Oct  2 19:08:28.146371 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023
Oct  2 19:08:28.146409 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:08:28.146424 kernel: BIOS-provided physical RAM map:
Oct  2 19:08:28.146435 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Oct  2 19:08:28.146446 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Oct  2 19:08:28.146457 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
Oct  2 19:08:28.146476 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable
Oct  2 19:08:28.146488 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved
Oct  2 19:08:28.146500 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved
Oct  2 19:08:28.146511 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
Oct  2 19:08:28.146523 kernel: NX (Execute Disable) protection: active
Oct  2 19:08:28.146535 kernel: SMBIOS 2.7 present.
Oct  2 19:08:28.146546 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017
Oct  2 19:08:28.146574 kernel: Hypervisor detected: KVM
Oct  2 19:08:28.146593 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Oct  2 19:08:28.146606 kernel: kvm-clock: cpu 0, msr 49f8a001, primary cpu clock
Oct  2 19:08:28.146619 kernel: kvm-clock: using sched offset of 5804100086 cycles
Oct  2 19:08:28.146633 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Oct  2 19:08:28.146645 kernel: tsc: Detected 2500.006 MHz processor
Oct  2 19:08:28.146658 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Oct  2 19:08:28.146674 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Oct  2 19:08:28.146687 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000
Oct  2 19:08:28.146699 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct  2 19:08:28.146712 kernel: Using GB pages for direct mapping
Oct  2 19:08:28.146725 kernel: ACPI: Early table checksum verification disabled
Oct  2 19:08:28.146738 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON)
Oct  2 19:08:28.146751 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001)
Oct  2 19:08:28.146764 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001)
Oct  2 19:08:28.146777 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001)
Oct  2 19:08:28.146792 kernel: ACPI: FACS 0x000000007D9EFF40 000040
Oct  2 19:08:28.146885 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Oct  2 19:08:28.146901 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001)
Oct  2 19:08:28.146913 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001)
Oct  2 19:08:28.146925 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001)
Oct  2 19:08:28.146939 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001)
Oct  2 19:08:28.146952 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001)
Oct  2 19:08:28.146964 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Oct  2 19:08:28.146981 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3]
Oct  2 19:08:28.146992 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488]
Oct  2 19:08:28.147004 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f]
Oct  2 19:08:28.147023 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39]
Oct  2 19:08:28.147036 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645]
Oct  2 19:08:28.147050 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf]
Oct  2 19:08:28.147064 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b]
Oct  2 19:08:28.147080 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7]
Oct  2 19:08:28.147094 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037]
Oct  2 19:08:28.147108 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba]
Oct  2 19:08:28.147122 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Oct  2 19:08:28.147136 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Oct  2 19:08:28.147150 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff]
Oct  2 19:08:28.147163 kernel: NUMA: Initialized distance table, cnt=1
Oct  2 19:08:28.147177 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff]
Oct  2 19:08:28.147193 kernel: Zone ranges:
Oct  2 19:08:28.147207 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct  2 19:08:28.147221 kernel:   DMA32    [mem 0x0000000001000000-0x000000007d9e9fff]
Oct  2 19:08:28.147235 kernel:   Normal   empty
Oct  2 19:08:28.147249 kernel: Movable zone start for each node
Oct  2 19:08:28.147263 kernel: Early memory node ranges
Oct  2 19:08:28.147276 kernel:   node   0: [mem 0x0000000000001000-0x000000000009efff]
Oct  2 19:08:28.147290 kernel:   node   0: [mem 0x0000000000100000-0x000000007d9e9fff]
Oct  2 19:08:28.147304 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff]
Oct  2 19:08:28.147320 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Oct  2 19:08:28.147334 kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Oct  2 19:08:28.147348 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges
Oct  2 19:08:28.147362 kernel: ACPI: PM-Timer IO Port: 0xb008
Oct  2 19:08:28.147376 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Oct  2 19:08:28.147390 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
Oct  2 19:08:28.147404 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Oct  2 19:08:28.147418 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct  2 19:08:28.147431 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Oct  2 19:08:28.147448 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Oct  2 19:08:28.147462 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Oct  2 19:08:28.147475 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Oct  2 19:08:28.147489 kernel: TSC deadline timer available
Oct  2 19:08:28.147503 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Oct  2 19:08:28.147517 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices
Oct  2 19:08:28.147531 kernel: Booting paravirtualized kernel on KVM
Oct  2 19:08:28.147545 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct  2 19:08:28.147592 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Oct  2 19:08:28.147609 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576
Oct  2 19:08:28.147622 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152
Oct  2 19:08:28.147635 kernel: pcpu-alloc: [0] 0 1 
Oct  2 19:08:28.147649 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0
Oct  2 19:08:28.147662 kernel: kvm-guest: PV spinlocks enabled
Oct  2 19:08:28.147676 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Oct  2 19:08:28.147690 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 506242
Oct  2 19:08:28.147704 kernel: Policy zone: DMA32
Oct  2 19:08:28.147720 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:08:28.147737 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Oct  2 19:08:28.147751 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Oct  2 19:08:28.147766 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Oct  2 19:08:28.147779 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Oct  2 19:08:28.147794 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved)
Oct  2 19:08:28.147809 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Oct  2 19:08:28.147823 kernel: Kernel/User page tables isolation: enabled
Oct  2 19:08:28.147836 kernel: ftrace: allocating 34453 entries in 135 pages
Oct  2 19:08:28.147853 kernel: ftrace: allocated 135 pages with 4 groups
Oct  2 19:08:28.147866 kernel: rcu: Hierarchical RCU implementation.
