 19:08:32.273611 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:32.273686 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:08:32.273707 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:08:32.273724 initrd-setup-root[1163]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:08:32.281612 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:08:32.283404 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:08:32.286892 initrd-setup-root[1189]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:08:32.293360 initrd-setup-root[1197]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:08:32.299375 initrd-setup-root[1205]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:08:32.486734 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:08:32.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.491901 systemd[1]: Starting ignition-mount.service... Oct 2 19:08:32.499060 kernel: audit: type=1130 audit(1696273712.489:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.500005 systemd[1]: Starting sysroot-boot.service... Oct 2 19:08:32.507056 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:08:32.507178 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:08:32.509096 systemd-networkd[1097]: eth0: Gained IPv6LL Oct 2 19:08:32.530205 ignition[1224]: INFO : Ignition 2.14.0 Oct 2 19:08:32.530205 ignition[1224]: INFO : Stage: mount Oct 2 19:08:32.532531 ignition[1224]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:32.532531 ignition[1224]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:32.550301 ignition[1224]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:32.551807 ignition[1224]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:32.555155 systemd[1]: Finished sysroot-boot.service. Oct 2 19:08:32.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.561635 kernel: audit: type=1130 audit(1696273712.555:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.561670 ignition[1224]: INFO : PUT result: OK Oct 2 19:08:32.569928 ignition[1224]: INFO : mount: mount passed Oct 2 19:08:32.571198 ignition[1224]: INFO : Ignition finished successfully Oct 2 19:08:32.573301 systemd[1]: Finished ignition-mount.service. Oct 2 19:08:32.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.581586 systemd[1]: Starting ignition-files.service... Oct 2 19:08:32.589121 kernel: audit: type=1130 audit(1696273712.578:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.594453 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:08:32.606602 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1233) Oct 2 19:08:32.610186 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:32.610237 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:08:32.610250 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:08:32.616764 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:08:32.619918 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:08:32.633143 ignition[1252]: INFO : Ignition 2.14.0 Oct 2 19:08:32.633143 ignition[1252]: INFO : Stage: files Oct 2 19:08:32.635345 ignition[1252]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:32.635345 ignition[1252]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:32.646944 ignition[1252]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:32.649073 ignition[1252]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:32.651016 ignition[1252]: INFO : PUT result: OK Oct 2 19:08:32.655934 ignition[1252]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:08:32.661722 ignition[1252]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:08:32.661722 ignition[1252]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:08:32.675512 ignition[1252]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:08:32.681179 ignition[1252]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:08:32.684022 unknown[1252]: wrote ssh authorized keys file for user: core Oct 2 19:08:32.687011 ignition[1252]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:08:32.689284 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:08:32.691792 ignition[1252]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:08:32.868446 ignition[1252]: INFO : GET result: OK Oct 2 19:08:33.093197 ignition[1252]: DEBUG : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:08:33.096415 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:08:33.096415 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:08:33.096415 ignition[1252]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-amd64.tar.gz: attempt #1 Oct 2 19:08:33.194162 ignition[1252]: INFO : GET result: OK Oct 2 19:08:33.295342 ignition[1252]: DEBUG : file matches expected sum of: 961188117863ca9af5b084e84691e372efee93ad09daf6a0422e8d75a5803f394d8968064f7ca89f14e8973766201e731241f32538cf2c8d91f0233e786302df Oct 2 19:08:33.299912 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:08:33.299912 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:08:33.299912 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:33.308823 ignition[1252]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740" Oct 2 19:08:33.310752 ignition[1252]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740": device or resource busy Oct 2 19:08:33.310752 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem576931740", trying btrfs: device or resource busy Oct 2 19:08:33.310752 ignition[1252]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740" Oct 2 19:08:33.323094 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1254) Oct 2 19:08:33.323117 ignition[1252]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740" Oct 2 19:08:33.323117 ignition[1252]: INFO : op(3): [started] unmounting "/mnt/oem576931740" Oct 2 19:08:33.323117 ignition[1252]: INFO : op(3): [finished] unmounting "/mnt/oem576931740" Oct 2 19:08:33.323117 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:08:33.324080 systemd[1]: mnt-oem576931740.mount: Deactivated successfully. Oct 2 19:08:33.333828 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:08:33.333828 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:08:33.432272 ignition[1252]: INFO : GET result: OK Oct 2 19:08:34.290469 ignition[1252]: DEBUG : file matches expected sum of: 43b8f213f1732c092e34008d5334e6622a6603f7ec5890c395ac911d50069d0dc11a81fa38436df40fc875a10fee6ee13aa285c017f1de210171065e847c99c5 Oct 2 19:08:34.293859 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:08:34.293859 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:08:34.293859 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:08:34.346965 ignition[1252]: INFO : GET result: OK Oct 2 19:08:35.167321 ignition[1252]: DEBUG : file matches expected sum of: 82b36a0b83a1d48ef1f70e3ed2a263b3ce935304cdc0606d194b290217fb04f98628b0d82e200b51ccf5c05c718b2476274ae710bb143fffe28dc6bbf8407d54 Oct 2 19:08:35.174773 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:08:35.174773 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:08:35.182759 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:08:35.182759 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:08:35.182759 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:08:35.182759 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:08:35.182759 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:35.199082 ignition[1252]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252" Oct 2 19:08:35.202147 ignition[1252]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252": device or resource busy Oct 2 19:08:35.202147 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3742898252", trying btrfs: device or resource busy Oct 2 19:08:35.202147 ignition[1252]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252" Oct 2 19:08:35.209680 ignition[1252]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252" Oct 2 19:08:35.215342 ignition[1252]: INFO : op(6): [started] unmounting "/mnt/oem3742898252" Oct 2 19:08:35.218042 systemd[1]: mnt-oem3742898252.mount: Deactivated successfully. Oct 2 19:08:35.221696 ignition[1252]: INFO : op(6): [finished] unmounting "/mnt/oem3742898252" Oct 2 19:08:35.225046 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:08:35.225046 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:08:35.225046 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:35.237969 ignition[1252]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811" Oct 2 19:08:35.237969 ignition[1252]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811": device or resource busy Oct 2 19:08:35.237969 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1858116811", trying btrfs: device or resource busy Oct 2 19:08:35.237969 ignition[1252]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811" Oct 2 19:08:35.247493 ignition[1252]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811" Oct 2 19:08:35.247493 ignition[1252]: INFO : op(9): [started] unmounting "/mnt/oem1858116811" Oct 2 19:08:35.247493 ignition[1252]: INFO : op(9): [finished] unmounting "/mnt/oem1858116811" Oct 2 19:08:35.247493 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:08:35.243057 systemd[1]: mnt-oem1858116811.mount: Deactivated successfully. Oct 2 19:08:35.258158 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:08:35.258158 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:35.270634 ignition[1252]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492" Oct 2 19:08:35.272671 ignition[1252]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492": device or resource busy Oct 2 19:08:35.272671 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3706430492", trying btrfs: device or resource busy Oct 2 19:08:35.272671 ignition[1252]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492" Oct 2 19:08:35.279622 ignition[1252]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492" Oct 2 19:08:35.279622 ignition[1252]: INFO : op(c): [started] unmounting "/mnt/oem3706430492" Oct 2 19:08:35.279622 ignition[1252]: INFO : op(c): [finished] unmounting "/mnt/oem3706430492" Oct 2 19:08:35.279622 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:08:35.279622 ignition[1252]: INFO : files: op(d): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:08:35.279622 ignition[1252]: INFO : files: op(d): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(e): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(e): op(f): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(e): op(f): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(e): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(10): [started] processing unit "nvidia.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(10): [finished] processing unit "nvidia.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(15): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:08:35.293395 ignition[1252]: INFO : files: op(17): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:08:35.336162 ignition[1252]: INFO : files: files passed Oct 2 19:08:35.336162 ignition[1252]: INFO : Ignition finished successfully Oct 2 19:08:35.349244 systemd[1]: Finished ignition-files.service. Oct 2 19:08:35.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.364645 kernel: audit: type=1130 audit(1696273715.356:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.365554 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:08:35.366864 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:08:35.367738 systemd[1]: Starting ignition-quench.service... Oct 2 19:08:35.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.373173 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:08:35.390055 kernel: audit: type=1130 audit(1696273715.376:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.390082 kernel: audit: type=1131 audit(1696273715.377:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.373437 systemd[1]: Finished ignition-quench.service. Oct 2 19:08:35.391216 initrd-setup-root-after-ignition[1277]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:08:35.391588 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:08:35.409144 kernel: audit: type=1130 audit(1696273715.396:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.398014 systemd[1]: Reached target ignition-complete.target. Oct 2 19:08:35.411133 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:08:35.430936 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:08:35.431060 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:08:35.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.434772 systemd[1]: Reached target initrd-fs.target. Oct 2 19:08:35.436476 systemd[1]: Reached target initrd.target. Oct 2 19:08:35.438553 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:08:35.441230 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:08:35.458964 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:08:35.461247 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:08:35.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.476914 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:08:35.477136 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:08:35.482714 systemd[1]: Stopped target timers.target. Oct 2 19:08:35.487009 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:08:35.489393 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:08:35.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.493370 systemd[1]: Stopped target initrd.target. Oct 2 19:08:35.496774 systemd[1]: Stopped target basic.target. Oct 2 19:08:35.498692 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:08:35.502826 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:08:35.505842 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:08:35.508624 systemd[1]: Stopped target remote-fs.target. Oct 2 19:08:35.511755 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:08:35.514461 systemd[1]: Stopped target sysinit.target. Oct 2 19:08:35.517393 systemd[1]: Stopped target local-fs.target. Oct 2 19:08:35.519987 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:08:35.521950 systemd[1]: Stopped target swap.target. Oct 2 19:08:35.524739 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:08:35.524986 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:08:35.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.528212 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:08:35.530208 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:08:35.531709 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:08:35.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.534010 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:08:35.537477 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:08:35.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.540389 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:08:35.541679 systemd[1]: Stopped ignition-files.service. Oct 2 19:08:35.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.547669 systemd[1]: Stopping ignition-mount.service... Oct 2 19:08:35.554475 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:08:35.555557 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:08:35.558460 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:08:35.561802 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:08:35.564225 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:08:35.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.572153 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:08:35.574037 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:08:35.578679 ignition[1290]: INFO : Ignition 2.14.0 Oct 2 19:08:35.578679 ignition[1290]: INFO : Stage: umount Oct 2 19:08:35.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.583344 ignition[1290]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:35.583344 ignition[1290]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:35.598626 ignition[1290]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:35.600742 ignition[1290]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:35.603286 ignition[1290]: INFO : PUT result: OK Oct 2 19:08:35.608278 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:08:35.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.610435 ignition[1290]: INFO : umount: umount passed Oct 2 19:08:35.610435 ignition[1290]: INFO : Ignition finished successfully Oct 2 19:08:35.608401 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:08:35.614631 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:08:35.614722 systemd[1]: Stopped ignition-mount.service. Oct 2 19:08:35.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.617176 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:08:35.617226 systemd[1]: Stopped ignition-disks.service. Oct 2 19:08:35.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.626655 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:08:35.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.626744 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:08:35.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.634324 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:08:35.634753 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:08:35.638606 systemd[1]: Stopped target network.target. Oct 2 19:08:35.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.640351 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:08:35.646243 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:08:35.653601 systemd[1]: Stopped target paths.target. Oct 2 19:08:35.655755 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:08:35.660870 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:08:35.662819 systemd[1]: Stopped target slices.target. Oct 2 19:08:35.664658 systemd[1]: Stopped target sockets.target. Oct 2 19:08:35.666750 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:08:35.666803 systemd[1]: Closed iscsid.socket. Oct 2 19:08:35.672260 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:08:35.672345 systemd[1]: Closed iscsiuio.socket. Oct 2 19:08:35.675784 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:08:35.675852 systemd[1]: Stopped ignition-setup.service. Oct 2 19:08:35.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.679697 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:08:35.679761 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:08:35.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.683315 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:08:35.684419 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:08:35.693719 systemd-networkd[1097]: eth0: DHCPv6 lease lost Oct 2 19:08:35.697900 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:08:35.699721 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:08:35.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.702845 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:08:35.704076 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:08:35.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.705000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:08:35.706801 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:08:35.706855 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:08:35.709000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:08:35.711355 systemd[1]: Stopping network-cleanup.service... Oct 2 19:08:35.714640 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:08:35.714789 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:08:35.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.719133 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:08:35.719189 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:08:35.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.722242 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:08:35.722293 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:08:35.725261 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:08:35.744905 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:08:35.746590 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:08:35.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.748989 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:08:35.750281 systemd[1]: Stopped network-cleanup.service. Oct 2 19:08:35.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.752954 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:08:35.752997 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:08:35.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.754551 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:08:35.754721 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:08:35.757646 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:08:35.757699 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:08:35.760608 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:08:35.760712 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:08:35.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.761682 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:08:35.761734 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:08:35.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.763125 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:08:35.763449 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:08:35.763516 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:08:35.771896 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:08:35.771968 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:08:35.776466 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:08:35.776536 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:08:35.779088 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:08:35.779298 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:08:35.781748 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:08:35.787828 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:08:35.810679 systemd[1]: Switching root. Oct 2 19:08:35.840575 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:08:35.840672 systemd-journald[185]: Journal stopped Oct 2 19:08:41.677826 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:08:41.677924 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:08:41.677949 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:08:41.677973 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:08:41.678000 kernel: SELinux: policy capability open_perms=1 Oct 2 19:08:41.678021 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:08:41.678042 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:08:41.678073 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:08:41.678091 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:08:41.678109 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:08:41.678127 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:08:41.678146 systemd[1]: Successfully loaded SELinux policy in 109.450ms. Oct 2 19:08:41.678185 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.036ms. Oct 2 19:08:41.678209 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:08:41.678229 systemd[1]: Detected virtualization amazon. Oct 2 19:08:41.678251 systemd[1]: Detected architecture x86-64. Oct 2 19:08:41.678269 systemd[1]: Detected first boot. Oct 2 19:08:41.678287 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:08:41.678305 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:08:41.678325 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:41.678355 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:41.678376 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:41.678398 kernel: kauditd_printk_skb: 44 callbacks suppressed Oct 2 19:08:41.678421 kernel: audit: type=1334 audit(1696273721.300:85): prog-id=12 op=LOAD Oct 2 19:08:41.678439 kernel: audit: type=1334 audit(1696273721.300:86): prog-id=3 op=UNLOAD Oct 2 19:08:41.678457 kernel: audit: type=1334 audit(1696273721.301:87): prog-id=13 op=LOAD Oct 2 19:08:41.678474 kernel: audit: type=1334 audit(1696273721.303:88): prog-id=14 op=LOAD Oct 2 19:08:41.678491 kernel: audit: type=1334 audit(1696273721.303:89): prog-id=4 op=UNLOAD Oct 2 19:08:41.678510 kernel: audit: type=1334 audit(1696273721.303:90): prog-id=5 op=UNLOAD Oct 2 19:08:41.678530 kernel: audit: type=1334 audit(1696273721.308:91): prog-id=15 op=LOAD Oct 2 19:08:41.678548 kernel: audit: type=1334 audit(1696273721.308:92): prog-id=12 op=UNLOAD Oct 2 19:08:41.678580 kernel: audit: type=1334 audit(1696273721.309:93): prog-id=16 op=LOAD Oct 2 19:08:41.678599 kernel: audit: type=1334 audit(1696273721.311:94): prog-id=17 op=LOAD Oct 2 19:08:41.678618 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:08:41.678639 systemd[1]: Stopped iscsiuio.service. Oct 2 19:08:41.678658 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:08:41.678679 systemd[1]: Stopped iscsid.service. Oct 2 19:08:41.678698 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:08:41.678722 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:08:41.678741 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:08:41.678762 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:08:41.678783 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:08:41.678803 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:08:41.678823 systemd[1]: Created slice system-getty.slice. Oct 2 19:08:41.678844 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:08:41.678865 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:08:41.678889 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:08:41.678976 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:08:41.678999 systemd[1]: Created slice user.slice. Oct 2 19:08:41.679017 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:08:41.679038 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:08:41.679057 systemd[1]: Set up automount boot.automount. Oct 2 19:08:41.679077 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:08:41.679097 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:08:41.679117 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:08:41.679139 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:08:41.679158 systemd[1]: Reached target integritysetup.target. Oct 2 19:08:41.679177 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:08:41.679198 systemd[1]: Reached target remote-fs.target. Oct 2 19:08:41.679217 systemd[1]: Reached target slices.target. Oct 2 19:08:41.679237 systemd[1]: Reached target swap.target. Oct 2 19:08:41.679257 systemd[1]: Reached target torcx.target. Oct 2 19:08:41.679278 systemd[1]: Reached target veritysetup.target. Oct 2 19:08:41.679296 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:08:41.679319 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:08:41.679339 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:08:41.679361 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:08:41.679380 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:08:41.679399 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:08:41.679416 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:08:41.679433 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:08:41.679449 systemd[1]: Mounting media.mount... Oct 2 19:08:41.679466 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:08:41.679489 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:08:41.679508 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:08:41.679528 systemd[1]: Mounting tmp.mount... Oct 2 19:08:41.679549 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:08:41.679581 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:08:41.679598 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:08:41.679616 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:08:41.679633 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:08:41.679650 systemd[1]: Starting modprobe@drm.service... Oct 2 19:08:41.679678 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:08:41.679700 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:08:41.679720 systemd[1]: Starting modprobe@loop.service... Oct 2 19:08:41.679740 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:08:41.679761 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:08:41.679784 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:08:41.679801 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:08:41.679821 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:08:41.679842 systemd[1]: Stopped systemd-journald.service. Oct 2 19:08:41.679863 systemd[1]: Starting systemd-journald.service... Oct 2 19:08:41.679880 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:08:41.679898 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:08:41.679915 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:08:41.679932 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:08:41.679953 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:08:41.679971 systemd[1]: Stopped verity-setup.service. Oct 2 19:08:41.679991 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:08:41.680010 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:08:41.680030 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:08:41.680050 systemd[1]: Mounted media.mount. Oct 2 19:08:41.680069 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:08:41.680089 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:08:41.680107 systemd[1]: Mounted tmp.mount. Oct 2 19:08:41.680131 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:08:41.680150 kernel: loop: module loaded Oct 2 19:08:41.680169 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:08:41.680189 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:08:41.680208 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:08:41.680228 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:08:41.680248 kernel: fuse: init (API version 7.34) Oct 2 19:08:41.680268 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:08:41.680288 systemd[1]: Finished modprobe@drm.service. Oct 2 19:08:41.680307 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:08:41.680326 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:08:41.680345 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:08:41.680364 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:08:41.680383 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:08:41.680405 systemd[1]: Finished modprobe@loop.service. Oct 2 19:08:41.680424 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:08:41.680444 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:08:41.680464 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:08:41.680484 systemd[1]: Reached target network-pre.target. Oct 2 19:08:41.680506 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:08:41.680530 systemd-journald[1399]: Journal started Oct 2 19:08:41.680636 systemd-journald[1399]: Runtime Journal (/run/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:08:36.541000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:08:36.