Oct  2 19:08:28.147881 kernel: rcu:         RCU event tracing is enabled.
Oct  2 19:08:28.147895 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Oct  2 19:08:28.147909 kernel:         Rude variant of Tasks RCU enabled.
Oct  2 19:08:28.147923 kernel:         Tracing variant of Tasks RCU enabled.
Oct  2 19:08:28.147937 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct  2 19:08:28.147951 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Oct  2 19:08:28.147964 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16
Oct  2 19:08:28.147981 kernel: random: crng init done
Oct  2 19:08:28.147995 kernel: Console: colour VGA+ 80x25
Oct  2 19:08:28.148009 kernel: printk: console [ttyS0] enabled
Oct  2 19:08:28.148023 kernel: ACPI: Core revision 20210730
Oct  2 19:08:28.148037 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns
Oct  2 19:08:28.148051 kernel: APIC: Switch to symmetric I/O mode setup
Oct  2 19:08:28.148065 kernel: x2apic enabled
Oct  2 19:08:28.148078 kernel: Switched APIC routing to physical x2apic.
Oct  2 19:08:28.148093 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns
Oct  2 19:08:28.148110 kernel: Calibrating delay loop (skipped) preset value.. 5000.01 BogoMIPS (lpj=2500006)
Oct  2 19:08:28.148124 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct  2 19:08:28.148138 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct  2 19:08:28.148152 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct  2 19:08:28.148176 kernel: Spectre V2 : Mitigation: Retpolines
Oct  2 19:08:28.148193 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct  2 19:08:28.148207 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Oct  2 19:08:28.148222 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Oct  2 19:08:28.148236 kernel: RETBleed: Vulnerable
Oct  2 19:08:28.148250 kernel: Speculative Store Bypass: Vulnerable
Oct  2 19:08:28.148265 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode
Oct  2 19:08:28.148279 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Oct  2 19:08:28.148293 kernel: GDS: Unknown: Dependent on hypervisor status
Oct  2 19:08:28.148308 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct  2 19:08:28.148325 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct  2 19:08:28.148339 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct  2 19:08:28.148354 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Oct  2 19:08:28.148368 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Oct  2 19:08:28.148383 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Oct  2 19:08:28.148398 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Oct  2 19:08:28.148415 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Oct  2 19:08:28.148429 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Oct  2 19:08:28.148444 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct  2 19:08:28.148458 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Oct  2 19:08:28.148472 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Oct  2 19:08:28.148487 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Oct  2 19:08:28.148502 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Oct  2 19:08:28.148516 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Oct  2 19:08:28.148531 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]:    8
Oct  2 19:08:28.148545 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format.
Oct  2 19:08:28.148574 kernel: Freeing SMP alternatives memory: 32K
Oct  2 19:08:28.148590 kernel: pid_max: default: 32768 minimum: 301
Oct  2 19:08:28.148601 kernel: LSM: Security Framework initializing
Oct  2 19:08:28.148613 kernel: SELinux:  Initializing.
Oct  2 19:08:28.148627 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Oct  2 19:08:28.148640 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Oct  2 19:08:28.148653 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7)
Oct  2 19:08:28.148665 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Oct  2 19:08:28.148677 kernel: signal: max sigframe size: 3632
Oct  2 19:08:28.148689 kernel: rcu: Hierarchical SRCU implementation.
Oct  2 19:08:28.148702 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Oct  2 19:08:28.148718 kernel: smp: Bringing up secondary CPUs ...