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:36.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:36.717000 audit: BPF prog-id=10 op=LOAD Oct 2 19:08:36.717000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:08:36.717000 audit: BPF prog-id=11 op=LOAD Oct 2 19:08:36.717000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:08:41.300000 audit: BPF prog-id=12 op=LOAD Oct 2 19:08:41.300000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:08:41.301000 audit: BPF prog-id=13 op=LOAD Oct 2 19:08:41.303000 audit: BPF prog-id=14 op=LOAD Oct 2 19:08:41.303000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:08:41.303000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:08:41.308000 audit: BPF prog-id=15 op=LOAD Oct 2 19:08:41.308000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:08:41.309000 audit: BPF prog-id=16 op=LOAD Oct 2 19:08:41.311000 audit: BPF prog-id=17 op=LOAD Oct 2 19:08:41.311000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:08:41.311000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:08:41.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.324000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:08:41.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.534000 audit: BPF prog-id=18 op=LOAD Oct 2 19:08:41.534000 audit: BPF prog-id=19 op=LOAD Oct 2 19:08:41.534000 audit: BPF prog-id=20 op=LOAD Oct 2 19:08:41.534000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:08:41.534000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:08:41.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.694533 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:08:41.694615 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:08:41.694648 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:08:41.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.701030 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:08:41.701070 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:08:41.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.674000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:08:41.674000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe076dc2a0 a2=4000 a3=7ffe076dc33c items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:41.674000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:08:36.939326 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:41.299337 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:08:41.710745 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:08:36.940212 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:08:41.315110 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:08:36.940242 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:08:36.940290 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:08:36.940307 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:08:36.940353 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:08:36.940381 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:08:36.940807 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:08:36.940881 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:08:36.940901 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:08:41.730923 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:08:41.731008 systemd[1]: Started systemd-journald.service. Oct 2 19:08:41.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:36.941643 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:08:41.721611 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:08:36.941699 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:08:41.723373 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:08:36.941729 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:08:41.726162 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:08:36.941755 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:08:36.942186 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:08:36.942250 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:08:40.684435 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:40.684735 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:40.684847 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:40.685032 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:40.685083 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:08:40.685140 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:08:41.738348 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:08:41.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.739743 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:08:41.747075 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:08:41.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.774450 systemd-journald[1399]: Time spent on flushing to /var/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc is 67.561ms for 1194 entries. Oct 2 19:08:41.774450 systemd-journald[1399]: System Journal (/var/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:08:41.850271 systemd-journald[1399]: Received client request to flush runtime journal. Oct 2 19:08:41.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.791666 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:08:41.795452 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:08:41.853799 udevadm[1432]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:08:41.830392 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:08:41.833637 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:08:41.851706 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:08:41.959605 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:08:41.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:41.965621 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:08:42.062690 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:08:42.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:42.636485 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:08:42.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:42.636000 audit: BPF prog-id=21 op=LOAD Oct 2 19:08:42.637000 audit: BPF prog-id=22 op=LOAD Oct 2 19:08:42.637000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:08:42.637000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:08:42.639661 systemd[1]: Starting systemd-udevd.service... Oct 2 19:08:42.662541 systemd-udevd[1442]: Using default interface naming scheme 'v252'. Oct 2 19:08:42.706448 systemd[1]: Started systemd-udevd.service. Oct 2 19:08:42.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:42.708000 audit: BPF prog-id=23 op=LOAD Oct 2 19:08:42.711444 systemd[1]: Starting systemd-networkd.service... Oct 2 19:08:42.730000 audit: BPF prog-id=24 op=LOAD Oct 2 19:08:42.730000 audit: BPF prog-id=25 op=LOAD Oct 2 19:08:42.730000 audit: BPF prog-id=26 op=LOAD Oct 2 19:08:42.733384 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:08:42.809340 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:08:42.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:42.818568 systemd[1]: Started systemd-userdbd.service. Oct 2 19:08:42.822249 (udev-worker)[1444]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:42.916936 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:08:42.924668 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:08:42.931586 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Oct 2 19:08:42.937000 audit[1445]: AVC avc: denied { confidentiality } for pid=1445 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:08:42.937000 audit[1445]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560035c6cc70 a1=32194 a2=7f632cbc4bc5 a3=5 items=106 ppid=1442 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:42.937000 audit: CWD cwd="/" Oct 2 19:08:42.937000 audit: PATH item=0 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=1 name=(null) inode=15439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=2 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=3 name=(null) inode=15440 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=4 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=5 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=6 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=7 name=(null) inode=15442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=8 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=9 name=(null) inode=15443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=10 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=11 name=(null) inode=15444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=12 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=13 name=(null) inode=15445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=14 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=15 name=(null) inode=15446 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=16 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=17 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=18 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=19 name=(null) inode=15448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=20 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=21 name=(null) inode=15449 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=22 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=23 name=(null) inode=15450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=24 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=25 name=(null) inode=15451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=26 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=27 name=(null) inode=15452 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=28 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=29 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=30 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=31 name=(null) inode=15454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=32 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=33 name=(null) inode=15455 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=34 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=35 name=(null) inode=15456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=36 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=37 name=(null) inode=15457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=38 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=39 name=(null) inode=15458 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=40 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=41 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=42 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=43 name=(null) inode=15460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=44 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=45 name=(null) inode=15461 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=46 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=47 name=(null) inode=15462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=48 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=49 name=(null) inode=15463 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=50 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=51 name=(null) inode=15464 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=53 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=54 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=55 name=(null) inode=15466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=56 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=57 name=(null) inode=15467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=58 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=59 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=60 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=61 name=(null) inode=15469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=62 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=63 name=(null) inode=15470 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=64 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=65 name=(null) inode=15471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=66 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=67 name=(null) inode=15472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=68 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=69 name=(null) inode=15473 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=70 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=71 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=72 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=73 name=(null) inode=15475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=74 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=75 name=(null) inode=15476 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=76 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=77 name=(null) inode=15477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=78 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.969767 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:08:42.977921 systemd-networkd[1452]: lo: Link UP Oct 2 19:08:42.977932 systemd-networkd[1452]: lo: Gained carrier Oct 2 19:08:42.978500 systemd-networkd[1452]: Enumeration completed Oct 2 19:08:42.978645 systemd-networkd[1452]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:08:42.937000 audit: PATH item=79 name=(null) inode=15478 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=80 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=81 name=(null) inode=15479 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=82 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=83 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=84 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=85 name=(null) inode=15481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=86 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=87 name=(null) inode=15482 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=88 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=89 name=(null) inode=15483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=90 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=91 name=(null) inode=15484 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=92 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:42.980332 systemd[1]: Started systemd-networkd.service. Oct 2 19:08:42.937000 audit: PATH item=93 name=(null) inode=15485 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=94 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=95 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=96 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=97 name=(null) inode=15487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=98 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=99 name=(null) inode=15488 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=100 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.983689 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:08:42.986741 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:08:42.985946 systemd-networkd[1452]: eth0: Link UP Oct 2 19:08:42.986098 systemd-networkd[1452]: eth0: Gained carrier Oct 2 19:08:42.937000 audit: PATH item=101 name=(null) inode=15489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=102 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=103 name=(null) inode=15490 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=104 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PATH item=105 name=(null) inode=15491 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:42.937000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:08:43.001742 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Oct 2 19:08:43.005785 systemd-networkd[1452]: eth0: DHCPv4 address 172.31.31.246/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:08:43.038582 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:08:43.058582 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1457) Oct 2 19:08:43.098583 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:08:43.236254 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:08:43.349044 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:08:43.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.351880 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:08:43.402094 lvm[1556]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:08:43.433878 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:08:43.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.435292 systemd[1]: Reached target cryptsetup.target. Oct 2 19:08:43.438076 systemd[1]: Starting lvm2-activation.service... Oct 2 19:08:43.444287 lvm[1557]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:08:43.472978 systemd[1]: Finished lvm2-activation.service. Oct 2 19:08:43.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.474204 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:08:43.475510 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:08:43.475575 systemd[1]: Reached target local-fs.target. Oct 2 19:08:43.476554 systemd[1]: Reached target machines.target. Oct 2 19:08:43.479104 systemd[1]: Starting ldconfig.service... Oct 2 19:08:43.480484 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:08:43.480578 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:43.481859 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:08:43.484475 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:08:43.487221 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:08:43.488671 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:08:43.488733 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:08:43.489867 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:08:43.518158 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1559 (bootctl) Oct 2 19:08:43.520668 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:08:43.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.542025 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:08:43.545364 systemd-tmpfiles[1562]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:08:43.556455 systemd-tmpfiles[1562]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:08:43.565930 systemd-tmpfiles[1562]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:08:43.681603 systemd-fsck[1567]: fsck.fat 4.2 (2021-01-31) Oct 2 19:08:43.681603 systemd-fsck[1567]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:08:43.684366 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:08:43.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.688168 systemd[1]: Mounting boot.mount... Oct 2 19:08:43.719972 systemd[1]: Mounted boot.mount. Oct 2 19:08:43.751858 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:08:43.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.858134 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:08:43.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.861872 systemd[1]: Starting audit-rules.service... Oct 2 19:08:43.865073 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:08:43.870000 audit: BPF prog-id=27 op=LOAD Oct 2 19:08:43.869322 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:08:43.874334 systemd[1]: Starting systemd-resolved.service... Oct 2 19:08:43.890000 audit: BPF prog-id=28 op=LOAD Oct 2 19:08:43.893654 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:08:43.899098 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:08:43.919000 audit[1587]: SYSTEM_BOOT pid=1587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.920292 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:08:43.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.927454 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:08:43.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.936370 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:08:44.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:44.011484 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:08:44.041000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:08:44.041000 audit[1601]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff82187a60 a2=420 a3=0 items=0 ppid=1581 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.041000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:08:44.043708 augenrules[1601]: No rules Oct 2 19:08:44.044688 systemd[1]: Finished audit-rules.service. Oct 2 19:08:44.073055 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:08:44.074616 systemd[1]: Reached target time-set.target. Oct 2 19:08:44.104678 systemd-resolved[1584]: Positive Trust Anchors: Oct 2 19:08:44.104701 systemd-resolved[1584]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:08:44.104744 systemd-resolved[1584]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:08:44.142484 systemd-resolved[1584]: Defaulting to hostname 'linux'. Oct 2 19:08:44.144940 systemd[1]: Started systemd-resolved.service. Oct 2 19:08:44.146914 systemd[1]: Reached target network.target. Oct 2 19:08:44.147930 systemd[1]: Reached target nss-lookup.target. Oct 2 19:08:44.181293 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:08:44.182542 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:08:45.451743 systemd-timesyncd[1586]: Contacted time server 74.6.168.73:123 (0.flatcar.pool.ntp.org). Oct 2 19:08:45.451876 systemd-timesyncd[1586]: Initial clock synchronization to Mon 2023-10-02 19:08:45.451388 UTC. Oct 2 19:08:45.452504 systemd-resolved[1584]: Clock change detected. Flushing caches. Oct 2 19:08:45.580208 systemd-networkd[1452]: eth0: Gained IPv6LL Oct 2 19:08:45.583081 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:08:45.584627 systemd[1]: Reached target network-online.target. Oct 2 19:08:45.852124 ldconfig[1558]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:08:45.859295 systemd[1]: Finished ldconfig.service. Oct 2 19:08:45.863245 systemd[1]: Starting systemd-update-done.service... Oct 2 19:08:45.874048 systemd[1]: Finished systemd-update-done.service. Oct 2 19:08:45.875842 systemd[1]: Reached target sysinit.target. Oct 2 19:08:45.877223 systemd[1]: Started motdgen.path. Oct 2 19:08:45.879258 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:08:45.881569 systemd[1]: Started logrotate.timer. Oct 2 19:08:45.882561 systemd[1]: Started mdadm.timer. Oct 2 19:08:45.883920 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:08:45.885474 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:08:45.885523 systemd[1]: Reached target paths.target. Oct 2 19:08:45.887090 systemd[1]: Reached target timers.target. Oct 2 19:08:45.888299 systemd[1]: Listening on dbus.socket. Oct 2 19:08:45.892548 systemd[1]: Starting docker.socket... Oct 2 19:08:45.900948 systemd[1]: Listening on sshd.socket. Oct 2 19:08:45.903737 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:45.905299 systemd[1]: Listening on docker.socket. Oct 2 19:08:45.906655 systemd[1]: Reached target sockets.target. Oct 2 19:08:45.908378 systemd[1]: Reached target basic.target. Oct 2 19:08:45.911205 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:08:45.911245 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:08:45.913027 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:08:45.917059 systemd[1]: Starting containerd.service... Oct 2 19:08:45.925289 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:08:45.928118 systemd[1]: Starting dbus.service... Oct 2 19:08:45.931392 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:08:45.945888 systemd[1]: Starting extend-filesystems.service... Oct 2 19:08:45.949561 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:08:45.951933 systemd[1]: Starting motdgen.service... Oct 2 19:08:45.956540 systemd[1]: Started nvidia.service. Oct 2 19:08:45.962174 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:08:45.972201 systemd[1]: Starting prepare-critools.service... Oct 2 19:08:45.977519 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:08:45.982338 systemd[1]: Starting sshd-keygen.service... Oct 2 19:08:45.991325 systemd[1]: Starting systemd-logind.service... Oct 2 19:08:45.998668 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:45.998756 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:08:45.999742 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:08:46.009639 systemd[1]: Starting update-engine.service... Oct 2 19:08:46.019763 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:08:46.084420 jq[1627]: true Oct 2 19:08:46.150605 tar[1630]: crictl Oct 2 19:08:46.093422 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:08:46.180064 jq[1638]: true Oct 2 19:08:46.093906 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:08:46.187708 jq[1616]: false Oct 2 19:08:46.205749 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:08:46.205981 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:08:46.209405 tar[1629]: ./ Oct 2 19:08:46.209405 tar[1629]: ./macvlan Oct 2 19:08:46.224390 dbus-daemon[1615]: [system] SELinux support is enabled Oct 2 19:08:46.225003 systemd[1]: Started dbus.service. Oct 2 19:08:46.230792 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:08:46.230842 systemd[1]: Reached target system-config.target. Oct 2 19:08:46.233284 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:08:46.233313 systemd[1]: Reached target user-config.target. Oct 2 19:08:46.260510 dbus-daemon[1615]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1452 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:08:46.263250 extend-filesystems[1617]: Found nvme0n1 Oct 2 19:08:46.301271 dbus-daemon[1615]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:08:46.301663 extend-filesystems[1617]: Found nvme0n1p1 Oct 2 19:08:46.312872 extend-filesystems[1617]: Found nvme0n1p2 Oct 2 19:08:46.312872 extend-filesystems[1617]: Found nvme0n1p3 Oct 2 19:08:46.312872 extend-filesystems[1617]: Found usr Oct 2 19:08:46.308485 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:08:46.321344 extend-filesystems[1617]: Found nvme0n1p4 Oct 2 19:08:46.322749 extend-filesystems[1617]: Found nvme0n1p6 Oct 2 19:08:46.322749 extend-filesystems[1617]: Found nvme0n1p7 Oct 2 19:08:46.322749 extend-filesystems[1617]: Found nvme0n1p9 Oct 2 19:08:46.322749 extend-filesystems[1617]: Checking size of /dev/nvme0n1p9 Oct 2 19:08:46.358710 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:08:46.358957 systemd[1]: Finished motdgen.service. Oct 2 19:08:46.414885 extend-filesystems[1617]: Resized partition /dev/nvme0n1p9 Oct 2 19:08:46.464447 amazon-ssm-agent[1612]: 2023/10/02 19:08:46 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:08:46.469788 extend-filesystems[1681]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:08:46.471509 amazon-ssm-agent[1612]: Initializing new seelog logger Oct 2 19:08:46.471509 amazon-ssm-agent[1612]: New Seelog Logger Creation Complete Oct 2 19:08:46.471509 amazon-ssm-agent[1612]: 2023/10/02 19:08:46 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:08:46.471509 amazon-ssm-agent[1612]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:08:46.471509 amazon-ssm-agent[1612]: 2023/10/02 19:08:46 processing appconfig overrides Oct 2 19:08:46.476077 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:08:46.495472 update_engine[1626]: I1002 19:08:46.494488 1626 main.cc:92] Flatcar Update Engine starting Oct 2 19:08:46.510050 systemd[1]: Started update-engine.service. Oct 2 19:08:46.510628 update_engine[1626]: I1002 19:08:46.510504 1626 update_check_scheduler.cc:74] Next update check in 4m31s Oct 2 19:08:46.513778 systemd[1]: Started locksmithd.service. Oct 2 19:08:46.581593 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:08:46.611841 systemd-logind[1624]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:08:46.616197 systemd-logind[1624]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:08:46.616379 systemd-logind[1624]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:08:46.617139 systemd-logind[1624]: New seat seat0. Oct 2 19:08:46.625722 extend-filesystems[1681]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:08:46.625722 extend-filesystems[1681]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:08:46.625722 extend-filesystems[1681]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:08:46.619782 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:08:46.687016 