Oct  2 19:08:28.148731 kernel: x86: Booting SMP configuration:
Oct  2 19:08:28.148745 kernel: .... node  #0, CPUs:      #1
Oct  2 19:08:28.148758 kernel: kvm-clock: cpu 1, msr 49f8a041, secondary cpu clock
Oct  2 19:08:28.148772 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0
Oct  2 19:08:28.148787 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
Oct  2 19:08:28.148802 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Oct  2 19:08:28.148816 kernel: smp: Brought up 1 node, 2 CPUs
Oct  2 19:08:28.148830 kernel: smpboot: Max logical packages: 1
Oct  2 19:08:28.148846 kernel: smpboot: Total of 2 processors activated (10000.02 BogoMIPS)
Oct  2 19:08:28.148860 kernel: devtmpfs: initialized
Oct  2 19:08:28.148874 kernel: x86/mm: Memory block size: 128MB
Oct  2 19:08:28.148888 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct  2 19:08:28.148902 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Oct  2 19:08:28.148915 kernel: pinctrl core: initialized pinctrl subsystem
Oct  2 19:08:28.148928 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Oct  2 19:08:28.148942 kernel: audit: initializing netlink subsys (disabled)
Oct  2 19:08:28.148955 kernel: audit: type=2000 audit(1696273707.771:1): state=initialized audit_enabled=0 res=1
Oct  2 19:08:28.148970 kernel: thermal_sys: Registered thermal governor 'step_wise'
Oct  2 19:08:28.148984 kernel: thermal_sys: Registered thermal governor 'user_space'
Oct  2 19:08:28.148998 kernel: cpuidle: using governor menu
Oct  2 19:08:28.149009 kernel: ACPI: bus type PCI registered
Oct  2 19:08:28.149023 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct  2 19:08:28.149037 kernel: dca service started, version 1.12.1
Oct  2 19:08:28.149051 kernel: PCI: Using configuration type 1 for base access
Oct  2 19:08:28.149066 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Oct  2 19:08:28.149079 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct  2 19:08:28.149097 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct  2 19:08:28.149111 kernel: ACPI: Added _OSI(Module Device)
Oct  2 19:08:28.149126 kernel: ACPI: Added _OSI(Processor Device)
Oct  2 19:08:28.149138 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct  2 19:08:28.149152 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct  2 19:08:28.149163 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct  2 19:08:28.149176 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct  2 19:08:28.149188 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct  2 19:08:28.149201 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded
Oct  2 19:08:28.149216 kernel: ACPI: Interpreter enabled
Oct  2 19:08:28.149228 kernel: ACPI: PM: (supports S0 S5)
Oct  2 19:08:28.149241 kernel: ACPI: Using IOAPIC for interrupt routing
Oct  2 19:08:28.149253 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct  2 19:08:28.149265 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F
Oct  2 19:08:28.149277 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Oct  2 19:08:28.149580 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Oct  2 19:08:28.149733 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Oct  2 19:08:28.149757 kernel: acpiphp: Slot [3] registered
Oct  2 19:08:28.149772 kernel: acpiphp: Slot [4] registered
Oct  2 19:08:28.149785 kernel: acpiphp: Slot [5] registered
Oct  2 19:08:28.149800 kernel: acpiphp: Slot [6] registered
Oct  2 19:08:28.149815 kernel: acpiphp: Slot [7] registered
Oct  2 19:08:28.149830 kernel: acpiphp: Slot [8] registered
Oct  2 19:08:28.149844 kernel: acpiphp: Slot [9] registered
Oct  2 19:08:28.149859 kernel: acpiphp: Slot [10] registered
Oct  2 19:08:28.149873 kernel: acpiphp: Slot [11] registered
Oct  2 19:08:28.149897 kernel: acpiphp: Slot [12] registered
Oct  2 19:08:28.149912 kernel: acpiphp: Slot [13] registered
Oct  2 19:08:28.149927 kernel: acpiphp: Slot [14] registered
Oct  2 19:08:28.149941 kernel: acpiphp: Slot [15] registered
Oct  2 19:08:28.149956 kernel: acpiphp: Slot [16] registered
Oct  2 19:08:28.149970 kernel: acpiphp: Slot [17] registered
Oct  2 19:08:28.149985 kernel: acpiphp: Slot [18] registered
Oct  2 19:08:28.149999 kernel: acpiphp: Slot [19] registered
Oct  2 19:08:28.150013 kernel: acpiphp: Slot [20] registered
Oct  2 19:08:28.150031 kernel: acpiphp: Slot [21] registered
Oct  2 19:08:28.150046 kernel: acpiphp: Slot [22] registered
Oct  2 19:08:28.150060 kernel: acpiphp: Slot [23] registered
Oct  2 19:08:28.150075 kernel: acpiphp: Slot [24] registered
Oct  2 19:08:28.150089 kernel: acpiphp: Slot [25] registered
Oct  2 19:08:28.150103 kernel: acpiphp: Slot [26] registered
Oct  2 19:08:28.150118 kernel: acpiphp: Slot [27] registered
Oct  2 19:08:28.150132 kernel: acpiphp: Slot [28] registered
Oct  2 19:08:28.150146 kernel: acpiphp: Slot [29] registered
Oct  2 19:08:28.150160 kernel: acpiphp: Slot [30] registered
Oct  2 19:08:28.150177 kernel: acpiphp: Slot [31] registered
Oct  2 19:08:28.150191 kernel: PCI host bridge to bus 0000:00
Oct  2 19:08:28.150324 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct  2 19:08:28.150443 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct  2 19:08:28.150556 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct  2 19:08:28.150688 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window]
Oct  2 19:08:28.150802 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Oct  2 19:08:28.150956 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Oct  2 19:08:28.151093 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
Oct  2 19:08:28.151233 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000
Oct  2 19:08:28.151361 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Oct  2 19:08:28.151489 kernel: pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
Oct  2 19:08:28.151628 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff
Oct  2 19:08:28.151756 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff
Oct  2 19:08:28.151887 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff
Oct  2 19:08:28.152014 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff
Oct  2 19:08:28.152140 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff
Oct  2 19:08:28.152267 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff
Oct  2 19:08:28.152392 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 12695 usecs
Oct  2 19:08:28.152527 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000
Oct  2 19:08:28.152668 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref]
Oct  2 19:08:28.152799 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref]
Oct  2 19:08:28.152927 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct  2 19:08:28.153061 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802
Oct  2 19:08:28.153190 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff]
Oct  2 19:08:28.153324 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000
Oct  2 19:08:28.153451 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff]
Oct  2 19:08:28.153473 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Oct  2 19:08:28.153489 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Oct  2 19:08:28.153504 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Oct  2 19:08:28.153519 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Oct  2 19:08:28.153535 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Oct  2 19:08:28.153550 kernel: iommu: Default domain type: Translated 
Oct  2 19:08:28.153581 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Oct  2 19:08:28.153725 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device
Oct  2 19:08:28.153949 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct  2 19:08:28.154076 kernel: pci 0000:00:03.0: vgaarb: bridge control possible
Oct  2 19:08:28.154093 kernel: vgaarb: loaded
Oct  2 19:08:28.154106 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct  2 19:08:28.154120 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct  2 19:08:28.154133 kernel: PTP clock support registered
Oct  2 19:08:28.154146 kernel: PCI: Using ACPI for IRQ routing
Oct  2 19:08:28.154159 kernel: PCI: pci_cache_line_size set to 64 bytes
Oct  2 19:08:28.154172 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
Oct  2 19:08:28.154189 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff]
Oct  2 19:08:28.154202 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
Oct  2 19:08:28.154215 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter
Oct  2 19:08:28.154229 kernel: clocksource: Switched to clocksource kvm-clock
Oct  2 19:08:28.154373 kernel: VFS: Disk quotas dquot_6.6.0
Oct  2 19:08:28.154387 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct  2 19:08:28.154401 kernel: pnp: PnP ACPI init
Oct  2 19:08:28.154414 kernel: pnp: PnP ACPI: found 5 devices
Oct  2 19:08:28.154428 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct  2 19:08:28.154446 kernel: NET: Registered PF_INET protocol family
Oct  2 19:08:28.154459 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Oct  2 19:08:28.154473 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Oct  2 19:08:28.154486 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Oct  2 19:08:28.154499 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Oct  2 19:08:28.154512 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear)
Oct  2 19:08:28.154525 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Oct  2 19:08:28.154538 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Oct  2 19:08:28.154618 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Oct  2 19:08:28.154638 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Oct  2 19:08:28.154652 kernel: NET: Registered PF_XDP protocol family
Oct  2 19:08:28.154849 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Oct  2 19:08:28.154966 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Oct  2 19:08:28.155155 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Oct  2 19:08:28.155266 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window]
Oct  2 19:08:28.155489 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Oct  2 19:08:28.155630 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds
Oct  2 19:08:28.155652 kernel: PCI: CLS 0 bytes, default 64
Oct  2 19:08:28.155666 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Oct  2 19:08:28.155679 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns
Oct  2 19:08:28.155693 kernel: clocksource: Switched to clocksource tsc
Oct  2 19:08:28.155706 kernel: Initialise system trusted keyrings
Oct  2 19:08:28.155720 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0
Oct  2 19:08:28.155733 kernel: Key type asymmetric registered
Oct  2 19:08:28.155746 kernel: Asymmetric key parser 'x509' registered
Oct  2 19:08:28.155762 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Oct  2 19:08:28.155775 kernel: io scheduler mq-deadline registered
Oct  2 19:08:28.155787 kernel: io scheduler kyber registered
Oct  2 19:08:28.155798 kernel: io scheduler bfq registered
Oct  2 19:08:28.155810 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Oct  2 19:08:28.155822 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct  2 19:08:28.155834 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct  2 19:08:28.155847 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Oct  2 19:08:28.155860 kernel: i8042: Warning: Keylock active
Oct  2 19:08:28.155876 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Oct  2 19:08:28.156892 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Oct  2 19:08:28.157066 kernel: rtc_cmos 00:00: RTC can wake from S4