extend-filesystems[1617]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:08:46.688828 bash[1682]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:08:46.620586 systemd[1]: Finished extend-filesystems.service. Oct 2 19:08:46.668997 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:08:46.689622 systemd[1]: Started systemd-logind.service. Oct 2 19:08:46.714587 env[1631]: time="2023-10-02T19:08:46.714436485Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:08:46.759530 tar[1629]: ./static Oct 2 19:08:46.880602 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:08:46.896324 dbus-daemon[1615]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:08:46.897833 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:08:46.900979 dbus-daemon[1615]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1662 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:08:46.907967 systemd[1]: Starting polkit.service... Oct 2 19:08:46.971053 tar[1629]: ./vlan Oct 2 19:08:46.996334 polkitd[1727]: Started polkitd version 121 Oct 2 19:08:47.006015 env[1631]: time="2023-10-02T19:08:47.005900827Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:08:47.006171 env[1631]: time="2023-10-02T19:08:47.006098431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027168894Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027237366Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027694102Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027725452Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027746333Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027776868Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027918833Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:47.028840 env[1631]: time="2023-10-02T19:08:47.028795502Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:47.029155 env[1631]: time="2023-10-02T19:08:47.029126361Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:47.029263 env[1631]: time="2023-10-02T19:08:47.029247330Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:08:47.029436 env[1631]: time="2023-10-02T19:08:47.029414849Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:08:47.029559 env[1631]: time="2023-10-02T19:08:47.029542557Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:08:47.036624 polkitd[1727]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:08:47.038790 polkitd[1727]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:08:47.041295 env[1631]: time="2023-10-02T19:08:47.041240558Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:08:47.041504 env[1631]: time="2023-10-02T19:08:47.041481057Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:08:47.041528 polkitd[1727]: Finished loading, compiling and executing 2 rules Oct 2 19:08:47.041679 env[1631]: time="2023-10-02T19:08:47.041657965Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:08:47.041935 env[1631]: time="2023-10-02T19:08:47.041901325Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042062 env[1631]: time="2023-10-02T19:08:47.042043982Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042163 env[1631]: time="2023-10-02T19:08:47.042147035Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042266 env[1631]: time="2023-10-02T19:08:47.042250798Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042373 env[1631]: time="2023-10-02T19:08:47.042357933Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042466 env[1631]: time="2023-10-02T19:08:47.042451148Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042577 env[1631]: time="2023-10-02T19:08:47.042561704Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042670 env[1631]: time="2023-10-02T19:08:47.042657294Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.042765 env[1631]: time="2023-10-02T19:08:47.042749620Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:08:47.043004 env[1631]: time="2023-10-02T19:08:47.042988357Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:08:47.043230 env[1631]: time="2023-10-02T19:08:47.043212302Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:08:47.043367 dbus-daemon[1615]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:08:47.043571 systemd[1]: Started polkit.service. Oct 2 19:08:47.045295 env[1631]: time="2023-10-02T19:08:47.045109444Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:08:47.045295 env[1631]: time="2023-10-02T19:08:47.045220402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045295 env[1631]: time="2023-10-02T19:08:47.045245561Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:08:47.045453 env[1631]: time="2023-10-02T19:08:47.045355266Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045453 env[1631]: time="2023-10-02T19:08:47.045377349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045615 env[1631]: time="2023-10-02T19:08:47.045470168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045615 env[1631]: time="2023-10-02T19:08:47.045492470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045511670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045645951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045667065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045684412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.045905 env[1631]: time="2023-10-02T19:08:47.045722568Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.045995765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046025359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046083971Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046101498Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046122484Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046153782Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046180061Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046240771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:08:47.046800 env[1631]: time="2023-10-02T19:08:47.046589561Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:08:47.046800 env[1631]: time="2023-10-02T19:08:47.046701499Z" level=info msg="Connect containerd service" Oct 2 19:08:47.046800 env[1631]: time="2023-10-02T19:08:47.046765771Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:08:47.048410 polkitd[1727]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:08:47.057546 env[1631]: time="2023-10-02T19:08:47.057502145Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:08:47.057971 env[1631]: time="2023-10-02T19:08:47.057952589Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:08:47.058124 env[1631]: time="2023-10-02T19:08:47.058108196Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:08:47.058197 env[1631]: time="2023-10-02T19:08:47.058100854Z" level=info msg="Start subscribing containerd event" Oct 2 19:08:47.058453 env[1631]: time="2023-10-02T19:08:47.058424432Z" level=info msg="Start recovering state" Oct 2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058556554Z" level=info msg="Start event monitor" Oct 2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058575997Z" level=info msg="Start snapshots syncer" Oct 2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058589900Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058599612Z" level=info msg="Start streaming server" Oct 2 19:08:47.058640 systemd[1]: Started containerd.service. Oct 2 19:08:47.095786 systemd-hostnamed[1662]: Hostname set to <ip-172-31-31-246> (transient) Oct 2 19:08:47.095787 systemd-resolved[1584]: System hostname changed to 'ip-172-31-31-246'. Oct 2 19:08:47.100112 env[1631]: time="2023-10-02T19:08:47.100069112Z" level=info msg="containerd successfully booted in 0.527865s" Oct 2 19:08:47.167432 tar[1629]: ./portmap Oct 2 19:08:47.344790 amazon-ssm-agent[1612]: 2023-10-02 19:08:47 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-02d003a8daa88f21f is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-02d003a8daa88f21f because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:08:47.344790 amazon-ssm-agent[1612]: status code: 400, request id: af99b211-606f-461c-9be6-fbd1c0bd7b5b Oct 2 19:08:47.344790 amazon-ssm-agent[1612]: 2023-10-02 19:08:47 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:08:47.358866 tar[1629]: ./host-local Oct 2 19:08:47.405610 coreos-metadata[1614]: Oct 02 19:08:47.405 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:08:47.408489 coreos-metadata[1614]: Oct 02 19:08:47.408 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:08:47.409119 coreos-metadata[1614]: Oct 02 19:08:47.408 INFO Fetch successful Oct 2 19:08:47.409119 coreos-metadata[1614]: Oct 02 19:08:47.409 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:08:47.409894 coreos-metadata[1614]: Oct 02 19:08:47.409 INFO Fetch successful Oct 2 19:08:47.411857 unknown[1614]: wrote ssh authorized keys file for user: core Oct 2 19:08:47.442062 update-ssh-keys[1790]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:08:47.442436 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:08:47.513562 tar[1629]: ./vrf Oct 2 19:08:47.642968 tar[1629]: ./bridge Oct 2 19:08:47.678973 systemd[1]: Finished prepare-critools.service. Oct 2 19:08:47.723563 tar[1629]: ./tuning Oct 2 19:08:47.780693 tar[1629]: ./firewall Oct 2 19:08:47.867349 tar[1629]: ./host-device Oct 2 19:08:47.938158 tar[1629]: ./sbr Oct 2 19:08:47.992913 tar[1629]: ./loopback Oct 2 19:08:48.044404 tar[1629]: ./dhcp Oct 2 19:08:48.178286 tar[1629]: ./ptp Oct 2 19:08:48.238011 tar[1629]: ./ipvlan Oct 2 19:08:48.301489 tar[1629]: ./bandwidth Oct 2 19:08:48.379172 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:08:48.459881 locksmithd[1690]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:08:49.217865 sshd_keygen[1643]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:08:49.242508 systemd[1]: Finished sshd-keygen.service. Oct 2 19:08:49.245499 systemd[1]: Starting issuegen.service... Oct 2 19:08:49.252514 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:08:49.252685 systemd[1]: Finished issuegen.service. Oct 2 19:08:49.256012 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:08:49.264964 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:08:49.267870 systemd[1]: Started getty@tty1.service. Oct 2 19:08:49.270764 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:08:49.272409 systemd[1]: Reached target getty.target. Oct 2 19:08:49.273758 systemd[1]: Reached target multi-user.target. Oct 2 19:08:49.277001 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:08:49.286917 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:08:49.287416 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:08:49.288962 systemd[1]: Startup finished in 860ms (kernel) + 8.565s (initrd) + 11.707s (userspace) = 21.133s. Oct 2 19:08:54.474533 systemd[1]: Created slice system-sshd.slice. Oct 2 19:08:54.476740 systemd[1]: Started sshd@0-172.31.31.246:22-139.178.89.65:52408.service. Oct 2 19:08:54.684996 sshd[1823]: Accepted publickey for core from 139.178.89.65 port 52408 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:54.688002 sshd[1823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:54.703127 systemd[1]: Created slice user-500.slice. Oct 2 19:08:54.705344 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:08:54.709023 systemd-logind[1624]: New session 1 of user core. Oct 2 19:08:54.720825 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:08:54.724009 systemd[1]: Starting user@500.service... Oct 2 19:08:54.731894 (systemd)[1826]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:54.847236 systemd[1826]: Queued start job for default target default.target. Oct 2 19:08:54.847962 systemd[1826]: Reached target paths.target. Oct 2 19:08:54.847997 systemd[1826]: Reached target sockets.target. Oct 2 19:08:54.848016 systemd[1826]: Reached target timers.target. Oct 2 19:08:54.848047 systemd[1826]: Reached target basic.target. Oct 2 19:08:54.848179 systemd[1]: Started user@500.service. Oct 2 19:08:54.849588 systemd[1]: Started session-1.scope. Oct 2 19:08:54.850454 systemd[1826]: Reached target default.target. Oct 2 19:08:54.850760 systemd[1826]: Startup finished in 105ms. Oct 2 19:08:54.997178 systemd[1]: Started sshd@1-172.31.31.246:22-139.178.89.65:52416.service. Oct 2 19:08:55.162493 sshd[1835]: Accepted publickey for core from 139.178.89.65 port 52416 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:55.164275 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:55.169061 systemd-logind[1624]: New session 2 of user core. Oct 2 19:08:55.169667 systemd[1]: Started session-2.scope. Oct 2 19:08:55.313458 sshd[1835]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:55.318678 systemd[1]: sshd@1-172.31.31.246:22-139.178.89.65:52416.service: Deactivated successfully. Oct 2 19:08:55.320885 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:08:55.323261 systemd-logind[1624]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:08:55.325901 systemd-logind[1624]: Removed session 2. Oct 2 19:08:55.339416 systemd[1]: Started sshd@2-172.31.31.246:22-139.178.89.65:52432.service. Oct 2 19:08:55.512500 sshd[1841]: Accepted publickey for core from 139.178.89.65 port 52432 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:55.513962 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:55.522308 systemd-logind[1624]: New session 3 of user core. Oct 2 19:08:55.523592 systemd[1]: Started session-3.scope. Oct 2 19:08:55.654219 sshd[1841]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:55.657676 systemd[1]: sshd@2-172.31.31.246:22-139.178.89.65:52432.service: Deactivated successfully. Oct 2 19:08:55.659213 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:08:55.659854 systemd-logind[1624]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:08:55.660808 systemd-logind[1624]: Removed session 3. Oct 2 19:08:55.679098 systemd[1]: Started sshd@3-172.31.31.246:22-139.178.89.65:52440.service. Oct 2 19:08:55.836916 sshd[1847]: Accepted publickey for core from 139.178.89.65 port 52440 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:55.838509 sshd[1847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:55.844365 systemd[1]: Started session-4.scope. Oct 2 19:08:55.845116 systemd-logind[1624]: New session 4 of user core. Oct 2 19:08:55.972132 sshd[1847]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:55.975647 systemd[1]: sshd@3-172.31.31.246:22-139.178.89.65:52440.service: Deactivated successfully. Oct 2 19:08:55.976571 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:08:55.977263 systemd-logind[1624]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:08:55.978224 systemd-logind[1624]: Removed session 4. Oct 2 19:08:55.999485 systemd[1]: Started sshd@4-172.31.31.246:22-139.178.89.65:36702.service. Oct 2 19:08:56.163693 sshd[1853]: Accepted publickey for core from 139.178.89.65 port 36702 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:56.165367 sshd[1853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:56.173092 systemd-logind[1624]: New session 5 of user core. Oct 2 19:08:56.174182 systemd[1]: Started session-5.scope. Oct 2 19:08:56.300749 sudo[1856]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:08:56.301062 sudo[1856]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:56.309306 dbus-daemon[1615]: \xd0\xcd\xf1\xc0\u0007V: received setenforce notice (enforcing=-2113099360) Oct 2 19:08:56.311516 sudo[1856]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:56.335787 sshd[1853]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:56.340061 systemd[1]: sshd@4-172.31.31.246:22-139.178.89.65:36702.service: Deactivated successfully. Oct 2 19:08:56.341157 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:08:56.342085 systemd-logind[1624]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:08:56.343051 systemd-logind[1624]: Removed session 5. Oct 2 19:08:56.361716 systemd[1]: Started sshd@5-172.31.31.246:22-139.178.89.65:36710.service. Oct 2 19:08:56.523028 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 36710 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:56.524573 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:56.530161 systemd-logind[1624]: New session 6 of user core. Oct 2 19:08:56.530820 systemd[1]: Started session-6.scope. Oct 2 19:08:56.638672 sudo[1864]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:08:56.639364 sudo[1864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:56.646969 sudo[1864]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:56.654126 sudo[1863]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:08:56.654476 sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:56.665687 systemd[1]: Stopping audit-rules.service... Oct 2 19:08:56.666000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:08:56.669362 kernel: kauditd_printk_skb: 183 callbacks suppressed Oct 2 19:08:56.669414 kernel: audit: type=1305 audit(1696273736.666:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:08:56.669441 auditctl[1867]: No rules Oct 2 19:08:56.669933 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:08:56.670150 systemd[1]: Stopped audit-rules.service. Oct 2 19:08:56.673269 systemd[1]: Starting audit-rules.service... Oct 2 19:08:56.666000 audit[1867]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee9a60f10 a2=420 a3=0 items=0 ppid=1 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.685340 kernel: audit: type=1300 audit(1696273736.666:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee9a60f10 a2=420 a3=0 items=0 ppid=1 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.685462 kernel: audit: type=1327 audit(1696273736.666:165): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:08:56.666000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:08:56.690784 kernel: audit: type=1131 audit(1696273736.668:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.700877 augenrules[1884]: No rules Oct 2 19:08:56.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.701546 systemd[1]: Finished audit-rules.service. Oct 2 19:08:56.708840 sudo[1863]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:56.711062 kernel: audit: type=1130 audit(1696273736.700:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.711141 kernel: audit: type=1106 audit(1696273736.707:168): pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.707000 audit[1863]: USER_END pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.707000 audit[1863]: CRED_DISP pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.719635 kernel: audit: type=1104 audit(1696273736.707:169): pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.731814 sshd[1860]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:56.732000 audit[1860]: USER_END pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.736671 systemd[1]: sshd@5-172.31.31.246:22-139.178.89.65:36710.service: Deactivated successfully. Oct 2 19:08:56.737983 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:08:56.740858 systemd-logind[1624]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:08:56.742172 systemd-logind[1624]: Removed session 6. Oct 2 19:08:56.733000 audit[1860]: CRED_DISP pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.749757 kernel: audit: type=1106 audit(1696273736.732:170): pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.749850 kernel: audit: type=1104 audit(1696273736.733:171): pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.749870 kernel: audit: type=1131 audit(1696273736.733:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.246:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.246:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.757404 systemd[1]: Started sshd@6-172.31.31.246:22-139.178.89.65:36714.service. Oct 2 19:08:56.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.246:22-139.178.89.65:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.919000 audit[1890]: USER_ACCT pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.920923 sshd[1890]: Accepted publickey for core from 139.178.89.65 port 36714 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:56.922000 audit[1890]: CRED_ACQ pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.922000 audit[1890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbc0748b0 a2=3 a3=0 items=0 ppid=1 pid=1890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:56.923782 sshd[1890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:56.930496 systemd[1]: Started session-7.scope. Oct 2 19:08:56.931015 systemd-logind[1624]: New session 7 of user core. Oct 2 19:08:56.937000 audit[1890]: USER_START pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:56.939000 audit[1893]: CRED_ACQ pid=1893 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:57.032000 audit[1894]: USER_ACCT pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:57.032000 audit[1894]: CRED_REFR pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:57.033741 sudo[1894]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:08:57.034026 sudo[1894]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:57.035000 audit[1894]: USER_START pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:57.609778 systemd[1]: Reloading. Oct 2 19:08:57.720486 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2023-10-02T19:08:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:57.720883 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2023-10-02T19:08:57Z" level=info msg="torcx already run" Oct 2 19:08:57.842385 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:57.842408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:57.871370 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.019000 audit: BPF prog-id=37 op=LOAD Oct 2 19:08:58.019000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:08:58.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit: BPF prog-id=38 op=LOAD Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit: BPF prog-id=39 op=LOAD Oct 2 19:08:58.021000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:08:58.021000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit: BPF prog-id=40 op=LOAD Oct 2 19:08:58.021000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit: BPF prog-id=41 op=LOAD Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.022000 audit: BPF prog-id=42 op=LOAD Oct 2 19:08:58.022000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:08:58.022000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit: BPF prog-id=43 op=LOAD Oct 2 19:08:58.025000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit: BPF prog-id=44 op=LOAD Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.025000 audit: BPF prog-id=45 op=LOAD Oct 2 19:08:58.025000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:08:58.025000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit: BPF prog-id=46 op=LOAD Oct 2 19:08:58.027000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit: BPF prog-id=47 op=LOAD Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.027000 audit: BPF prog-id=48 op=LOAD Oct 2 19:08:58.027000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:08:58.028000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.029000 audit: BPF prog-id=49 op=LOAD Oct 2 19:08:58.029000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.031000 audit: BPF prog-id=50 op=LOAD Oct 2 19:08:58.031000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit: BPF prog-id=51 op=LOAD Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.032000 audit: BPF prog-id=52 op=LOAD Oct 2 19:08:58.032000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:08:58.032000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.034000 audit: BPF prog-id=53 op=LOAD Oct 2 19:08:58.034000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.035000 audit: BPF prog-id=54 op=LOAD Oct 2 19:08:58.035000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:08:58.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:58.056513 systemd[1]: Started kubelet.service. Oct 2 19:08:58.085557 systemd[1]: Starting coreos-metadata.service... Oct 2 19:08:58.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:08:58.198485 kubelet[1976]: E1002 19:08:58.189450 1976 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:08:58.193480 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:08:58.193615 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:08:58.256677 coreos-metadata[1984]: Oct 02 19:08:58.256 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:08:58.257556 coreos-metadata[1984]: Oct 02 19:08:58.257 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Oct 2 19:08:58.258188 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetch successful Oct 2 19:08:58.258280 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Oct 2 19:08:58.258867 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetch successful Oct 2 19:08:58.258937 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Oct 2 19:08:58.259496 coreos-metadata[1984]: Oct 02 19:08:58.259 INFO Fetch successful Oct 2 19:08:58.259581 coreos-metadata[1984]: Oct 02 19:08:58.259 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Oct 2 19:08:58.260165 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetch successful Oct 2 19:08:58.260348 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Oct 2 19:08:58.260807 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetch successful Oct 2 19:08:58.260807 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Oct 2 19:08:58.261369 coreos-metadata[1984]: Oct 02 19:08:58.261 INFO Fetch successful Oct 2 19:08:58.261428 coreos-metadata[1984]: Oct 02 19:08:58.261 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Oct 2 19:08:58.262014 coreos-metadata[1984]: Oct 02 19:08:58.261 INFO Fetch successful Oct 2 19:08:58.262124 coreos-metadata[1984]: Oct 02 19:08:58.262 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Oct 2 19:08:58.262546 coreos-metadata[1984]: Oct 02 19:08:58.262 INFO Fetch successful Oct 2 19:08:58.274147 systemd[1]: Finished coreos-metadata.service. Oct 2 19:08:58.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:58.772050 systemd[1]: Stopped kubelet.service. Oct 2 19:08:58.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:58.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:58.794314 systemd[1]: Reloading. Oct 2 19:08:58.904061 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2023-10-02T19:08:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:58.904155 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2023-10-02T19:08:58Z" level=info msg="torcx already run" Oct 2 19:08:59.023980 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:59.024003 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:59.062818 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.168000 audit: BPF prog-id=55 op=LOAD Oct 2 19:08:59.168000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit: BPF prog-id=56 op=LOAD Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit: BPF prog-id=57 op=LOAD Oct 2 19:08:59.170000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:08:59.170000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit: BPF prog-id=58 op=LOAD Oct 2 19:08:59.171000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit: BPF prog-id=59 op=LOAD Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.171000 audit: BPF prog-id=60 op=LOAD Oct 2 19:08:59.171000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:08:59.171000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit: BPF prog-id=61 op=LOAD Oct 2 19:08:59.174000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit: BPF prog-id=62 op=LOAD Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.175000 audit: BPF prog-id=63 op=LOAD Oct 2 19:08:59.175000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:08:59.175000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit: BPF prog-id=64 op=LOAD Oct 2 19:08:59.177000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit: BPF prog-id=65 op=LOAD Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.177000 audit: BPF prog-id=66 op=LOAD Oct 2 19:08:59.178000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:08:59.178000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.179000 audit: BPF prog-id=67 op=LOAD Oct 2 19:08:59.180000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit: BPF prog-id=68 op=LOAD Oct 2 19:08:59.183000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit: BPF prog-id=69 op=LOAD Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.183000 audit: BPF prog-id=70 op=LOAD Oct 2 19:08:59.184000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:08:59.184000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.187000 audit: BPF prog-id=71 op=LOAD Oct 2 19:08:59.187000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.189000 audit: BPF prog-id=72 op=LOAD Oct 2 19:08:59.189000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:08:59.