Oct  2 19:08:28.157198 kernel: rtc_cmos 00:00: registered as rtc0
Oct  2 19:08:28.157323 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:08:27 UTC (1696273707)
Oct  2 19:08:28.157445 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram
Oct  2 19:08:28.157465 kernel: intel_pstate: CPU model not supported
Oct  2 19:08:28.157480 kernel: NET: Registered PF_INET6 protocol family
Oct  2 19:08:28.157500 kernel: Segment Routing with IPv6
Oct  2 19:08:28.157515 kernel: In-situ OAM (IOAM) with IPv6
Oct  2 19:08:28.157530 kernel: NET: Registered PF_PACKET protocol family
Oct  2 19:08:28.157545 kernel: Key type dns_resolver registered
Oct  2 19:08:28.157571 kernel: IPI shorthand broadcast: enabled
Oct  2 19:08:28.157586 kernel: sched_clock: Marking stable (528186159, 344242760)->(988078924, -115650005)
Oct  2 19:08:28.157601 kernel: registered taskstats version 1
Oct  2 19:08:28.157616 kernel: Loading compiled-in X.509 certificates
Oct  2 19:08:28.157632 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861'
Oct  2 19:08:28.157651 kernel: Key type .fscrypt registered
Oct  2 19:08:28.157666 kernel: Key type fscrypt-provisioning registered
Oct  2 19:08:28.157681 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct  2 19:08:28.157696 kernel: ima: Allocated hash algorithm: sha1
Oct  2 19:08:28.157711 kernel: ima: No architecture policies found
Oct  2 19:08:28.157726 kernel: Freeing unused kernel image (initmem) memory: 45372K
Oct  2 19:08:28.157742 kernel: Write protecting the kernel read-only data: 28672k
Oct  2 19:08:28.157756 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Oct  2 19:08:28.157772 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K
Oct  2 19:08:28.157790 kernel: Run /init as init process
Oct  2 19:08:28.157805 kernel:   with arguments:
Oct  2 19:08:28.157821 kernel:     /init
Oct  2 19:08:28.157836 kernel:   with environment:
Oct  2 19:08:28.157850 kernel:     HOME=/
Oct  2 19:08:28.157864 kernel:     TERM=linux
Oct  2 19:08:28.157879 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Oct  2 19:08:28.157907 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 19:08:28.157930 systemd[1]: Detected virtualization amazon.
Oct  2 19:08:28.157946 systemd[1]: Detected architecture x86-64.
Oct  2 19:08:28.157962 systemd[1]: Running in initrd.
Oct  2 19:08:28.157978 systemd[1]: No hostname configured, using default hostname.
Oct  2 19:08:28.158011 systemd[1]: Hostname set to <localhost>.
Oct  2 19:08:28.158035 systemd[1]: Initializing machine ID from VM UUID.
Oct  2 19:08:28.158050 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Oct  2 19:08:28.158151 systemd[1]: Queued start job for default target initrd.target.
Oct  2 19:08:28.158170 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 19:08:28.158186 systemd[1]: Reached target cryptsetup.target.
Oct  2 19:08:28.158202 systemd[1]: Reached target paths.target.
Oct  2 19:08:28.158218 systemd[1]: Reached target slices.target.
Oct  2 19:08:28.158231 systemd[1]: Reached target swap.target.
Oct  2 19:08:28.158244 systemd[1]: Reached target timers.target.
Oct  2 19:08:28.158264 systemd[1]: Listening on iscsid.socket.
Oct  2 19:08:28.158281 systemd[1]: Listening on iscsiuio.socket.
Oct  2 19:08:28.158295 systemd[1]: Listening on systemd-journald-audit.socket.
Oct  2 19:08:28.158310 systemd[1]: Listening on systemd-journald-dev-log.socket.
Oct  2 19:08:28.158325 systemd[1]: Listening on systemd-journald.socket.
Oct  2 19:08:28.158339 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 19:08:28.158354 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 19:08:28.158369 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 19:08:28.158388 systemd[1]: Reached target sockets.target.
Oct  2 19:08:28.158403 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 19:08:28.158420 systemd[1]: Finished network-cleanup.service.
Oct  2 19:08:28.158437 systemd[1]: Starting systemd-fsck-usr.service...
Oct  2 19:08:28.158454 systemd[1]: Starting systemd-journald.service...
Oct  2 19:08:28.158471 systemd[1]: Starting systemd-modules-load.service...
Oct  2 19:08:28.158488 systemd[1]: Starting systemd-resolved.service...
Oct  2 19:08:28.158505 systemd[1]: Starting systemd-vconsole-setup.service...
Oct  2 19:08:28.158527 systemd-journald[185]: Journal started
Oct  2 19:08:28.158629 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc) is 4.8M, max 38.7M, 33.9M free.
Oct  2 19:08:28.167587 systemd[1]: Started systemd-journald.service.
Oct  2 19:08:28.191987 systemd-resolved[187]: Positive Trust Anchors:
Oct  2 19:08:28.355453 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Oct  2 19:08:28.355478 kernel: Bridge firewalling registered
Oct  2 19:08:28.355491 kernel: SCSI subsystem initialized
Oct  2 19:08:28.355501 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Oct  2 19:08:28.355517 kernel: device-mapper: uevent: version 1.0.3
Oct  2 19:08:28.355530 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Oct  2 19:08:28.193616 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 19:08:28.370124 kernel: audit: type=1130 audit(1696273708.352:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.370313 kernel: audit: type=1130 audit(1696273708.360:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.370329 kernel: audit: type=1130 audit(1696273708.368:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.193676 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 19:08:28.194766 systemd-modules-load[186]: Inserted module 'overlay'
Oct  2 19:08:28.392426 kernel: audit: type=1130 audit(1696273708.384:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.202113 systemd-resolved[187]: Defaulting to hostname 'linux'.