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:59.221915 systemd[1]: Started kubelet.service. Oct 2 19:08:59.293222 kubelet[2095]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:08:59.293222 kubelet[2095]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:59.293222 kubelet[2095]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:59.293222 kubelet[2095]: I1002 19:08:59.286695 2095 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:08:59.293222 kubelet[2095]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:08:59.293222 kubelet[2095]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:59.293222 kubelet[2095]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:59.764807 kubelet[2095]: I1002 19:08:59.764377 2095 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 19:08:59.764807 kubelet[2095]: I1002 19:08:59.764415 2095 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:08:59.764975 kubelet[2095]: I1002 19:08:59.764869 2095 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 19:08:59.768267 kubelet[2095]: I1002 19:08:59.768242 2095 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:59.773298 kubelet[2095]: I1002 19:08:59.773274 2095 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:08:59.773775 kubelet[2095]: I1002 19:08:59.773760 2095 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:08:59.773998 kubelet[2095]: I1002 19:08:59.773986 2095 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 19:08:59.774330 kubelet[2095]: I1002 19:08:59.774315 2095 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:08:59.774479 kubelet[2095]: I1002 19:08:59.774469 2095 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 19:08:59.774706 kubelet[2095]: I1002 19:08:59.774688 2095 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:59.784926 kubelet[2095]: I1002 19:08:59.784894 2095 kubelet.go:381] "Attempting to sync node with API server" Oct 2 19:08:59.788021 kubelet[2095]: I1002 19:08:59.788004 2095 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:08:59.788363 kubelet[2095]: I1002 19:08:59.788348 2095 kubelet.go:281] "Adding apiserver pod source" Oct 2 19:08:59.788557 kubelet[2095]: I1002 19:08:59.788540 2095 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:08:59.788676 kubelet[2095]: E1002 19:08:59.788663 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:08:59.788748 kubelet[2095]: E1002 19:08:59.788625 2095 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:08:59.789591 kubelet[2095]: I1002 19:08:59.789577 2095 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:08:59.790175 kubelet[2095]: W1002 19:08:59.790155 2095 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:08:59.791172 kubelet[2095]: I1002 19:08:59.791148 2095 server.go:1175] "Started kubelet" Oct 2 19:08:59.792000 audit[2095]: AVC avc: denied { mac_admin } for pid=2095 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:59.792000 audit[2095]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da1200 a1=c000b0d6c8 a2=c000da11d0 a3=25 items=0 ppid=1 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:59.792000 audit[2095]: AVC avc: denied { mac_admin } for pid=2095 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:59.792000 audit[2095]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006db840 a1=c000b0d6e0 a2=c000da1290 a3=25 items=0 ppid=1 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:59.793996 kubelet[2095]: I1002 19:08:59.793498 2095 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:08:59.793996 kubelet[2095]: I1002 19:08:59.793639 2095 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:08:59.793996 kubelet[2095]: I1002 19:08:59.793723 2095 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:08:59.810492 kubelet[2095]: I1002 19:08:59.810206 2095 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:08:59.811190 kubelet[2095]: I1002 19:08:59.811171 2095 server.go:438] "Adding debug handlers to kubelet server" Oct 2 19:08:59.815132 kubelet[2095]: I1002 19:08:59.813686 2095 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:08:59.819067 kubelet[2095]: I1002 19:08:59.816101 2095 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 19:08:59.821363 kubelet[2095]: E1002 19:08:59.819686 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaa612be8e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 791122062, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 791122062, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.822040 kubelet[2095]: E1002 19:08:59.822016 2095 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:08:59.822520 kubelet[2095]: E1002 19:08:59.822506 2095 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:08:59.825246 kubelet[2095]: E1002 19:08:59.825226 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:59.827092 kubelet[2095]: W1002 19:08:59.826344 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:08:59.827092 kubelet[2095]: E1002 19:08:59.826373 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:08:59.827092 kubelet[2095]: W1002 19:08:59.826416 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:08:59.827092 kubelet[2095]: E1002 19:08:59.826428 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:08:59.831418 kubelet[2095]: E1002 19:08:59.831285 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaa7f16eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 822493367, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 822493367, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.831745 kubelet[2095]: E1002 19:08:59.831714 2095 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:08:59.849083 kubelet[2095]: W1002 19:08:59.842869 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:08:59.849083 kubelet[2095]: E1002 19:08:59.842904 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:08:59.854000 audit[2107]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.854000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9b3bcb70 a2=0 a3=7fff9b3bcb5c items=0 ppid=2095 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:08:59.857000 audit[2114]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.857000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff039ea490 a2=0 a3=7fff039ea47c items=0 ppid=2095 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:08:59.859432 kubelet[2095]: E1002 19:08:59.859334 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.859678 kubelet[2095]: I1002 19:08:59.859645 2095 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 19:08:59.859678 kubelet[2095]: I1002 19:08:59.859672 2095 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 19:08:59.859775 kubelet[2095]: I1002 19:08:59.859690 2095 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:59.861241 kubelet[2095]: E1002 19:08:59.861161 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.862759 kubelet[2095]: I1002 19:08:59.862729 2095 policy_none.go:49] "None policy: Start" Oct 2 19:08:59.863512 kubelet[2095]: I1002 19:08:59.863479 2095 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 19:08:59.863512 kubelet[2095]: I1002 19:08:59.863514 2095 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:08:59.863848 kubelet[2095]: E1002 19:08:59.863771 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.875942 systemd[1]: Created slice kubepods.slice. Oct 2 19:08:59.889607 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:08:59.863000 audit[2117]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.863000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffca4512e0 a2=0 a3=7fffca4512cc items=0 ppid=2095 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:08:59.896000 audit[2122]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.896000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed74f25e0 a2=0 a3=7ffed74f25cc items=0 ppid=2095 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:08:59.900194 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:08:59.904316 kubelet[2095]: I1002 19:08:59.904294 2095 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:08:59.904000 audit[2095]: AVC avc: denied { mac_admin } for pid=2095 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.904000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:59.904000 audit[2095]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f4b1a0 a1=c000b0dad0 a2=c000f4b170 a3=25 items=0 ppid=1 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.904000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:59.905904 kubelet[2095]: I1002 19:08:59.905890 2095 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:08:59.906159 kubelet[2095]: I1002 19:08:59.906148 2095 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:08:59.907933 kubelet[2095]: E1002 19:08:59.907918 2095 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.246\" not found" Oct 2 19:08:59.911096 kubelet[2095]: E1002 19:08:59.910918 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaad22977d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 909601149, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 909601149, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.916437 kubelet[2095]: E1002 19:08:59.916415 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:08:59.917182 kubelet[2095]: I1002 19:08:59.917166 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:08:59.918705 kubelet[2095]: E1002 19:08:59.918691 2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246" Oct 2 19:08:59.919381 kubelet[2095]: E1002 19:08:59.919308 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 917116008, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.920485 kubelet[2095]: E1002 19:08:59.920419 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 917131726, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.921411 kubelet[2095]: E1002 19:08:59.921352 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 917136640, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:08:59.982000 audit[2128]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.982000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd9bf11cf0 a2=0 a3=7ffd9bf11cdc items=0 ppid=2095 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:08:59.984000 audit[2129]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.984000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc70a324e0 a2=0 a3=7ffc70a324cc items=0 ppid=2095 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:08:59.991000 audit[2132]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.991000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc5c326270 a2=0 a3=7ffc5c32625c items=0 ppid=2095 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:08:59.996000 audit[2135]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.996000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc2bc3bc90 a2=0 a3=7ffc2bc3bc7c items=0 ppid=2095 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:08:59.998000 audit[2136]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.998000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeebc13cb0 a2=0 a3=7ffeebc13c9c items=0 ppid=2095 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:08:59.999000 audit[2137]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:59.999000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffee96ce80 a2=0 a3=7fffee96ce6c items=0 ppid=2095 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:09:00.002000 audit[2139]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.002000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd7f1aba0 a2=0 a3=7ffdd7f1ab8c items=0 ppid=2095 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:09:00.022780 kubelet[2095]: E1002 19:09:00.017307 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.005000 audit[2141]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.005000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe78068570 a2=0 a3=7ffe7806855c items=0 ppid=2095 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:09:00.034149 kubelet[2095]: E1002 19:09:00.034116 2095 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:09:00.034000 audit[2144]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.034000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd742f7d50 a2=0 a3=7ffd742f7d3c items=0 ppid=2095 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:09:00.047000 audit[2146]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.047000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fffc560ef30 a2=0 a3=7fffc560ef1c items=0 ppid=2095 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:09:00.068000 audit[2149]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.068000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffcf7bc5980 a2=0 a3=7ffcf7bc596c items=0 ppid=2095 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:09:00.071298 kubelet[2095]: I1002 19:09:00.071268 2095 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:09:00.074000 audit[2151]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.074000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd36a36bd0 a2=0 a3=7ffd36a36bbc items=0 ppid=2095 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.074000 audit[2150]: NETFILTER_CFG table=mangle:18 family=10 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.074000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd67ab9930 a2=0 a3=7ffd67ab991c items=0 ppid=2095 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:09:00.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:09:00.080000 audit[2152]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.080000 audit[2153]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.080000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe428ca9c0 a2=0 a3=7ffe428ca9ac items=0 ppid=2095 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:09:00.080000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff257bc4e0 a2=0 a3=7fff257bc4cc items=0 ppid=2095 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:09:00.086000 audit[2154]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:00.086000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4de9d560 a2=0 a3=7ffd4de9d54c items=0 ppid=2095 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:09:00.092000 audit[2156]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.092000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd2ba5d40 a2=0 a3=7ffdd2ba5d2c items=0 ppid=2095 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:09:00.096000 audit[2157]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.096000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff94a542a0 a2=0 a3=7fff94a5428c items=0 ppid=2095 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:09:00.101000 audit[2159]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.101000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc1beaadc0 a2=0 a3=7ffc1beaadac items=0 ppid=2095 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:09:00.103000 audit[2160]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.103000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff67a02270 a2=0 a3=7fff67a0225c items=0 ppid=2095 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:09:00.104000 audit[2161]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.104000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca17c1a60 a2=0 a3=7ffca17c1a4c items=0 ppid=2095 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:09:00.108000 audit[2163]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.108000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe4a27fd00 a2=0 a3=7ffe4a27fcec items=0 ppid=2095 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:09:00.111000 audit[2165]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.111000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee75cafa0 a2=0 a3=7ffee75caf8c items=0 ppid=2095 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:09:00.116000 audit[2167]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.116000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffdbbe07b30 a2=0 a3=7ffdbbe07b1c items=0 ppid=2095 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:09:00.120167 kubelet[2095]: I1002 19:09:00.120130 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:09:00.121674 kubelet[2095]: E1002 19:09:00.121646 2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246" Oct 2 19:09:00.122247 kubelet[2095]: E1002 19:09:00.122151 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 120083394, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:00.121000 audit[2169]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.121000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffef662c2d0 a2=0 a3=7ffef662c2bc items=0 ppid=2095 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:09:00.123365 kubelet[2095]: E1002 19:09:00.123344 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.123902 kubelet[2095]: E1002 19:09:00.123811 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 120090914, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:00.126000 audit[2171]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.126000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd27fee600 a2=0 a3=7ffd27fee5ec items=0 ppid=2095 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:09:00.127794 kubelet[2095]: I1002 19:09:00.127769 2095 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:09:00.127794 kubelet[2095]: I1002 19:09:00.127801 2095 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 19:09:00.127917 kubelet[2095]: I1002 19:09:00.127824 2095 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 19:09:00.127917 kubelet[2095]: E1002 19:09:00.127874 2095 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:09:00.128000 audit[2172]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.128000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa5c28080 a2=0 a3=7fffa5c2806c items=0 ppid=2095 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:09:00.130163 kubelet[2095]: W1002 19:09:00.130142 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:00.130325 kubelet[2095]: E1002 19:09:00.130275 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:00.130000 audit[2173]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.130000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d088190 a2=0 a3=7ffd0d08817c items=0 ppid=2095 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:09:00.131000 audit[2174]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:00.131000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc860b0ca0 a2=0 a3=7ffc860b0c8c items=0 ppid=2095 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:09:00.203057 kubelet[2095]: E1002 19:09:00.202934 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 120095593, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:00.223858 kubelet[2095]: E1002 19:09:00.223824 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.324250 kubelet[2095]: E1002 19:09:00.324097 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.424575 kubelet[2095]: E1002 19:09:00.424530 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.436257 kubelet[2095]: E1002 19:09:00.436216 2095 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:09:00.523473 kubelet[2095]: I1002 19:09:00.523404 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:09:00.525503 kubelet[2095]: E1002 19:09:00.525473 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.525804 kubelet[2095]: E1002 19:09:00.525786 2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246" Oct 2 19:09:00.525983 kubelet[2095]: E1002 19:09:00.525779 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 523347782, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:00.593697 kubelet[2095]: E1002 19:09:00.593526 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 523363177, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:00.626148 kubelet[2095]: E1002 19:09:00.626096 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.726801 kubelet[2095]: E1002 19:09:00.726759 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.743284 kubelet[2095]: W1002 19:09:00.743241 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:00.743284 kubelet[2095]: E1002 19:09:00.743283 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:00.770832 kubelet[2095]: W1002 19:09:00.770805 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:00.770832 kubelet[2095]: E1002 19:09:00.770838 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:00.789006 kubelet[2095]: E1002 19:09:00.788959 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:00.793805 kubelet[2095]: E1002 19:09:00.793568 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 523367532, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:00.826913 kubelet[2095]: E1002 19:09:00.826840 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:00.865598 kubelet[2095]: W1002 19:09:00.865491 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:00.865598 kubelet[2095]: E1002 19:09:00.865533 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:00.927157 kubelet[2095]: E1002 19:09:00.927113 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.027875 kubelet[2095]: E1002 19:09:01.027824 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.128973 kubelet[2095]: E1002 19:09:01.128854 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.229307 kubelet[2095]: E1002 19:09:01.229259 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.238565 kubelet[2095]: E1002 19:09:01.238521 2095 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:09:01.327232 kubelet[2095]: I1002 19:09:01.327193 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:09:01.329179 kubelet[2095]: E1002 19:09:01.329148 2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246" Oct 2 19:09:01.329336 kubelet[2095]: E1002 19:09:01.329142 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 1, 327140921, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:01.329517 kubelet[2095]: E1002 19:09:01.329496 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.330967 kubelet[2095]: E1002 19:09:01.330885 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 1, 327154877, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:01.394556 kubelet[2095]: E1002 19:09:01.394386 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 1, 327158921, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:01.430334 kubelet[2095]: E1002 19:09:01.430265 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.531053 kubelet[2095]: E1002 19:09:01.530990 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.631763 kubelet[2095]: E1002 19:09:01.631711 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.651431 kubelet[2095]: W1002 19:09:01.651317 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:01.651431 kubelet[2095]: E1002 19:09:01.651361 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:01.732894 kubelet[2095]: E1002 19:09:01.732843 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.789330 kubelet[2095]: E1002 19:09:01.789278 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:01.832993 kubelet[2095]: E1002 19:09:01.832955 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:01.934148 kubelet[2095]: E1002 19:09:01.934020 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.034789 kubelet[2095]: E1002 19:09:02.034728 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.135749 kubelet[2095]: E1002 19:09:02.135702 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.236211 kubelet[2095]: E1002 19:09:02.236092 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.336985 kubelet[2095]: E1002 19:09:02.336933 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.406487 kubelet[2095]: W1002 19:09:02.406445 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:02.406487 kubelet[2095]: E1002 19:09:02.406487 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:02.437975 kubelet[2095]: E1002 19:09:02.437920 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.538691 kubelet[2095]: E1002 19:09:02.538587 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.638726 kubelet[2095]: E1002 19:09:02.638671 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.739548 kubelet[2095]: E1002 19:09:02.739502 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.790226 kubelet[2095]: E1002 19:09:02.790116 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:02.839658 kubelet[2095]: E1002 19:09:02.839616 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:02.841426 kubelet[2095]: E1002 19:09:02.841377 2095 controller.go:144] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:09:02.931190 kubelet[2095]: I1002 19:09:02.931147 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:09:02.933007 kubelet[2095]: E1002 19:09:02.932980 2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246" Oct 2 19:09:02.933208 kubelet[2095]: E1002 19:09:02.932975 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 931093740, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:02.935090 kubelet[2095]: E1002 19:09:02.934997 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 931108955, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:02.936466 kubelet[2095]: E1002 19:09:02.936382 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 931113071, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:02.941129 kubelet[2095]: E1002 19:09:02.941084 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.041883 kubelet[2095]: E1002 19:09:03.041711 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.142626 kubelet[2095]: E1002 19:09:03.142511 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.243285 kubelet[2095]: E1002 19:09:03.243237 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.340546 kubelet[2095]: W1002 19:09:03.340280 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:03.340546 kubelet[2095]: E1002 19:09:03.340404 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:03.344282 kubelet[2095]: E1002 19:09:03.344234 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.445073 kubelet[2095]: E1002 19:09:03.444902 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.531277 kubelet[2095]: W1002 19:09:03.531233 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:03.531277 kubelet[2095]: E1002 19:09:03.531280 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:03.545727 kubelet[2095]: E1002 19:09:03.545677 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.611723 kubelet[2095]: W1002 19:09:03.611610 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:03.611723 kubelet[2095]: E1002 19:09:03.611654 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:03.646077 kubelet[2095]: E1002 19:09:03.646024 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.746659 kubelet[2095]: E1002 19:09:03.746619 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.791307 kubelet[2095]: E1002 19:09:03.791126 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:03.847144 kubelet[2095]: E1002 19:09:03.847043 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:03.947648 kubelet[2095]: E1002 19:09:03.947528 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.048561 kubelet[2095]: E1002 19:09:04.048422 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.148859 kubelet[2095]: E1002 19:09:04.148820 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.249886 kubelet[2095]: E1002 19:09:04.249766 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.350402 kubelet[2095]: E1002 19:09:04.350355 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.451225 kubelet[2095]: E1002 19:09:04.451178 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.552125 kubelet[2095]: E1002 19:09:04.552004 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.652869 kubelet[2095]: E1002 19:09:04.652822 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.753915 kubelet[2095]: E1002 19:09:04.753864 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.791810 kubelet[2095]: E1002 19:09:04.791770 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:04.854930 kubelet[2095]: E1002 19:09:04.854823 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:04.907572 kubelet[2095]: E1002 19:09:04.907542 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:09:04.955740 kubelet[2095]: E1002 19:09:04.955692 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.056690 kubelet[2095]: E1002 19:09:05.056598 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.157760 kubelet[2095]: E1002 19:09:05.156771 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.257672 kubelet[2095]: E1002 19:09:05.257612 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.358610 kubelet[2095]: E1002 19:09:05.358466 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.459293 kubelet[2095]: E1002 19:09:05.459175 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.559922 kubelet[2095]: E1002 19:09:05.559871 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.660585 kubelet[2095]: E1002 19:09:05.660538 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.761373 kubelet[2095]: E1002 19:09:05.761266 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.792855 kubelet[2095]: E1002 19:09:05.792812 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:05.862182 kubelet[2095]: E1002 19:09:05.862070 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:05.963003 kubelet[2095]: E1002 19:09:05.962961 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.044060 kubelet[2095]: E1002 19:09:06.043941 2095 controller.go:144] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:09:06.063295 kubelet[2095]: E1002 19:09:06.063254 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.135474 kubelet[2095]: I1002 19:09:06.135443 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:09:06.138598 kubelet[2095]: E1002 19:09:06.138568 2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246" Oct 2 19:09:06.138746 kubelet[2095]: E1002 19:09:06.138533 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 135409891, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:06.140848 kubelet[2095]: E1002 19:09:06.140482 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 135415863, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:06.142286 kubelet[2095]: E1002 19:09:06.141599 2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 135418572, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:06.164058 kubelet[2095]: E1002 19:09:06.164002 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.264691 kubelet[2095]: E1002 19:09:06.264645 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.365808 kubelet[2095]: E1002 19:09:06.365624 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.466393 kubelet[2095]: E1002 19:09:06.466344 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.567211 kubelet[2095]: E1002 19:09:06.567167 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.667979 kubelet[2095]: E1002 19:09:06.667791 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.768482 kubelet[2095]: E1002 19:09:06.768432 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.793743 kubelet[2095]: E1002 19:09:06.793652 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:06.869221 kubelet[2095]: E1002 19:09:06.869178 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:06.970213 kubelet[2095]: E1002 19:09:06.970099 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.070783 kubelet[2095]: E1002 19:09:07.070736 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.171372 kubelet[2095]: E1002 19:09:07.171216 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.272582 kubelet[2095]: E1002 19:09:07.272465 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.373166 kubelet[2095]: E1002 19:09:07.373114 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.473819 kubelet[2095]: E1002 19:09:07.473778 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.546642 kubelet[2095]: W1002 19:09:07.546537 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:07.546642 kubelet[2095]: E1002 19:09:07.546574 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:07.574865 kubelet[2095]: E1002 19:09:07.574816 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.675485 kubelet[2095]: E1002 19:09:07.675443 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.776366 kubelet[2095]: E1002 19:09:07.776319 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.794641 kubelet[2095]: E1002 19:09:07.794513 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:07.876947 kubelet[2095]: E1002 19:09:07.876824 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:07.977842 kubelet[2095]: E1002 19:09:07.977789 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.067447 kubelet[2095]: W1002 19:09:08.067416 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:08.067447 kubelet[2095]: E1002 19:09:08.067449 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:08.078771 kubelet[2095]: E1002 19:09:08.078719 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.179989 kubelet[2095]: E1002 19:09:08.179782 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.181198 kubelet[2095]: W1002 19:09:08.181171 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:08.181198 kubelet[2095]: E1002 19:09:08.181205 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:08.280467 kubelet[2095]: E1002 19:09:08.280417 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.381154 kubelet[2095]: E1002 19:09:08.381102 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.481850 kubelet[2095]: E1002 19:09:08.481742 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.582548 kubelet[2095]: E1002 19:09:08.582496 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.683128 kubelet[2095]: E1002 19:09:08.683086 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.784149 kubelet[2095]: E1002 19:09:08.784021 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.795280 kubelet[2095]: E1002 19:09:08.795236 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:08.884715 kubelet[2095]: E1002 19:09:08.884671 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:08.985871 kubelet[2095]: E1002 19:09:08.985800 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.086753 kubelet[2095]: E1002 19:09:09.086639 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.186949 kubelet[2095]: E1002 19:09:09.186904 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.288048 kubelet[2095]: E1002 19:09:09.287988 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.388913 kubelet[2095]: E1002 19:09:09.388803 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.489518 kubelet[2095]: E1002 19:09:09.489473 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.590278 kubelet[2095]: E1002 19:09:09.590181 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.681871 kubelet[2095]: W1002 19:09:09.681767 2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:09.681871 kubelet[2095]: E1002 19:09:09.681808 2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:09.690916 kubelet[2095]: E1002 19:09:09.690873 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.767346 kubelet[2095]: I1002 19:09:09.767304 2095 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:09:09.791759 kubelet[2095]: E1002 19:09:09.791711 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.795935 kubelet[2095]: E1002 19:09:09.795896 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:09.892802 kubelet[2095]: E1002 19:09:09.892753 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:09.908053 kubelet[2095]: E1002 19:09:09.907984 2095 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.246\" not found" Oct 2 19:09:09.908611 kubelet[2095]: E1002 19:09:09.908574 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:09:09.993317 kubelet[2095]: E1002 19:09:09.993150 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.093800 kubelet[2095]: E1002 19:09:10.093763 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.194792 kubelet[2095]: E1002 19:09:10.194751 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.195297 kubelet[2095]: E1002 19:09:10.195267 2095 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.31.246" not found Oct 2 19:09:10.295342 kubelet[2095]: E1002 19:09:10.295133 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.395761 kubelet[2095]: E1002 19:09:10.395715 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.496657 kubelet[2095]: E1002 19:09:10.496580 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.597567 kubelet[2095]: E1002 19:09:10.597449 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.698453 kubelet[2095]: E1002 19:09:10.698409 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.796394 kubelet[2095]: E1002 19:09:10.796339 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:10.798576 kubelet[2095]: E1002 19:09:10.798537 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:10.899392 kubelet[2095]: E1002 19:09:10.899280 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.000267 kubelet[2095]: E1002 19:09:11.000190 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.100876 kubelet[2095]: E1002 19:09:11.100832 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.201521 kubelet[2095]: E1002 19:09:11.201406 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.283811 kubelet[2095]: E1002 19:09:11.283722 2095 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.31.246" not found Oct 2 19:09:11.302115 kubelet[2095]: E1002 19:09:11.302070 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.402847 kubelet[2095]: E1002 19:09:11.402798 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.504019 kubelet[2095]: E1002 19:09:11.503846 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.604650 kubelet[2095]: E1002 19:09:11.604601 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.705581 kubelet[2095]: E1002 19:09:11.705538 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.797359 kubelet[2095]: E1002 19:09:11.797250 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:11.806548 kubelet[2095]: E1002 19:09:11.806501 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:11.907333 kubelet[2095]: E1002 19:09:11.907221 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.008272 kubelet[2095]: E1002 19:09:12.008225 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.109478 kubelet[2095]: E1002 19:09:12.109330 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.210144 kubelet[2095]: E1002 19:09:12.210104 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.310485 kubelet[2095]: E1002 19:09:12.310439 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.411283 kubelet[2095]: E1002 19:09:12.411167 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.458008 kubelet[2095]: E1002 19:09:12.457940 2095 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.31.246\" not found" node="172.31.31.246" Oct 2 19:09:12.511545 kubelet[2095]: E1002 19:09:12.511504 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.539606 kubelet[2095]: I1002 19:09:12.539572 2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246" Oct 2 19:09:12.612487 kubelet[2095]: E1002 19:09:12.612392 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.687758 kubelet[2095]: I1002 19:09:12.687579 2095 kubelet_node_status.go:73] "Successfully registered node" node="172.31.31.246" Oct 2 19:09:12.713567 kubelet[2095]: E1002 19:09:12.713524 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.764156 sudo[1894]: pam_unix(sudo:session): session closed for user root Oct 2 19:09:12.767326 kernel: kauditd_printk_skb: 540 callbacks suppressed Oct 2 19:09:12.767381 kernel: audit: type=1106 audit(1696273752.763:636): pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.763000 audit[1894]: USER_END pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.763000 audit[1894]: CRED_DISP pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.780104 kernel: audit: type=1104 audit(1696273752.763:637): pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.787547 sshd[1890]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:12.788000 audit[1890]: USER_END pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:12.793302 systemd[1]: sshd@6-172.31.31.246:22-139.178.89.65:36714.service: Deactivated successfully. Oct 2 19:09:12.794393 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:09:12.798971 kubelet[2095]: E1002 19:09:12.798617 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:12.799412 systemd-logind[1624]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:09:12.801506 kernel: audit: type=1106 audit(1696273752.788:638): pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:12.801585 kernel: audit: type=1104 audit(1696273752.789:639): pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:12.789000 audit[1890]: CRED_DISP pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:12.801086 systemd-logind[1624]: Removed session 7. Oct 2 19:09:12.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.246:22-139.178.89.65:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.813145 kernel: audit: type=1131 audit(1696273752.789:640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.246:22-139.178.89.65:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.814413 kubelet[2095]: E1002 19:09:12.814383 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:12.914562 kubelet[2095]: E1002 19:09:12.914511 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.015612 kubelet[2095]: E1002 19:09:13.015487 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.115631 kubelet[2095]: E1002 19:09:13.115576 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.215742 kubelet[2095]: E1002 19:09:13.215687 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.316653 kubelet[2095]: E1002 19:09:13.316252 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.416765 kubelet[2095]: E1002 19:09:13.416714 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.517222 kubelet[2095]: E1002 19:09:13.517181 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.617864 kubelet[2095]: E1002 19:09:13.617745 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.718301 kubelet[2095]: E1002 19:09:13.718257 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.799988 kubelet[2095]: E1002 19:09:13.799888 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:13.818631 kubelet[2095]: E1002 19:09:13.818584 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:13.919452 kubelet[2095]: E1002 19:09:13.919351 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.020136 kubelet[2095]: E1002 19:09:14.020091 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.120932 kubelet[2095]: E1002 19:09:14.120885 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.221110 kubelet[2095]: E1002 19:09:14.220979 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.322138 kubelet[2095]: E1002 19:09:14.322090 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.422863 kubelet[2095]: E1002 19:09:14.422820 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.523496 kubelet[2095]: E1002 19:09:14.523387 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.624105 kubelet[2095]: E1002 19:09:14.624059 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.724857 kubelet[2095]: E1002 19:09:14.724808 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.800524 kubelet[2095]: E1002 19:09:14.800403 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:14.825570 kubelet[2095]: E1002 19:09:14.825525 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:14.909255 kubelet[2095]: E1002 19:09:14.909225 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:09:14.925986 kubelet[2095]: E1002 19:09:14.925939 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.026726 kubelet[2095]: E1002 19:09:15.026681 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.127387 kubelet[2095]: E1002 19:09:15.127342 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.228332 kubelet[2095]: E1002 19:09:15.228287 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.329265 kubelet[2095]: E1002 19:09:15.329219 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.429813 kubelet[2095]: E1002 19:09:15.429704 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.530134 kubelet[2095]: E1002 19:09:15.530087 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.630654 kubelet[2095]: E1002 19:09:15.630611 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.731287 kubelet[2095]: E1002 19:09:15.731179 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.801137 kubelet[2095]: E1002 19:09:15.801052 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:15.831597 kubelet[2095]: E1002 19:09:15.831555 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:15.932345 kubelet[2095]: E1002 19:09:15.932301 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.033060 kubelet[2095]: E1002 19:09:16.032938 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.133810 kubelet[2095]: E1002 19:09:16.133763 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.234598 kubelet[2095]: E1002 19:09:16.234551 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.335612 kubelet[2095]: E1002 19:09:16.335505 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.436566 kubelet[2095]: E1002 19:09:16.436523 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.537043 kubelet[2095]: E1002 19:09:16.536991 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.637543 kubelet[2095]: E1002 19:09:16.637507 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.738140 kubelet[2095]: E1002 19:09:16.738083 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.801681 kubelet[2095]: E1002 19:09:16.801644 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:16.839244 kubelet[2095]: E1002 19:09:16.839205 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:16.940125 kubelet[2095]: E1002 19:09:16.939937 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.040748 kubelet[2095]: E1002 19:09:17.040694 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.126714 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:09:17.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:17.133069 kernel: audit: type=1131 audit(1696273757.126:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:17.141357 kubelet[2095]: E1002 19:09:17.141319 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.149000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:09:17.149000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:09:17.154004 kernel: audit: type=1334 audit(1696273757.149:642): prog-id=63 op=UNLOAD Oct 2 19:09:17.156441 kernel: audit: type=1334 audit(1696273757.149:643): prog-id=62 op=UNLOAD Oct 2 19:09:17.156697 kernel: audit: type=1334 audit(1696273757.149:644): prog-id=61 op=UNLOAD Oct 2 19:09:17.149000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:09:17.241959 kubelet[2095]: E1002 19:09:17.241493 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.342856 kubelet[2095]: E1002 19:09:17.342815 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.443531 kubelet[2095]: E1002 19:09:17.443489 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.544255 kubelet[2095]: E1002 19:09:17.544095 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.644662 kubelet[2095]: E1002 19:09:17.644612 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.745284 kubelet[2095]: E1002 19:09:17.745241 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.802912 kubelet[2095]: E1002 19:09:17.802791 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:17.846392 kubelet[2095]: E1002 19:09:17.846343 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:17.947009 kubelet[2095]: E1002 19:09:17.946965 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:18.047653 kubelet[2095]: E1002 19:09:18.047605 2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found" Oct 2 19:09:18.148050 kubelet[2095]: I1002 19:09:18.147998 2095 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:09:18.148703 env[1631]: time="2023-10-02T19:09:18.148655220Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:09:18.149140 kubelet[2095]: I1002 19:09:18.148921 2095 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:09:18.149385 kubelet[2095]: E1002 19:09:18.149366 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:09:18.801387 kubelet[2095]: I1002 19:09:18.801341 2095 apiserver.go:52] "Watching apiserver" Oct 2 19:09:18.803545 kubelet[2095]: E1002 19:09:18.803480 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:18.804256 kubelet[2095]: I1002 19:09:18.804233 2095 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:18.804390 kubelet[2095]: I1002 19:09:18.804370 2095 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:18.814342 systemd[1]: Created slice kubepods-besteffort-podb3c6fc13_5b0a_4c72_a1dd_b7d2475b5f77.slice. Oct 2 19:09:18.836219 systemd[1]: Created slice kubepods-besteffort-pod583dc39d_ddf8_425b_8f72_0e08fe8debf5.slice. Oct 2 19:09:18.837428 kubelet[2095]: I1002 19:09:18.837404 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-policysync\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.837607 kubelet[2095]: I1002 19:09:18.837596 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-tigera-ca-bundle\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.839775 kubelet[2095]: I1002 19:09:18.839753 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-node-certs\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.839950 kubelet[2095]: I1002 19:09:18.839935 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-var-lib-calico\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840085 kubelet[2095]: I1002 19:09:18.840072 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/583dc39d-ddf8-425b-8f72-0e08fe8debf5-kube-proxy\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9" Oct 2 19:09:18.840219 kubelet[2095]: I1002 19:09:18.840195 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-lib-modules\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840290 kubelet[2095]: I1002 19:09:18.840244 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-var-run-calico\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840290 kubelet[2095]: I1002 19:09:18.840284 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-cni-bin-dir\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840385 kubelet[2095]: I1002 19:09:18.840329 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9xs2\" (UniqueName: \"kubernetes.io/projected/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-kube-api-access-h9xs2\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840385 kubelet[2095]: I1002 19:09:18.840368 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/583dc39d-ddf8-425b-8f72-0e08fe8debf5-lib-modules\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9" Oct 2 19:09:18.840487 kubelet[2095]: I1002 19:09:18.840408 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-flexvol-driver-host\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840487 kubelet[2095]: I1002 19:09:18.840450 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/583dc39d-ddf8-425b-8f72-0e08fe8debf5-xtables-lock\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9" Oct 2 19:09:18.840593 kubelet[2095]: I1002 19:09:18.840491 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mk9ct\" (UniqueName: \"kubernetes.io/projected/583dc39d-ddf8-425b-8f72-0e08fe8debf5-kube-api-access-mk9ct\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9" Oct 2 19:09:18.840593 kubelet[2095]: I1002 19:09:18.840531 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-xtables-lock\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840593 kubelet[2095]: I1002 19:09:18.840570 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-cni-net-dir\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840715 kubelet[2095]: I1002 19:09:18.840609 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-cni-log-dir\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp" Oct 2 19:09:18.840715 kubelet[2095]: I1002 19:09:18.840627 2095 reconciler.go:169] "Reconciler: start to sync state" Oct 2 19:09:19.042258 kubelet[2095]: E1002 19:09:19.042194 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.042258 kubelet[2095]: W1002 19:09:19.042250 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.042503 kubelet[2095]: E1002 19:09:19.042283 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.042563 kubelet[2095]: E1002 19:09:19.042519 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.042563 kubelet[2095]: W1002 19:09:19.042529 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.042563 kubelet[2095]: E1002 19:09:19.042545 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.143656 kubelet[2095]: E1002 19:09:19.143626 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.143656 kubelet[2095]: W1002 19:09:19.143648 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.143899 kubelet[2095]: E1002 19:09:19.143671 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.143965 kubelet[2095]: E1002 19:09:19.143937 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.143965 kubelet[2095]: W1002 19:09:19.143948 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.144068 kubelet[2095]: E1002 19:09:19.143977 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.244998 kubelet[2095]: E1002 19:09:19.243194 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.244998 kubelet[2095]: W1002 19:09:19.243299 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.244998 kubelet[2095]: E1002 19:09:19.243327 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.245421 kubelet[2095]: E1002 19:09:19.245401 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.245421 kubelet[2095]: W1002 19:09:19.245417 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.245532 kubelet[2095]: E1002 19:09:19.245439 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.346977 kubelet[2095]: E1002 19:09:19.346945 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.346977 kubelet[2095]: W1002 19:09:19.346971 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.347167 kubelet[2095]: E1002 19:09:19.346995 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.420229 kubelet[2095]: E1002 19:09:19.419177 2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:19.420229 kubelet[2095]: W1002 19:09:19.420074 2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:19.420229 kubelet[2095]: E1002 19:09:19.420113 2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:19.433442 env[1631]: time="2023-10-02T19:09:19.433389855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q6mqp,Uid:b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:19.442115 env[1631]: time="2023-10-02T19:09:19.442065515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dpwx9,Uid:583dc39d-ddf8-425b-8f72-0e08fe8debf5,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:19.789059 kubelet[2095]: E1002 19:09:19.788877 2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:19.804243 kubelet[2095]: E1002 19:09:19.804187 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:19.909691 kubelet[2095]: E1002 19:09:19.909646 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:09:19.964412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1083519903.mount: Deactivated successfully. Oct 2 19:09:19.971077 env[1631]: time="2023-10-02T19:09:19.971013013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.975163 env[1631]: time="2023-10-02T19:09:19.975121456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.976887 env[1631]: time="2023-10-02T19:09:19.976845118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.979474 env[1631]: time="2023-10-02T19:09:19.979431931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.980371 env[1631]: time="2023-10-02T19:09:19.980337307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.981403 env[1631]: time="2023-10-02T19:09:19.981373651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.984133 env[1631]: time="2023-10-02T19:09:19.984100809Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:19.987352 env[1631]: time="2023-10-02T19:09:19.987314089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:20.028312 env[1631]: time="2023-10-02T19:09:20.028072070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:20.028312 env[1631]: time="2023-10-02T19:09:20.028121883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:20.028312 env[1631]: time="2023-10-02T19:09:20.028139077Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:20.030568 env[1631]: time="2023-10-02T19:09:20.030486585Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925 pid=2197 runtime=io.containerd.runc.v2 Oct 2 19:09:20.030753 env[1631]: time="2023-10-02T19:09:20.030553567Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:20.030851 env[1631]: time="2023-10-02T19:09:20.030745029Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:20.031048 env[1631]: time="2023-10-02T19:09:20.030996655Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:20.031437 env[1631]: time="2023-10-02T19:09:20.031279550Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf pid=2209 runtime=io.containerd.runc.v2 Oct 2 19:09:20.065631 systemd[1]: Started cri-containerd-ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925.scope. Oct 2 19:09:20.081485 systemd[1]: Started cri-containerd-cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf.scope. Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.112514 kernel: audit: type=1400 audit(1696273760.097:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.112726 kernel: audit: type=1400 audit(1696273760.097:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.130056 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:20.130167 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:20.130243 kernel: audit: type=1400 audit(1696273760.097:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.130271 kernel: audit: type=1400 audit(1696273760.097:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.130307 kernel: audit: backlog limit exceeded Oct 2 19:09:20.130333 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:20.130358 kernel: audit: type=1400 audit(1696273760.097:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.130384 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.098000 audit: BPF prog-id=73 op=LOAD Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.105000 audit: BPF prog-id=74 op=LOAD Oct 2 19:09:20.105000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167210 items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit: BPF prog-id=75 op=LOAD Oct 2 19:09:20.111000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000167258 items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661 Oct 2 19:09:20.111000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:09:20.111000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.111000 audit: BPF prog-id=76 op=LOAD Oct 2 19:09:20.111000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000167668 items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661 Oct 2 19:09:20.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.138000 audit: BPF prog-id=77 op=LOAD Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit: BPF prog-id=78 op=LOAD Oct 2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad620 items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit: BPF prog-id=79 op=LOAD Oct 2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001ad668 items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138 Oct 2 19:09:20.139000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:09:20.139000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.139000 audit: BPF prog-id=80 op=LOAD Oct 2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001ada78 items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138 Oct 2 19:09:20.177161 env[1631]: time="2023-10-02T19:09:20.175524740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q6mqp,Uid:b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77,Namespace:calico-system,Attempt:0,} returns sandbox id \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\"" Oct 2 19:09:20.178386 env[1631]: time="2023-10-02T19:09:20.178345164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:09:20.180182 env[1631]: time="2023-10-02T19:09:20.180144557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dpwx9,Uid:583dc39d-ddf8-425b-8f72-0e08fe8debf5,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925\"" Oct 2 19:09:20.804971 kubelet[2095]: E1002 19:09:20.804932 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:21.347663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2614264977.mount: Deactivated successfully. Oct 2 19:09:21.805499 kubelet[2095]: E1002 19:09:21.805451 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:22.314303 env[1631]: time="2023-10-02T19:09:22.314248941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:22.317331 env[1631]: time="2023-10-02T19:09:22.317290001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:22.320715 env[1631]: time="2023-10-02T19:09:22.320677626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:22.324192 env[1631]: time="2023-10-02T19:09:22.324153513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:22.325362 env[1631]: time="2023-10-02T19:09:22.325323083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:09:22.327517 env[1631]: time="2023-10-02T19:09:22.327485516Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 19:09:22.328774 env[1631]: time="2023-10-02T19:09:22.328737267Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:09:22.350814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2786147232.mount: Deactivated successfully. Oct 2 19:09:22.359006 env[1631]: time="2023-10-02T19:09:22.358850620Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a\"" Oct 2 19:09:22.361314 env[1631]: time="2023-10-02T19:09:22.361271216Z" level=info msg="StartContainer for \"36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a\"" Oct 2 19:09:22.401737 systemd[1]: Started cri-containerd-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a.scope. Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit: BPF prog-id=81 op=LOAD Oct 2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003223f0 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit: BPF prog-id=82 op=LOAD Oct 2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000322438 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137 Oct 2 19:09:22.423000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:09:22.423000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:22.423000 audit: BPF prog-id=83 op=LOAD Oct 2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003224c8 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137 Oct 2 19:09:22.454023 env[1631]: time="2023-10-02T19:09:22.453972942Z" level=info msg="StartContainer for \"36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a\" returns successfully" Oct 2 19:09:22.463332 systemd[1]: cri-containerd-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a.scope: Deactivated successfully. Oct 2 19:09:22.464000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:09:22.580436 env[1631]: time="2023-10-02T19:09:22.580309773Z" level=info msg="shim disconnected" id=36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a Oct 2 19:09:22.580436 env[1631]: time="2023-10-02T19:09:22.580355134Z" level=warning msg="cleaning up after shim disconnected" id=36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a namespace=k8s.io Oct 2 19:09:22.580436 env[1631]: time="2023-10-02T19:09:22.580367763Z" level=info msg="cleaning up dead shim" Oct 2 19:09:22.592647 env[1631]: time="2023-10-02T19:09:22.592600938Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2320 runtime=io.containerd.runc.v2\n" Oct 2 19:09:22.806697 kubelet[2095]: E1002 19:09:22.806659 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:23.347266 systemd[1]: run-containerd-runc-k8s.io-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a-runc.eRVVpx.mount: Deactivated successfully. Oct 2 19:09:23.347492 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a-rootfs.mount: Deactivated successfully. Oct 2 19:09:23.427058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1078834401.mount: Deactivated successfully. Oct 2 19:09:23.807838 kubelet[2095]: E1002 19:09:23.807107 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:23.973676 env[1631]: time="2023-10-02T19:09:23.973624066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:23.976461 env[1631]: time="2023-10-02T19:09:23.976350292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:23.982372 env[1631]: time="2023-10-02T19:09:23.982327728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:23.986577 env[1631]: time="2023-10-02T19:09:23.986531986Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:23.987451 env[1631]: time="2023-10-02T19:09:23.987376938Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2\"" Oct 2 19:09:23.988760 env[1631]: time="2023-10-02T19:09:23.988737118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:09:23.990648 env[1631]: time="2023-10-02T19:09:23.990609401Z" level=info msg="CreateContainer within sandbox \"ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:09:24.007775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount870995717.mount: Deactivated successfully. Oct 2 19:09:24.055311 env[1631]: time="2023-10-02T19:09:24.055256540Z" level=info msg="CreateContainer within sandbox \"ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df\"" Oct 2 19:09:24.056177 env[1631]: time="2023-10-02T19:09:24.056128766Z" level=info msg="StartContainer for \"1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df\"" Oct 2 19:09:24.091248 systemd[1]: Started cri-containerd-1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df.scope. Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.113000 audit: BPF prog-id=84 op=LOAD Oct 2 19:09:24.113000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000281100 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit: BPF prog-id=85 op=LOAD Oct 2 19:09:24.114000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000281148 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537 Oct 2 19:09:24.114000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:09:24.114000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:24.114000 audit: BPF prog-id=86 op=LOAD Oct 2 19:09:24.114000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002811d8 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537 Oct 2 19:09:24.146802 env[1631]: time="2023-10-02T19:09:24.146750162Z" level=info msg="StartContainer for \"1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df\" returns successfully" Oct 2 19:09:24.207947 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 19:09:24.208123 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 19:09:24.208173 kernel: IPVS: ipvs loaded. Oct 2 19:09:24.220056 kernel: IPVS: [rr] scheduler registered. Oct 2 19:09:24.238299 kernel: IPVS: [wrr] scheduler registered. Oct 2 19:09:24.247063 kernel: IPVS: [sh] scheduler registered. Oct 2 19:09:24.294000 audit[2403]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.294000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeef69bb70 a2=0 a3=7ffeef69bb5c items=0 ppid=2357 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:09:24.298000 audit[2404]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.298000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbbdb3170 a2=0 a3=7ffdbbdb315c items=0 ppid=2357 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:09:24.300000 audit[2405]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.300000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe50fa6d20 a2=0 a3=7ffe50fa6d0c items=0 ppid=2357 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:09:24.301000 audit[2406]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.301000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe335228d0 a2=0 a3=7ffe335228bc items=0 ppid=2357 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:09:24.302000 audit[2407]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.302000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe010535a0 a2=0 a3=7ffe0105358c items=0 ppid=2357 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:09:24.303000 audit[2408]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.303000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd78947100 a2=0 a3=7ffd789470ec items=0 ppid=2357 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:09:24.345748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount33466474.mount: Deactivated successfully. Oct 2 19:09:24.395000 audit[2409]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.395000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce4278be0 a2=0 a3=7ffce4278bcc items=0 ppid=2357 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:09:24.399000 audit[2411]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.399000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff23aaf2d0 a2=0 a3=7fff23aaf2bc items=0 ppid=2357 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:09:24.404000 audit[2414]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.404000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0ec9e9f0 a2=0 a3=7ffe0ec9e9dc items=0 ppid=2357 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:09:24.405000 audit[2415]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.405000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90d6a860 a2=0 a3=7ffd90d6a84c items=0 ppid=2357 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:09:24.408000 audit[2417]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.408000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcdc87eb80 a2=0 a3=7ffcdc87eb6c items=0 ppid=2357 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:09:24.411000 audit[2418]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.411000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb25ba260 a2=0 a3=7fffb25ba24c items=0 ppid=2357 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:09:24.416000 audit[2420]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.416000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdb33ad50 a2=0 a3=7fffdb33ad3c items=0 ppid=2357 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:09:24.424000 audit[2423]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.424000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd427cef50 a2=0 a3=7ffd427cef3c items=0 ppid=2357 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:09:24.425000 audit[2424]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.425000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2bcf1a70 a2=0 a3=7ffc2bcf1a5c items=0 ppid=2357 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:09:24.430000 audit[2426]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.430000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb5292d00 a2=0 a3=7ffdb5292cec items=0 ppid=2357 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:09:24.431000 audit[2427]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.431000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2bd748c0 a2=0 a3=7ffc2bd748ac items=0 ppid=2357 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:09:24.435000 audit[2429]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.435000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe19aa12c0 a2=0 a3=7ffe19aa12ac items=0 ppid=2357 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:24.443000 audit[2432]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.443000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc2d6d1e0 a2=0 a3=7ffdc2d6d1cc items=0 ppid=2357 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:24.447000 audit[2435]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.447000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec52ae920 a2=0 a3=7ffec52ae90c items=0 ppid=2357 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:09:24.449000 audit[2436]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.449000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdfc3b5e00 a2=0 a3=7ffdfc3b5dec items=0 ppid=2357 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:09:24.453000 audit[2438]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.453000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd3856b620 a2=0 a3=7ffd3856b60c items=0 ppid=2357 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:24.458000 audit[2441]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:24.458000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff41fa9fe0 a2=0 a3=7fff41fa9fcc items=0 ppid=2357 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:24.465000 audit[2445]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:24.465000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe1de6f510 a2=0 a3=7ffe1de6f4fc items=0 ppid=2357 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:24.481000 audit[2445]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:24.481000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe1de6f510 a2=0 a3=7ffe1de6f4fc items=0 ppid=2357 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:24.501000 audit[2451]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.501000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5518a9f0 a2=0 a3=7ffe5518a9dc items=0 ppid=2357 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:09:24.504000 audit[2453]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.504000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb4ed4d60 a2=0 a3=7ffcb4ed4d4c items=0 ppid=2357 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:09:24.509000 audit[2456]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.509000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd04a653a0 a2=0 a3=7ffd04a6538c items=0 ppid=2357 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:09:24.511000 audit[2457]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.511000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb353e0a0 a2=0 a3=7ffdb353e08c items=0 ppid=2357 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:09:24.514000 audit[2459]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.514000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffefe6380 a2=0 a3=7ffffefe636c items=0 ppid=2357 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:09:24.515000 audit[2460]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.515000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb946e820 a2=0 a3=7ffdb946e80c items=0 ppid=2357 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:09:24.519000 audit[2462]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.519000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc9b341b80 a2=0 a3=7ffc9b341b6c items=0 ppid=2357 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:09:24.523000 audit[2465]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.523000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd92d22350 a2=0 a3=7ffd92d2233c items=0 ppid=2357 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:09:24.525000 audit[2466]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.525000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce9285520 a2=0 a3=7ffce928550c items=0 ppid=2357 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:09:24.528000 audit[2468]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.528000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd87fb4a00 a2=0 a3=7ffd87fb49ec items=0 ppid=2357 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:09:24.530000 audit[2469]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.530000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1a4f1080 a2=0 a3=7ffe1a4f106c items=0 ppid=2357 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:09:24.532000 audit[2471]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.532000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc6d90db0 a2=0 a3=7ffdc6d90d9c items=0 ppid=2357 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:24.537000 audit[2474]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.537000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff43f878f0 a2=0 a3=7fff43f878dc items=0 ppid=2357 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:09:24.541000 audit[2477]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.541000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc85f4f430 a2=0 a3=7ffc85f4f41c items=0 ppid=2357 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:09:24.543000 audit[2478]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.543000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe97706bb0 a2=0 a3=7ffe97706b9c items=0 ppid=2357 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:09:24.546000 audit[2480]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.546000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcabab1110 a2=0 a3=7ffcabab10fc items=0 ppid=2357 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:24.551000 audit[2483]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:24.551000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe1d48d930 a2=0 a3=7ffe1d48d91c items=0 ppid=2357 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:24.558000 audit[2487]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:09:24.558000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffadbf2200 a2=0 a3=7fffadbf21ec items=0 ppid=2357 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.558000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:24.559000 audit[2487]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:09:24.559000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=1860 a0=3 a1=7fffadbf2200 a2=0 a3=7fffadbf21ec items=0 ppid=2357 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:24.559000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:24.807312 kubelet[2095]: E1002 19:09:24.807271 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:24.910709 kubelet[2095]: E1002 19:09:24.910677 2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:09:25.095006 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1559952260.mount: Deactivated successfully. Oct 2 19:09:25.807452 kubelet[2095]: E1002 19:09:25.807396 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:26.808395 kubelet[2095]: E1002 19:09:26.808329 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:27.809995 kubelet[2095]: E1002 19:09:27.809923 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:28.810141 kubelet[2095]: E1002 19:09:28.810067 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:28.900595 env[1631]: time="2023-10-02T19:09:28.900539682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:28.903542 env[1631]: time="2023-10-02T19:09:28.903500254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:28.905769 env[1631]: time="2023-10-02T19:09:28.905735406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:28.907795 env[1631]: time="2023-10-02T19:09:28.907761410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:28.908586 env[1631]: time="2023-10-02T19:09:28.908551403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:09:28.912178 env[1631]: time="2023-10-02T19:09:28.912143323Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:09:28.926740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount146056397.mount: Deactivated successfully. Oct 2 19:09:28.933877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2475138748.mount: Deactivated successfully. Oct 2 19:09:28.942511 env[1631]: time="2023-10-02T19:09:28.942461114Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8\"" Oct 2 19:09:28.943233 env[1631]: time="2023-10-02T19:09:28.943198177Z" level=info msg="StartContainer for \"efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8\"" Oct 2 19:09:28.969156 systemd[1]: Started cri-containerd-efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8.scope. Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.994731 kernel: kauditd_printk_skb: 327 callbacks suppressed Oct 2 19:09:28.994894 kernel: audit: type=1400 audit(1696273768.992:736): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:29.007248 kernel: audit: type=1300 audit(1696273768.992:736): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:29.007393 kernel: audit: type=1327 audit(1696273768.992:736): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361 Oct 2 19:09:28.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361 Oct 2 19:09:29.018133 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.028683 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.028897 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.040592 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.040713 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.046150 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.052694 kernel: audit: type=1400 audit(1696273768.992:737): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.992000 audit: BPF prog-id=87 op=LOAD Oct 2 19:09:28.992000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000309070 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:28.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:28.998000 audit: BPF prog-id=88 op=LOAD Oct 2 19:09:28.998000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003090b8 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:28.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361 Oct 2 19:09:29.012000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:09:29.012000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:29.012000 audit: BPF prog-id=89 op=LOAD Oct 2 19:09:29.012000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000309148 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:29.055556 env[1631]: time="2023-10-02T19:09:29.055513017Z" level=info msg="StartContainer for \"efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8\" returns successfully" Oct 2 19:09:29.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361 Oct 2 19:09:29.810377 kubelet[2095]: E1002 19:09:29.810338 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:29.858017 env[1631]: time="2023-10-02T19:09:29.857949801Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:09:29.861360 systemd[1]: cri-containerd-efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8.scope: Deactivated successfully. Oct 2 19:09:29.864000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:09:29.924566 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8-rootfs.mount: Deactivated successfully. Oct 2 19:09:30.473525 env[1631]: time="2023-10-02T19:09:30.473468245Z" level=info msg="shim disconnected" id=efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8 Oct 2 19:09:30.475590 env[1631]: time="2023-10-02T19:09:30.475131208Z" level=warning msg="cleaning up after shim disconnected" id=efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8 namespace=k8s.io Oct 2 19:09:30.475590 env[1631]: time="2023-10-02T19:09:30.475160882Z" level=info msg="cleaning up dead shim" Oct 2 19:09:30.489254 env[1631]: time="2023-10-02T19:09:30.489205586Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2546 runtime=io.containerd.runc.v2\n" Oct 2 19:09:30.811577 kubelet[2095]: E1002 19:09:30.811447 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:31.217062 env[1631]: time="2023-10-02T19:09:31.216913525Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:09:31.811660 kubelet[2095]: E1002 19:09:31.811605 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:32.157127 update_engine[1626]: I1002 19:09:32.157090 1626 update_attempter.cc:505] Updating boot flags... Oct 2 19:09:32.811905 kubelet[2095]: E1002 19:09:32.811756 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:33.309935 kubelet[2095]: I1002 19:09:33.309896 2095 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:33.317260 systemd[1]: Created slice kubepods-besteffort-pode1de0828_193f_4683_ba3e_878e95d625b9.slice. Oct 2 19:09:33.350969 kubelet[2095]: I1002 19:09:33.350931 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-etccalico\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.350969 kubelet[2095]: I1002 19:09:33.350988 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-kubelet-dir\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351018 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-socket-dir\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351058 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-registration-dir\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351087 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rh7mx\" (UniqueName: \"kubernetes.io/projected/e1de0828-193f-4683-ba3e-878e95d625b9-kube-api-access-rh7mx\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351118 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-varrun\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.623844 env[1631]: time="2023-10-02T19:09:33.623797503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:33.781120 env[1631]: time="2023-10-02T19:09:33.781052304Z" level=error msg="Failed to destroy network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:33.794811 env[1631]: time="2023-10-02T19:09:33.788865873Z" level=error msg="encountered an error cleaning up failed sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:33.794811 env[1631]: time="2023-10-02T19:09:33.788951320Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:33.794962 kubelet[2095]: E1002 19:09:33.793484 2095 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:33.794962 kubelet[2095]: E1002 19:09:33.793584 2095 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.794962 kubelet[2095]: E1002 19:09:33.793821 2095 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dvc2s" Oct 2 19:09:33.788357 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430-shm.mount: Deactivated successfully. Oct 2 19:09:33.795569 kubelet[2095]: E1002 19:09:33.793976 2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9 Oct 2 19:09:33.812187 kubelet[2095]: E1002 19:09:33.812076 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:34.227384 kubelet[2095]: I1002 19:09:34.226140 2095 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:34.227907 env[1631]: time="2023-10-02T19:09:34.227868897Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" Oct 2 19:09:34.299595 env[1631]: time="2023-10-02T19:09:34.299523892Z" level=error msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" failed" error="failed to destroy network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300166 2095 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300244 2095 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430} Oct 2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300314 2095 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1de0828-193f-4683-ba3e-878e95d625b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300412 2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1de0828-193f-4683-ba3e-878e95d625b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9 Oct 2 19:09:34.813162 kubelet[2095]: E1002 19:09:34.813100 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:35.813835 kubelet[2095]: E1002 19:09:35.813794 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:36.508383 kubelet[2095]: I1002 19:09:36.507102 2095 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:36.514733 systemd[1]: Created slice kubepods-besteffort-pod0200515e_beda_471c_bad0_c5545f30329b.slice. Oct 2 19:09:36.574178 kubelet[2095]: I1002 19:09:36.574143 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gjdfd\" (UniqueName: \"kubernetes.io/projected/0200515e-beda-471c-bad0-c5545f30329b-kube-api-access-gjdfd\") pod \"nginx-deployment-5bbcdd876f-2q846\" (UID: \"0200515e-beda-471c-bad0-c5545f30329b\") " pod="default/nginx-deployment-5bbcdd876f-2q846" Oct 2 19:09:36.815179 kubelet[2095]: E1002 19:09:36.814682 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:36.820542 env[1631]: time="2023-10-02T19:09:36.820500130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:0,}" Oct 2 19:09:37.084444 env[1631]: time="2023-10-02T19:09:37.084221180Z" level=error msg="Failed to destroy network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:37.088929 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8-shm.mount: Deactivated successfully. Oct 2 19:09:37.090270 env[1631]: time="2023-10-02T19:09:37.090204536Z" level=error msg="encountered an error cleaning up failed sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:37.090411 env[1631]: time="2023-10-02T19:09:37.090297919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:37.090558 kubelet[2095]: E1002 19:09:37.090534 2095 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:37.090642 kubelet[2095]: E1002 19:09:37.090599 2095 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-5bbcdd876f-2q846" Oct 2 19:09:37.090642 kubelet[2095]: E1002 19:09:37.090635 2095 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-5bbcdd876f-2q846" Oct 2 19:09:37.090742 kubelet[2095]: E1002 19:09:37.090705 