Oct  2 19:08:28.255716 systemd-modules-load[186]: Inserted module 'br_netfilter'
Oct  2 19:08:28.302189 systemd-modules-load[186]: Inserted module 'dm_multipath'
Oct  2 19:08:28.354875 systemd[1]: Started systemd-resolved.service.
Oct  2 19:08:28.403288 kernel: audit: type=1130 audit(1696273708.395:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.362392 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 19:08:28.371795 systemd[1]: Finished systemd-fsck-usr.service.
Oct  2 19:08:28.412621 kernel: audit: type=1130 audit(1696273708.402:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.394166 systemd[1]: Finished systemd-modules-load.service.
Oct  2 19:08:28.403247 systemd[1]: Finished systemd-vconsole-setup.service.
Oct  2 19:08:28.404726 systemd[1]: Reached target nss-lookup.target.
Oct  2 19:08:28.412443 systemd[1]: Starting dracut-cmdline-ask.service...
Oct  2 19:08:28.415444 systemd[1]: Starting systemd-sysctl.service...
Oct  2 19:08:28.418065 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 19:08:28.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.443586 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 19:08:28.451620 kernel: audit: type=1130 audit(1696273708.443:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.452828 systemd[1]: Finished dracut-cmdline-ask.service.
Oct  2 19:08:28.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.461330 systemd[1]: Finished systemd-sysctl.service.
Oct  2 19:08:28.465695 kernel: audit: type=1130 audit(1696273708.459:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.473858 systemd[1]: Starting dracut-cmdline.service...
Oct  2 19:08:28.476371 kernel: audit: type=1130 audit(1696273708.467:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.485205 dracut-cmdline[206]: dracut-dracut-053
Oct  2 19:08:28.488674 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:08:28.569585 kernel: Loading iSCSI transport class v2.0-870.
Oct  2 19:08:28.582589 kernel: iscsi: registered transport (tcp)
Oct  2 19:08:28.607441 kernel: iscsi: registered transport (qla4xxx)
Oct  2 19:08:28.607517 kernel: QLogic iSCSI HBA Driver
Oct  2 19:08:28.643150 systemd[1]: Finished dracut-cmdline.service.
Oct  2 19:08:28.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:28.646545 systemd[1]: Starting dracut-pre-udev.service...
Oct  2 19:08:28.722621 kernel: raid6: avx512x4 gen() 15703 MB/s
Oct  2 19:08:28.747470 kernel: raid6: avx512x4 xor()  6357 MB/s
Oct  2 19:08:28.764771 kernel: raid6: avx512x2 gen() 10801 MB/s
Oct  2 19:08:28.781647 kernel: raid6: avx512x2 xor() 20343 MB/s
Oct  2 19:08:28.798614 kernel: raid6: avx512x1 gen() 14967 MB/s
Oct  2 19:08:28.816596 kernel: raid6: avx512x1 xor() 17734 MB/s
Oct  2 19:08:28.838771 kernel: raid6: avx2x4   gen() 14893 MB/s
Oct  2 19:08:28.867611 kernel: raid6: avx2x4   xor()  1872 MB/s
Oct  2 19:08:28.886620 kernel: raid6: avx2x2   gen() 11525 MB/s
Oct  2 19:08:28.904601 kernel: raid6: avx2x2   xor() 14477 MB/s
Oct  2 19:08:28.921666 kernel: raid6: avx2x1   gen() 11418 MB/s
Oct  2 19:08:28.941641 kernel: raid6: avx2x1   xor() 12673 MB/s
Oct  2 19:08:28.959617 kernel: raid6: sse2x4   gen()  3854 MB/s
Oct  2 19:08:28.977874 kernel: raid6: sse2x4   xor()  2549 MB/s
Oct  2 19:08:29.000676 kernel: raid6: sse2x2   gen()  6435 MB/s
Oct  2 19:08:29.018773 kernel: raid6: sse2x2   xor()  3076 MB/s
Oct  2 19:08:29.036607 kernel: raid6: sse2x1   gen()  7138 MB/s
Oct  2 19:08:29.056188 kernel: raid6: sse2x1   xor()  3169 MB/s
Oct  2 19:08:29.056251 kernel: raid6: using algorithm avx512x4 gen() 15703 MB/s
Oct  2 19:08:29.056264 kernel: raid6: .... xor() 6357 MB/s, rmw enabled
Oct  2 19:08:29.057518 kernel: raid6: using avx512x2 recovery algorithm
Oct  2 19:08:29.076597 kernel: xor: automatically using best checksumming function   avx       
Oct  2 19:08:29.209714 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Oct  2 19:08:29.221029 systemd[1]: Finished dracut-pre-udev.service.
Oct  2 19:08:29.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:29.224395 systemd[1]: Starting systemd-udevd.service...