2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-5bbcdd876f-2q846_default(0200515e-beda-471c-bad0-c5545f30329b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-5bbcdd876f-2q846_default(0200515e-beda-471c-bad0-c5545f30329b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-5bbcdd876f-2q846" podUID=0200515e-beda-471c-bad0-c5545f30329b Oct 2 19:09:37.232689 kubelet[2095]: I1002 19:09:37.232660 2095 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:09:37.233436 env[1631]: time="2023-10-02T19:09:37.233393003Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" Oct 2 19:09:37.315435 env[1631]: time="2023-10-02T19:09:37.315362771Z" level=error msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" failed" error="failed to destroy network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:37.315646 kubelet[2095]: E1002 19:09:37.315624 2095 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:09:37.315725 kubelet[2095]: E1002 19:09:37.315676 2095 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8} Oct 2 19:09:37.315774 kubelet[2095]: E1002 19:09:37.315730 2095 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0200515e-beda-471c-bad0-c5545f30329b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:37.315774 kubelet[2095]: E1002 19:09:37.315771 2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0200515e-beda-471c-bad0-c5545f30329b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-5bbcdd876f-2q846" podUID=0200515e-beda-471c-bad0-c5545f30329b Oct 2 19:09:37.493304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2646541039.mount: Deactivated successfully. Oct 2 19:09:37.563496 env[1631]: time="2023-10-02T19:09:37.563446551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:37.566457 env[1631]: time="2023-10-02T19:09:37.566412800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:37.569767 env[1631]: time="2023-10-02T19:09:37.569728884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:37.571475 env[1631]: time="2023-10-02T19:09:37.571442586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:37.571838 env[1631]: time="2023-10-02T19:09:37.571808452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:09:37.574338 env[1631]: time="2023-10-02T19:09:37.574305107Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:09:37.596444 env[1631]: time="2023-10-02T19:09:37.596390754Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d\"" Oct 2 19:09:37.597539 env[1631]: time="2023-10-02T19:09:37.597500024Z" level=info msg="StartContainer for \"2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d\"" Oct 2 19:09:37.635179 systemd[1]: Started cri-containerd-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d.scope. Oct 2 19:09:37.667502 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:09:37.667657 kernel: audit: type=1400 audit(1696273777.660:743): avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.674576 kernel: audit: type=1300 audit(1696273777.660:743): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.660000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165 Oct 2 19:09:37.685302 kernel: audit: type=1327 audit(1696273777.660:743): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165 Oct 2 19:09:37.685429 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.685467 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.696481 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.696590 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.703639 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.708684 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.714367 kernel: audit: type=1400 audit(1696273777.660:744): avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.660000 audit: BPF prog-id=90 op=LOAD Oct 2 19:09:37.660000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002a85b0 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit: BPF prog-id=91 op=LOAD Oct 2 19:09:37.666000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002a85f8 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165 Oct 2 19:09:37.666000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:09:37.666000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { perfmon } for pid=2947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit[2947]: AVC avc: denied { bpf } for pid=2947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.666000 audit: BPF prog-id=92 op=LOAD Oct 2 19:09:37.666000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002a8688 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165 Oct 2 19:09:37.720809 env[1631]: time="2023-10-02T19:09:37.720764690Z" level=info msg="StartContainer for \"2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d\" returns successfully" Oct 2 19:09:37.815648 kubelet[2095]: E1002 19:09:37.815513 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:37.822073 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:09:37.822222 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Oct 2 19:09:38.304074 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.wWBYdH.mount: Deactivated successfully. Oct 2 19:09:38.816604 kubelet[2095]: E1002 19:09:38.816562 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:39.218000 audit[3068]: AVC avc: denied { write } for pid=3068 comm="tee" name="fd" dev="proc" ino=20345 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.221000 audit[3065]: AVC avc: denied { write } for pid=3065 comm="tee" name="fd" dev="proc" ino=19418 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.221000 audit[3065]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff19d3c988 a2=241 a3=1b6 items=1 ppid=3037 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.221000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:09:39.221000 audit: PATH item=0 name="/dev/fd/63" inode=19411 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.233000 audit[3075]: AVC avc: denied { write } for pid=3075 comm="tee" name="fd" dev="proc" ino=20353 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.218000 audit[3068]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcafa04979 a2=241 a3=1b6 items=1 ppid=3036 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.218000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:09:39.218000 audit: PATH item=0 name="/dev/fd/63" inode=20334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.218000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.236000 audit[3073]: AVC avc: denied { write } for pid=3073 comm="tee" name="fd" dev="proc" ino=19424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.233000 audit[3075]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb8be498a a2=241 a3=1b6 items=1 ppid=3040 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.233000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:09:39.233000 audit: PATH item=0 name="/dev/fd/63" inode=20340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.233000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.236000 audit[3073]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2dbe8989 a2=241 a3=1b6 items=1 ppid=3048 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.236000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:09:39.236000 audit: PATH item=0 name="/dev/fd/63" inode=20337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.236000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.247000 audit[3085]: AVC avc: denied { write } for pid=3085 comm="tee" name="fd" dev="proc" ino=19431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.247000 audit[3085]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe535fd988 a2=241 a3=1b6 items=1 ppid=3043 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.247000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:09:39.247000 audit: PATH item=0 name="/dev/fd/63" inode=20350 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.247000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.254000 audit[3078]: AVC avc: denied { write } for pid=3078 comm="tee" name="fd" dev="proc" ino=19438 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.254000 audit[3078]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6328d978 a2=241 a3=1b6 items=1 ppid=3050 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.254000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:09:39.254000 audit: PATH item=0 name="/dev/fd/63" inode=19419 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.254000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.258000 audit[3087]: AVC avc: denied { write } for pid=3087 comm="tee" name="fd" dev="proc" ino=19445 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:39.258000 audit[3087]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef2cb9988 a2=241 a3=1b6 items=1 ppid=3042 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.258000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:09:39.258000 audit: PATH item=0 name="/dev/fd/63" inode=19421 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:39.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:39.282523 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.qv9Kxe.mount: Deactivated successfully. Oct 2 19:09:39.785100 kernel: Initializing XFRM netlink socket Oct 2 19:09:39.788725 kubelet[2095]: E1002 19:09:39.788475 2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:39.817225 kubelet[2095]: E1002 19:09:39.817167 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit: BPF prog-id=93 op=LOAD Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff090fbd00 a2=70 a3=7f378d51b000 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.965000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit: BPF prog-id=94 op=LOAD Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff090fbd00 a2=70 a3=6e items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.965000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff090fbcb0 a2=70 a3=7fff090fbd00 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit: BPF prog-id=95 op=LOAD Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff090fbc90 a2=70 a3=7fff090fbd00 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.965000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff090fbd70 a2=70 a3=0 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff090fbd60 a2=70 a3=0 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.965000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff090fbda0 a2=70 a3=0 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.966000 audit: BPF prog-id=96 op=LOAD Oct 2 19:09:39.966000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff090fbcc0 a2=70 a3=ffffffff items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.966000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:39.964420 (udev-worker)[2979]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:39.965652 (udev-worker)[3220]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:39.975000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.975000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcffa80170 a2=70 a3=fffffff81000 items=0 ppid=3039 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:39.975000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.975000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcffa80040 a2=70 a3=3 items=0 ppid=3039 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:39.983000 audit: BPF prog-id=96 op=UNLOAD Oct 2 19:09:40.101000 audit[3246]: NETFILTER_CFG table=raw:79 family=2 entries=19 op=nft_register_chain pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:40.101000 audit[3246]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd44b8ac10 a2=0 a3=7ffd44b8abfc items=0 ppid=3039 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.101000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:40.103000 audit[3247]: NETFILTER_CFG table=mangle:80 family=2 entries=19 op=nft_register_chain pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:40.103000 audit[3247]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc6bba8710 a2=0 a3=5587cbeb9000 items=0 ppid=3039 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:40.110000 audit[3248]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:40.110000 audit[3248]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd17d0a3d0 a2=0 a3=55bc0295e000 items=0 ppid=3039 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:40.114000 audit[3249]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:40.114000 audit[3249]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffdfe802320 a2=0 a3=56324ffa7000 items=0 ppid=3039 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:40.271903 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.jgZNWM.mount: Deactivated successfully. Oct 2 19:09:40.804154 systemd-networkd[1452]: vxlan.calico: Link UP Oct 2 19:09:40.824572 kubelet[2095]: E1002 19:09:40.817495 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:40.804165 systemd-networkd[1452]: vxlan.calico: Gained carrier Oct 2 19:09:41.818379 kubelet[2095]: E1002 19:09:41.818339 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:42.604276 systemd-networkd[1452]: vxlan.calico: Gained IPv6LL Oct 2 19:09:42.819472 kubelet[2095]: E1002 19:09:42.819427 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:43.819893 kubelet[2095]: E1002 19:09:43.819856 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:44.820964 kubelet[2095]: E1002 19:09:44.820911 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:45.821847 kubelet[2095]: E1002 19:09:45.821797 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:46.822358 kubelet[2095]: E1002 19:09:46.822304 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:47.823153 kubelet[2095]: E1002 19:09:47.823100 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:48.824052 kubelet[2095]: E1002 19:09:48.823999 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:49.471523 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.pW4Ujx.mount: Deactivated successfully. Oct 2 19:09:49.825313 kubelet[2095]: E1002 19:09:49.825081 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:50.129795 env[1631]: time="2023-10-02T19:09:50.129504579Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.211 [INFO][3333] k8s.go 576: Cleaning up netns ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.212 [INFO][3333] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="/var/run/netns/cni-bccf905b-9780-18b6-6f8d-397ff7412ad3" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="/var/run/netns/cni-bccf905b-9780-18b6-6f8d-397ff7412ad3" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="/var/run/netns/cni-bccf905b-9780-18b6-6f8d-397ff7412ad3" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] k8s.go 583: Releasing IP address(es) ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] utils.go 196: Calico CNI releasing IP address ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.243 [INFO][3339] ipam_plugin.go 416: Releasing address using handleID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.255014 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:50.255014 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.250 [WARNING][3339] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.250 [INFO][3339] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.255014 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.253 [INFO][3333] k8s.go 589: Teardown processing complete. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:50.256991 systemd[1]: run-netns-cni\x2dbccf905b\x2d9780\x2d18b6\x2d6f8d\x2d397ff7412ad3.mount: Deactivated successfully. Oct 2 19:09:50.258112 env[1631]: time="2023-10-02T19:09:50.257917167Z" level=info msg="TearDown network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" successfully" Oct 2 19:09:50.258112 env[1631]: time="2023-10-02T19:09:50.257959945Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" returns successfully" Oct 2 19:09:50.258890 env[1631]: time="2023-10-02T19:09:50.258858229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:1,}" Oct 2 19:09:50.433055 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:50.433287 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic815af077cb: link becomes ready Oct 2 19:09:50.445041 systemd-networkd[1452]: calic815af077cb: Link UP Oct 2 19:09:50.445052 systemd-networkd[1452]: calic815af077cb: Gained carrier Oct 2 19:09:50.447219 (udev-worker)[3363]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.334 [INFO][3346] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.246-k8s-csi--node--driver--dvc2s-eth0 csi-node-driver- calico-system e1de0828-193f-4683-ba3e-878e95d625b9 940 0 2023-10-02 19:09:33 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.246 csi-node-driver-dvc2s eth0 default [] [] [kns.calico-system ksa.calico-system.default] calic815af077cb [] []}} ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.335 [INFO][3346] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.371 [INFO][3357] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" HandleID="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.389 [INFO][3357] ipam_plugin.go 269: Auto assigning IP ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" HandleID="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db10), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.31.246", "pod":"csi-node-driver-dvc2s", "timestamp":"2023-10-02 19:09:50.371308045 +0000 UTC"}, Hostname:"172.31.31.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:50.466627 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:50.466627 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.389 [INFO][3357] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.246' Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.391 [INFO][3357] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.398 [INFO][3357] ipam.go 372: Looking up existing affinities for host host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.404 [INFO][3357] ipam.go 489: Trying affinity for 192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.407 [INFO][3357] ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.410 [INFO][3357] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.411 [INFO][3357] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.414 [INFO][3357] ipam.go 1682: Creating new handle: k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.420 [INFO][3357] ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.425 [INFO][3357] ipam.go 1216: Successfully claimed IPs: [192.168.127.65/26] block=192.168.127.64/26 handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.426 [INFO][3357] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.65/26] handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246" Oct 2 19:09:50.466627 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.426 [INFO][3357] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.127.65/26] IPv6=[] ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" HandleID="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.429 [INFO][3346] k8s.go 383: Populated endpoint ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.430 [INFO][3346] k8s.go 384: Calico CNI using IPs: [192.168.127.65/32] ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.430 [INFO][3346] dataplane_linux.go 68: Setting the host side veth name to calic815af077cb ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.435 [INFO][3346] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.448 [INFO][3346] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"a6:34:5b:a4:fa:80", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.457 [INFO][3346] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:50.500974 env[1631]: time="2023-10-02T19:09:50.500895175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:50.501307 env[1631]: time="2023-10-02T19:09:50.501274892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:50.501456 env[1631]: time="2023-10-02T19:09:50.501424868Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:50.501923 env[1631]: time="2023-10-02T19:09:50.501870193Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a pid=3387 runtime=io.containerd.runc.v2 Oct 2 19:09:50.519000 audit[3388]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:50.522635 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:09:50.522728 kernel: audit: type=1325 audit(1696273790.519:774): table=filter:83 family=2 entries=36 op=nft_register_chain pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:50.519000 audit[3388]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe91d35c90 a2=0 a3=7ffe91d35c7c items=0 ppid=3039 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.543702 kernel: audit: type=1300 audit(1696273790.519:774): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe91d35c90 a2=0 a3=7ffe91d35c7c items=0 ppid=3039 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.542585 systemd[1]: Started cri-containerd-3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a.scope. Oct 2 19:09:50.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:50.551210 kernel: audit: type=1327 audit(1696273790.519:774): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565699 kernel: audit: type=1400 audit(1696273790.555:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565783 kernel: audit: type=1400 audit(1696273790.555:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.576114 kernel: audit: type=1400 audit(1696273790.555:777): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.576218 kernel: audit: type=1400 audit(1696273790.555:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.580884 kernel: audit: type=1400 audit(1696273790.555:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.580984 kernel: audit: type=1400 audit(1696273790.555:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.589774 kernel: audit: type=1400 audit(1696273790.555:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.560000 audit: BPF prog-id=97 op=LOAD Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit: BPF prog-id=98 op=LOAD Oct 2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218340 items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit: BPF prog-id=99 op=LOAD Oct 2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218388 items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738 Oct 2 19:09:50.565000 audit: BPF prog-id=99 op=UNLOAD Oct 2 19:09:50.565000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:50.565000 audit: BPF prog-id=100 op=LOAD Oct 2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218798 items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738 Oct 2 19:09:50.604812 env[1631]: time="2023-10-02T19:09:50.604759195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:1,} returns sandbox id \"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a\"" Oct 2 19:09:50.606391 env[1631]: time="2023-10-02T19:09:50.606358592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:50.779689 env[1631]: time="2023-10-02T19:09:50.779478856Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:50.780724 env[1631]: time="2023-10-02T19:09:50.780664733Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:50.781602 kubelet[2095]: E1002 19:09:50.781077 2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:50.781602 kubelet[2095]: E1002 19:09:50.781127 2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:50.781805 kubelet[2095]: E1002 19:09:50.781245 2095 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:50.783284 env[1631]: time="2023-10-02T19:09:50.783251536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:50.825920 kubelet[2095]: E1002 19:09:50.825878 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:50.955416 env[1631]: time="2023-10-02T19:09:50.955354185Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:50.956587 env[1631]: time="2023-10-02T19:09:50.956536938Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:50.956815 kubelet[2095]: E1002 19:09:50.956777 2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:50.956906 kubelet[2095]: E1002 19:09:50.956822 2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:50.956968 kubelet[2095]: E1002 19:09:50.956930 2095 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:50.957116 kubelet[2095]: E1002 19:09:50.957003 2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9 Oct 2 19:09:51.272056 kubelet[2095]: E1002 19:09:51.272016 2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9 Oct 2 19:09:51.827011 kubelet[2095]: E1002 19:09:51.826959 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:52.129693 env[1631]: time="2023-10-02T19:09:52.129266906Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.195 [INFO][3438] k8s.go 576: Cleaning up netns ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.195 [INFO][3438] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="/var/run/netns/cni-2bbdeaf0-552f-b07a-7a09-bf9ab97bb4be" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.196 [INFO][3438] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="/var/run/netns/cni-2bbdeaf0-552f-b07a-7a09-bf9ab97bb4be" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.196 [INFO][3438] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="/var/run/netns/cni-2bbdeaf0-552f-b07a-7a09-bf9ab97bb4be" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.197 [INFO][3438] k8s.go 583: Releasing IP address(es) ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.197 [INFO][3438] utils.go 196: Calico CNI releasing IP address ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.225 [INFO][3444] ipam_plugin.go 416: Releasing address using handleID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.245625 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:52.245625 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.240 [WARNING][3444] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.240 [INFO][3444] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.245625 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.244 [INFO][3438] k8s.go 589: Teardown processing complete. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:09:52.247741 systemd[1]: run-netns-cni\x2d2bbdeaf0\x2d552f\x2db07a\x2d7a09\x2dbf9ab97bb4be.mount: Deactivated successfully. Oct 2 19:09:52.248923 env[1631]: time="2023-10-02T19:09:52.248805904Z" level=info msg="TearDown network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" successfully" Oct 2 19:09:52.248923 env[1631]: time="2023-10-02T19:09:52.248851433Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" returns successfully" Oct 2 19:09:52.249599 env[1631]: time="2023-10-02T19:09:52.249568284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:1,}" Oct 2 19:09:52.269546 systemd-networkd[1452]: calic815af077cb: Gained IPv6LL Oct 2 19:09:52.283142 kubelet[2095]: E1002 19:09:52.283090 2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9 Oct 2 19:09:52.481542 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:52.481687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali75013a7843e: link becomes ready Oct 2 19:09:52.489058 systemd-networkd[1452]: cali75013a7843e: Link UP Oct 2 19:09:52.489069 systemd-networkd[1452]: cali75013a7843e: Gained carrier Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.363 [INFO][3450] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0 nginx-deployment-5bbcdd876f- default 0200515e-beda-471c-bad0-c5545f30329b 964 0 2023-10-02 19:09:36 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:5bbcdd876f projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.246 nginx-deployment-5bbcdd876f-2q846 eth0 default [] [] [kns.default ksa.default.default] cali75013a7843e [] []}} ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.363 [INFO][3450] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.396 [INFO][3462] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" HandleID="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.421 [INFO][3462] ipam_plugin.go 269: Auto assigning IP ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" HandleID="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dde0), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.246", "pod":"nginx-deployment-5bbcdd876f-2q846", "timestamp":"2023-10-02 19:09:52.396632643 +0000 UTC"}, Hostname:"172.31.31.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:52.501783 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:52.501783 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.422 [INFO][3462] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.246' Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.426 [INFO][3462] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.433 [INFO][3462] ipam.go 372: Looking up existing affinities for host host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.439 [INFO][3462] ipam.go 489: Trying affinity for 192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.441 [INFO][3462] ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.443 [INFO][3462] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.444 [INFO][3462] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.446 [INFO][3462] ipam.go 1682: Creating new handle: k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128 Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.451 [INFO][3462] ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.475 [INFO][3462] ipam.go 1216: Successfully claimed IPs: [192.168.127.66/26] block=192.168.127.64/26 handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.475 [INFO][3462] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.66/26] handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246" Oct 2 19:09:52.501783 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.475 [INFO][3462] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.127.66/26] IPv6=[] ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" HandleID="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.477 [INFO][3450] k8s.go 383: Populated endpoint ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.477 [INFO][3450] k8s.go 384: Calico CNI using IPs: [192.168.127.66/32] ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.477 [INFO][3450] dataplane_linux.go 68: Setting the host side veth name to cali75013a7843e ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.481 [INFO][3450] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.489 [INFO][3450] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"12:2f:3a:eb:43:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.499 [INFO][3450] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:09:52.526000 audit[3489]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=3489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:52.526000 audit[3489]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffc6cae5c10 a2=0 a3=7ffc6cae5bfc items=0 ppid=3039 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:52.529952 env[1631]: time="2023-10-02T19:09:52.529868601Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:52.529952 env[1631]: time="2023-10-02T19:09:52.529922190Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:52.530275 env[1631]: time="2023-10-02T19:09:52.529937950Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:52.530741 env[1631]: time="2023-10-02T19:09:52.530671959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128 pid=3493 runtime=io.containerd.runc.v2 Oct 2 19:09:52.564518 systemd[1]: Started cri-containerd-e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128.scope. Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.592000 audit: BPF prog-id=101 op=LOAD Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit: BPF prog-id=102 op=LOAD Oct 2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c000195c70 items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit: BPF prog-id=103 op=LOAD Oct 2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c000195cb8 items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131 Oct 2 19:09:52.595000 audit: BPF prog-id=103 op=UNLOAD Oct 2 19:09:52.595000 audit: BPF prog-id=102 op=UNLOAD Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:52.595000 audit: BPF prog-id=104 op=LOAD Oct 2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c0004080c8 items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131 Oct 2 19:09:52.645313 env[1631]: time="2023-10-02T19:09:52.645269661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:1,} returns sandbox id \"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128\"" Oct 2 19:09:52.647401 env[1631]: time="2023-10-02T19:09:52.647358776Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:09:52.827578 kubelet[2095]: E1002 19:09:52.827416 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:52.853000 audit[3552]: NETFILTER_CFG table=filter:85 family=2 entries=7 op=nft_register_rule pid=3552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:52.853000 audit[3552]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe3b71e970 a2=0 a3=7ffe3b71e95c items=0 ppid=2357 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:52.858000 audit[3552]: NETFILTER_CFG table=nat:86 family=2 entries=78 op=nft_register_rule pid=3552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:52.858000 audit[3552]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe3b71e970 a2=0 a3=7ffe3b71e95c items=0 ppid=2357 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:52.928000 audit[3580]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:52.928000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdb14c8790 a2=0 a3=7ffdb14c877c items=0 ppid=2357 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:52.929000 audit[3580]: NETFILTER_CFG table=nat:88 family=2 entries=78 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:52.929000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdb14c8790 a2=0 a3=7ffdb14c877c items=0 ppid=2357 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:52.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.000707 kubelet[2095]: I1002 19:09:53.000668 2095 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:53.006121 systemd[1]: Created slice kubepods-besteffort-podc993a8e3_0888_4b16_ac95_795d1c5ddcf1.slice. Oct 2 19:09:53.180892 kubelet[2095]: I1002 19:09:53.180849 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c993a8e3-0888-4b16-ac95-795d1c5ddcf1-calico-apiserver-certs\") pod \"calico-apiserver-75b9cbccd6-qsd92\" (UID: \"c993a8e3-0888-4b16-ac95-795d1c5ddcf1\") " pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92" Oct 2 19:09:53.181077 kubelet[2095]: I1002 19:09:53.180914 2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mb7z6\" (UniqueName: \"kubernetes.io/projected/c993a8e3-0888-4b16-ac95-795d1c5ddcf1-kube-api-access-mb7z6\") pod \"calico-apiserver-75b9cbccd6-qsd92\" (UID: \"c993a8e3-0888-4b16-ac95-795d1c5ddcf1\") " pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92" Oct 2 19:09:53.310997 env[1631]: time="2023-10-02T19:09:53.310949274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b9cbccd6-qsd92,Uid:c993a8e3-0888-4b16-ac95-795d1c5ddcf1,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:09:53.548682 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:53.549215 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibce2ae800fa: link becomes ready Oct 2 19:09:53.561019 systemd-networkd[1452]: calibce2ae800fa: Link UP Oct 2 19:09:53.561043 systemd-networkd[1452]: calibce2ae800fa: Gained carrier Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.415 [INFO][3584] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0 calico-apiserver-75b9cbccd6- calico-apiserver c993a8e3-0888-4b16-ac95-795d1c5ddcf1 1014 0 2023-10-02 19:09:52 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75b9cbccd6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.31.246 calico-apiserver-75b9cbccd6-qsd92 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibce2ae800fa [] []}} ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.415 [INFO][3584] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.463 [INFO][3595] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" HandleID="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Workload="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.478 [INFO][3595] ipam_plugin.go 269: Auto assigning IP ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" HandleID="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Workload="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010d110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.31.246", "pod":"calico-apiserver-75b9cbccd6-qsd92", "timestamp":"2023-10-02 19:09:53.463532954 +0000 UTC"}, Hostname:"172.31.31.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:53.595839 env[1631]: time="2023-10-02T19:09:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:53.595839 env[1631]: time="2023-10-02T19:09:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.478 [INFO][3595] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.246' Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.485 [INFO][3595] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.494 [INFO][3595] ipam.go 372: Looking up existing affinities for host host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.502 [INFO][3595] ipam.go 489: Trying affinity for 192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.505 [INFO][3595] ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.507 [INFO][3595] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.507 [INFO][3595] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.510 [INFO][3595] ipam.go 1682: Creating new handle: k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.515 [INFO][3595] ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.536 [INFO][3595] ipam.go 1216: Successfully claimed IPs: [192.168.127.67/26] block=192.168.127.64/26 handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.536 [INFO][3595] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.67/26] handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246" Oct 2 19:09:53.595839 env[1631]: time="2023-10-02T19:09:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.537 [INFO][3595] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.127.67/26] IPv6=[] ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" HandleID="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Workload="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.540 [INFO][3584] k8s.go 383: Populated endpoint ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0", GenerateName:"calico-apiserver-75b9cbccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"c993a8e3-0888-4b16-ac95-795d1c5ddcf1", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 52, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b9cbccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"", Pod:"calico-apiserver-75b9cbccd6-qsd92", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibce2ae800fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.540 [INFO][3584] k8s.go 384: Calico CNI using IPs: [192.168.127.67/32] ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.541 [INFO][3584] dataplane_linux.go 68: Setting the host side veth name to calibce2ae800fa ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.553 [INFO][3584] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.562 [INFO][3584] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0", GenerateName:"calico-apiserver-75b9cbccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"c993a8e3-0888-4b16-ac95-795d1c5ddcf1", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 52, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b9cbccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd", Pod:"calico-apiserver-75b9cbccd6-qsd92", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibce2ae800fa", MAC:"72:ca:98:42:5a:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.572 [INFO][3584] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" Oct 2 19:09:53.620664 env[1631]: time="2023-10-02T19:09:53.620570690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:53.620899 env[1631]: time="2023-10-02T19:09:53.620869470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:53.621316 env[1631]: time="2023-10-02T19:09:53.621010913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:53.621817 env[1631]: time="2023-10-02T19:09:53.621781250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd pid=3630 runtime=io.containerd.runc.v2 Oct 2 19:09:53.628000 audit[3641]: NETFILTER_CFG table=filter:89 family=2 entries=51 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:53.628000 audit[3641]: SYSCALL arch=c000003e syscall=46 success=yes exit=26916 a0=3 a1=7ffe3b3101e0 a2=0 a3=7ffe3b3101cc items=0 ppid=3039 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.628000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:53.646698 systemd[1]: Started cri-containerd-c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd.scope. Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.666000 audit: BPF prog-id=105 op=LOAD Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.668000 audit: BPF prog-id=106 op=LOAD Oct 2 19:09:53.668000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024390 items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.669000 audit: BPF prog-id=107 op=LOAD Oct 2 19:09:53.669000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243d8 items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465 Oct 2 19:09:53.670000 audit: BPF prog-id=107 op=UNLOAD Oct 2 19:09:53.670000 audit: BPF prog-id=106 op=UNLOAD Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:53.671000 audit: BPF prog-id=108 op=LOAD Oct 2 19:09:53.671000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247e8 items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465 Oct 2 19:09:53.705725 env[1631]: time="2023-10-02T19:09:53.705681666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b9cbccd6-qsd92,Uid:c993a8e3-0888-4b16-ac95-795d1c5ddcf1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd\"" Oct 2 19:09:53.827816 kubelet[2095]: E1002 19:09:53.827628 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:53.939088 systemd-networkd[1452]: cali75013a7843e: Gained IPv6LL Oct 2 19:09:54.765683 systemd-networkd[1452]: calibce2ae800fa: Gained IPv6LL Oct 2 19:09:54.828800 kubelet[2095]: E1002 19:09:54.828704 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:55.331000 audit[3695]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:55.331000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd74ed9ab0 a2=0 a3=7ffd74ed9a9c items=0 ppid=2357 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:55.334000 audit[3695]: NETFILTER_CFG table=nat:91 family=2 entries=78 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:55.334000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd74ed9ab0 a2=0 a3=7ffd74ed9a9c items=0 ppid=2357 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:55.829643 kubelet[2095]: E1002 19:09:55.829479 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:56.241687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1282469184.mount: Deactivated successfully. Oct 2 19:09:56.830586 kubelet[2095]: E1002 19:09:56.830546 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:57.830714 kubelet[2095]: E1002 19:09:57.830661 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:58.831508 kubelet[2095]: E1002 19:09:58.831461 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:59.474219 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.4HDlz6.mount: Deactivated successfully. Oct 2 19:09:59.788688 kubelet[2095]: E1002 19:09:59.788583 2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:59.831782 kubelet[2095]: E1002 19:09:59.831742 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:59.832429 env[1631]: time="2023-10-02T19:09:59.832009571Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.889 [WARNING][3742] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] k8s.go 576: Cleaning up netns ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] k8s.go 583: Releasing IP address(es) ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] utils.go 196: Calico CNI releasing IP address ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.927 [INFO][3748] ipam_plugin.go 416: Releasing address using handleID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:59.942708 env[1631]: time="2023-10-02T19:09:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:59.942708 env[1631]: time="2023-10-02T19:09:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.937 [WARNING][3748] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.937 [INFO][3748] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:09:59.942708 env[1631]: time="2023-10-02T19:09:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.941 [INFO][3742] k8s.go 589: Teardown processing complete. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.942744288Z" level=info msg="TearDown network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" successfully" Oct 2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.942782004Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" returns successfully" Oct 2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.943851160Z" level=info msg="RemovePodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" Oct 2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.943924988Z" level=info msg="Forcibly stopping sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.019 [WARNING][3767] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.019 [INFO][3767] k8s.go 576: Cleaning up netns ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.020 [INFO][3767] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.020 [INFO][3767] k8s.go 583: Releasing IP address(es) ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.020 [INFO][3767] utils.go 196: Calico CNI releasing IP address ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.075 [INFO][3773] ipam_plugin.go 416: Releasing address using handleID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:10:00.099342 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:00.099342 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.091 [WARNING][3773] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.091 [INFO][3773] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" Oct 2 19:10:00.099342 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.097 [INFO][3767] k8s.go 589: Teardown processing complete. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Oct 2 19:10:00.100693 env[1631]: time="2023-10-02T19:10:00.100622812Z" level=info msg="TearDown network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" successfully" Oct 2 19:10:00.106150 env[1631]: time="2023-10-02T19:10:00.106075257Z" level=info msg="RemovePodSandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" returns successfully" Oct 2 19:10:00.106676 env[1631]: time="2023-10-02T19:10:00.106646636Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.172 [WARNING][3792] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.172 [INFO][3792] k8s.go 576: Cleaning up netns ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.173 [INFO][3792] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.173 [INFO][3792] k8s.go 583: Releasing IP address(es) ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.173 [INFO][3792] utils.go 196: Calico CNI releasing IP address ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.213 [INFO][3799] ipam_plugin.go 416: Releasing address using handleID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:10:00.233340 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:00.233340 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.225 [WARNING][3799] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.225 [INFO][3799] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:10:00.233340 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.231 [INFO][3792] k8s.go 589: Teardown processing complete. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.234381 env[1631]: time="2023-10-02T19:10:00.233443189Z" level=info msg="TearDown network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" successfully" Oct 2 19:10:00.234381 env[1631]: time="2023-10-02T19:10:00.233507839Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" returns successfully" Oct 2 19:10:00.235114 env[1631]: time="2023-10-02T19:10:00.235079847Z" level=info msg="RemovePodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" Oct 2 19:10:00.235222 env[1631]: time="2023-10-02T19:10:00.235117083Z" level=info msg="Forcibly stopping sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.296 [WARNING][3817] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] k8s.go 576: Cleaning up netns ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] k8s.go 583: Releasing IP address(es) ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] utils.go 196: Calico CNI releasing IP address ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.327 [INFO][3823] ipam_plugin.go 416: Releasing address using handleID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:10:00.343884 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:00.343884 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.338 [WARNING][3823] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.338 [INFO][3823] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" Oct 2 19:10:00.343884 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.342 [INFO][3817] k8s.go 589: Teardown processing complete. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Oct 2 19:10:00.344810 env[1631]: time="2023-10-02T19:10:00.343974110Z" level=info msg="TearDown network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" successfully" Oct 2 19:10:00.348579 env[1631]: time="2023-10-02T19:10:00.348529671Z" level=info msg="RemovePodSandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" returns successfully" Oct 2 19:10:00.833203 kubelet[2095]: E1002 19:10:00.833156 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:01.833354 kubelet[2095]: E1002 19:10:01.833301 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:02.833517 kubelet[2095]: E1002 19:10:02.833446 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:03.834139 kubelet[2095]: E1002 19:10:03.834069 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:04.835251 kubelet[2095]: E1002 19:10:04.835139 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:05.836828 kubelet[2095]: E1002 19:10:05.836774 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:06.837758 kubelet[2095]: E1002 19:10:06.837707 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:07.838560 kubelet[2095]: E1002 19:10:07.838507 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:08.839710 kubelet[2095]: E1002 19:10:08.839657 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:09.840555 kubelet[2095]: E1002 19:10:09.840509 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:10.841305 kubelet[2095]: E1002 19:10:10.841246 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:11.727481 env[1631]: time="2023-10-02T19:10:11.727433597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.730148 env[1631]: time="2023-10-02T19:10:11.730107480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.732596 env[1631]: time="2023-10-02T19:10:11.732558147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.734808 env[1631]: time="2023-10-02T19:10:11.734772511Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.735546 env[1631]: time="2023-10-02T19:10:11.735509370Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:10:11.737889 env[1631]: time="2023-10-02T19:10:11.737861629Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:11.738991 env[1631]: time="2023-10-02T19:10:11.738912811Z" level=info msg="CreateContainer within sandbox \"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:10:11.763439 env[1631]: time="2023-10-02T19:10:11.763388052Z" level=info msg="CreateContainer within sandbox \"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368\"" Oct 2 19:10:11.764331 env[1631]: time="2023-10-02T19:10:11.764287133Z" level=info msg="StartContainer for \"db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368\"" Oct 2 19:10:11.797870 systemd[1]: Started cri-containerd-db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368.scope. Oct 2 19:10:11.827048 kernel: kauditd_printk_skb: 188 callbacks suppressed Oct 2 19:10:11.827249 kernel: audit: type=1400 audit(1696273811.819:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.837826 kernel: audit: type=1400 audit(1696273811.819:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.837966 kernel: audit: type=1400 audit(1696273811.819:839): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.842788 kubelet[2095]: E1002 19:10:11.842686 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:11.843147 kernel: audit: type=1400 audit(1696273811.820:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.853500 kernel: audit: type=1400 audit(1696273811.820:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.853614 kernel: audit: type=1400 audit(1696273811.820:842): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.858550 kernel: audit: type=1400 audit(1696273811.820:843): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.866065 kernel: audit: type=1400 audit(1696273811.820:844): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.877684 kernel: audit: type=1400 audit(1696273811.820:845): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.877809 kernel: audit: type=1400 audit(1696273811.826:846): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit: BPF prog-id=109 op=LOAD Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.826000 audit: BPF prog-id=110 op=LOAD Oct 2 19:10:11.826000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002936e0 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit: BPF prog-id=111 op=LOAD Oct 2 19:10:11.831000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000293728 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465 Oct 2 19:10:11.831000 audit: BPF prog-id=111 op=UNLOAD Oct 2 19:10:11.831000 audit: BPF prog-id=110 op=UNLOAD Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:11.831000 audit: BPF prog-id=112 op=LOAD Oct 2 19:10:11.831000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000293b38 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465 Oct 2 19:10:11.886875 env[1631]: time="2023-10-02T19:10:11.886824353Z" level=info msg="StartContainer for \"db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368\" returns successfully" Oct 2 19:10:11.938667 env[1631]: time="2023-10-02T19:10:11.938523677Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:11.939859 env[1631]: time="2023-10-02T19:10:11.939806714Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:11.940272 kubelet[2095]: E1002 19:10:11.940237 2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:11.940380 kubelet[2095]: E1002 19:10:11.940298 2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:11.940568 kubelet[2095]: E1002 19:10:11.940546 2095 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mb7z6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75b9cbccd6-qsd92_calico-apiserver(c993a8e3-0888-4b16-ac95-795d1c5ddcf1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:11.940736 kubelet[2095]: E1002 19:10:11.940614 2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92" podUID=c993a8e3-0888-4b16-ac95-795d1c5ddcf1 Oct 2 19:10:11.941205 env[1631]: time="2023-10-02T19:10:11.941181421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:12.135904 env[1631]: time="2023-10-02T19:10:12.135846995Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:12.137233 env[1631]: time="2023-10-02T19:10:12.137169875Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:12.137579 kubelet[2095]: E1002 19:10:12.137546 2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:12.137663 kubelet[2095]: E1002 19:10:12.137603 2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:12.137773 kubelet[2095]: E1002 19:10:12.137753 2095 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:12.139204 env[1631]: time="2023-10-02T19:10:12.139171866Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:12.312358 env[1631]: time="2023-10-02T19:10:12.312277202Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:12.313762 env[1631]: time="2023-10-02T19:10:12.313627287Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:12.314217 kubelet[2095]: E1002 19:10:12.314177 2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:12.314326 kubelet[2095]: E1002 19:10:12.314243 2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:12.314839 kubelet[2095]: E1002 19:10:12.314810 2095 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:12.315380 kubelet[2095]: E1002 19:10:12.314890 2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9 Oct 2 19:10:12.346741 kubelet[2095]: E1002 19:10:12.346713 2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92" podUID=c993a8e3-0888-4b16-ac95-795d1c5ddcf1 Oct 2 19:10:12.456000 audit[3944]: NETFILTER_CFG table=filter:92 family=2 entries=8 op=nft_register_rule pid=3944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:12.456000 audit[3944]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe1c0d6c70 a2=0 a3=7ffe1c0d6c5c items=0 ppid=2357 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:12.459000 audit[3944]: NETFILTER_CFG table=nat:93 family=2 entries=78 op=nft_register_rule pid=3944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:12.459000 audit[3944]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe1c0d6c70 a2=0 a3=7ffe1c0d6c5c items=0 ppid=2357 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:12.750752 systemd[1]: run-containerd-runc-k8s.io-db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368-runc.Je4ukG.mount: Deactivated successfully. Oct 2 19:10:12.843602 kubelet[2095]: E1002 19:10:12.843552 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:13.843977 kubelet[2095]: E1002 19:10:13.843939 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:14.844796 kubelet[2095]: E1002 19:10:14.844745 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:15.845153 kubelet[2095]: E1002 19:10:15.845100 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:16.846154 kubelet[2095]: E1002 19:10:16.846113 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:17.847589 kubelet[2095]: E1002 19:10:17.847530 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:18.848513 kubelet[2095]: E1002 19:10:18.848471 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:19.479404 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.zrJoSH.mount: Deactivated successfully. Oct 2 19:10:19.788568 kubelet[2095]: E1002 19:10:19.788455 2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:19.849090 kubelet[2095]: E1002 19:10:19.848966 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:20.849611 kubelet[2095]: E1002 19:10:20.849560 2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"