Oct  2 19:08:29.222000 audit: BPF prog-id=7 op=LOAD
Oct  2 19:08:29.222000 audit: BPF prog-id=8 op=LOAD
Oct  2 19:08:29.243401 systemd-udevd[383]: Using default interface naming scheme 'v252'.
Oct  2 19:08:29.250487 systemd[1]: Started systemd-udevd.service.
Oct  2 19:08:29.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:29.255825 systemd[1]: Starting dracut-pre-trigger.service...
Oct  2 19:08:29.301392 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation
Oct  2 19:08:29.346696 systemd[1]: Finished dracut-pre-trigger.service.
Oct  2 19:08:29.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:29.350306 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 19:08:29.405529 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 19:08:29.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:29.485621 kernel: cryptd: max_cpu_qlen set to 1000
Oct  2 19:08:29.522605 kernel: ena 0000:00:05.0: ENA device version: 0.10
Oct  2 19:08:29.522861 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1
Oct  2 19:08:29.524791 kernel: AVX2 version of gcm_enc/dec engaged.
Oct  2 19:08:29.524855 kernel: AES CTR mode by8 optimization enabled
Oct  2 19:08:29.524876 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy.
Oct  2 19:08:29.530594 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:fd:15:0b:8f:b5
Oct  2 19:08:29.532717 (udev-worker)[443]: Network interface NamePolicy= disabled on kernel command line.
Oct  2 19:08:29.718842 kernel: nvme nvme0: pci function 0000:00:04.0
Oct  2 19:08:29.719093 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11
Oct  2 19:08:29.719115 kernel: nvme nvme0: 2/0/0 default/read/poll queues
Oct  2 19:08:29.719253 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Oct  2 19:08:29.719271 kernel: GPT:9289727 != 16777215
Oct  2 19:08:29.719286 kernel: GPT:Alternate GPT header not at the end of the disk.
Oct  2 19:08:29.719300 kernel: GPT:9289727 != 16777215
Oct  2 19:08:29.719315 kernel: GPT: Use GNU Parted to correct GPT errors.
Oct  2 19:08:29.719331 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Oct  2 19:08:29.719355 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (430)
Oct  2 19:08:29.636934 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Oct  2 19:08:29.729034 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 19:08:29.745831 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Oct  2 19:08:29.747436 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Oct  2 19:08:29.756932 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Oct  2 19:08:29.760009 systemd[1]: Starting disk-uuid.service...
Oct  2 19:08:29.767367 disk-uuid[584]: Primary Header is updated.
Oct  2 19:08:29.767367 disk-uuid[584]: Secondary Entries is updated.
Oct  2 19:08:29.767367 disk-uuid[584]: Secondary Header is updated.
Oct  2 19:08:29.774585 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Oct  2 19:08:29.779580 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Oct  2 19:08:29.786760 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Oct  2 19:08:30.788025 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Oct  2 19:08:30.789868 disk-uuid[585]: The operation has completed successfully.
Oct  2 19:08:30.943545 systemd[1]: disk-uuid.service: Deactivated successfully.
Oct  2 19:08:30.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:30.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:30.943740 systemd[1]: Finished disk-uuid.service.
Oct  2 19:08:30.946295 systemd[1]: Starting verity-setup.service...
Oct  2 19:08:30.980641 kernel: device-mapper: verity: sha256 using implementation "sha256-generic"
Oct  2 19:08:31.064046 systemd[1]: Found device dev-mapper-usr.device.
Oct  2 19:08:31.066830 systemd[1]: Mounting sysusr-usr.mount...
Oct  2 19:08:31.069776 systemd[1]: Finished verity-setup.service.
Oct  2 19:08:31.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.166575 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Oct  2 19:08:31.167669 systemd[1]: Mounted sysusr-usr.mount.
Oct  2 19:08:31.169400 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Oct  2 19:08:31.171806 systemd[1]: Starting ignition-setup.service...
Oct  2 19:08:31.176843 systemd[1]: Starting parse-ip-for-networkd.service...
Oct  2 19:08:31.193166 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:08:31.193230 kernel: BTRFS info (device nvme0n1p6): using free space tree
Oct  2 19:08:31.193250 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Oct  2 19:08:31.217723 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Oct  2 19:08:31.231291 systemd[1]: mnt-oem.mount: Deactivated successfully.
Oct  2 19:08:31.254475 systemd[1]: Finished ignition-setup.service.
Oct  2 19:08:31.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.257181 systemd[1]: Starting ignition-fetch-offline.service...
Oct  2 19:08:31.276054 systemd[1]: Finished parse-ip-for-networkd.service.
Oct  2 19:08:31.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.277000 audit: BPF prog-id=9 op=LOAD
Oct  2 19:08:31.279300 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:08:31.303769 systemd-networkd[1097]: lo: Link UP
Oct  2 19:08:31.303780 systemd-networkd[1097]: lo: Gained carrier
Oct  2 19:08:31.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.304220 systemd-networkd[1097]: Enumeration completed
Oct  2 19:08:31.304316 systemd[1]: Started systemd-networkd.service.
Oct  2 19:08:31.304517 systemd-networkd[1097]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:08:31.307274 systemd[1]: Reached target network.target.
Oct  2 19:08:31.316669 systemd[1]: Starting iscsiuio.service...
Oct  2 19:08:31.323052 systemd-networkd[1097]: eth0: Link UP
Oct  2 19:08:31.324819 systemd-networkd[1097]: eth0: Gained carrier
Oct  2 19:08:31.329239 systemd[1]: Started iscsiuio.service.
Oct  2 19:08:31.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.331998 systemd[1]: Starting iscsid.service...
Oct  2 19:08:31.337614 iscsid[1102]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 19:08:31.337614 iscsid[1102]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Oct  2 19:08:31.337614 iscsid[1102]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Oct  2 19:08:31.337614 iscsid[1102]: If using hardware iscsi like qla4xxx this message can be ignored.
Oct  2 19:08:31.337614 iscsid[1102]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 19:08:31.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.364540 iscsid[1102]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Oct  2 19:08:31.340001 systemd[1]: Started iscsid.service.
Oct  2 19:08:31.358734 systemd[1]: Starting dracut-initqueue.service...
Oct  2 19:08:31.360569 systemd-networkd[1097]: eth0: DHCPv4 address 172.31.31.246/20, gateway 172.31.16.1 acquired from 172.31.16.1
Oct  2 19:08:31.386423 systemd[1]: Finished dracut-initqueue.service.
Oct  2 19:08:31.389092 systemd[1]: Reached target remote-fs-pre.target.
Oct  2 19:08:31.391478 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 19:08:31.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.392762 systemd[1]: Reached target remote-fs.target.
Oct  2 19:08:31.396659 systemd[1]: Starting dracut-pre-mount.service...
Oct  2 19:08:31.407728 systemd[1]: Finished dracut-pre-mount.service.
Oct  2 19:08:31.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.935229 ignition[1086]: Ignition 2.14.0
Oct  2 19:08:31.935244 ignition[1086]: Stage: fetch-offline
Oct  2 19:08:31.935586 ignition[1086]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:31.935639 ignition[1086]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:31.960605 ignition[1086]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:31.962743 ignition[1086]: Ignition finished successfully
Oct  2 19:08:31.964948 systemd[1]: Finished ignition-fetch-offline.service.
Oct  2 19:08:31.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:31.967438 systemd[1]: Starting ignition-fetch.service...
Oct  2 19:08:31.978087 ignition[1121]: Ignition 2.14.0
Oct  2 19:08:31.978107 ignition[1121]: Stage: fetch
Oct  2 19:08:31.978314 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:31.978346 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:31.989347 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:31.991076 ignition[1121]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:31.997532 ignition[1121]: INFO     : PUT result: OK
Oct  2 19:08:32.000042 ignition[1121]: DEBUG    : parsed url from cmdline: ""
Oct  2 19:08:32.000042 ignition[1121]: INFO     : no config URL provided
Oct  2 19:08:32.002249 ignition[1121]: INFO     : reading system config file "/usr/lib/ignition/user.ign"
Oct  2 19:08:32.002249 ignition[1121]: INFO     : no config at "/usr/lib/ignition/user.ign"
Oct  2 19:08:32.002249 ignition[1121]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:32.012250 ignition[1121]: INFO     : PUT result: OK
Oct  2 19:08:32.012250 ignition[1121]: INFO     : GET http://169.254.169.254/2019-10-01/user-data: attempt #1
Oct  2 19:08:32.014964 ignition[1121]: INFO     : GET result: OK
Oct  2 19:08:32.016061 ignition[1121]: DEBUG    : parsing config with SHA512: 1b03cbf07b994ad64a518eb6688950cd40622c0323e9bf39c0b049a13d38093ad784de08ffd60e4953bb9781931eb9cd38b780b74bc276d616fcce4cd6f32eff
Oct  2 19:08:32.034220 unknown[1121]: fetched base config from "system"
Oct  2 19:08:32.034234 unknown[1121]: fetched base config from "system"
Oct  2 19:08:32.034745 ignition[1121]: fetch: fetch complete
Oct  2 19:08:32.034241 unknown[1121]: fetched user config from "aws"
Oct  2 19:08:32.034751 ignition[1121]: fetch: fetch passed
Oct  2 19:08:32.034787 ignition[1121]: Ignition finished successfully
Oct  2 19:08:32.041747 systemd[1]: Finished ignition-fetch.service.
Oct  2 19:08:32.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.042770 systemd[1]: Starting ignition-kargs.service...
Oct  2 19:08:32.056835 ignition[1127]: Ignition 2.14.0
Oct  2 19:08:32.056846 ignition[1127]: Stage: kargs
Oct  2 19:08:32.057051 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:32.057077 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:32.073634 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:32.075286 ignition[1127]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:32.077005 ignition[1127]: INFO     : PUT result: OK
Oct  2 19:08:32.080916 ignition[1127]: kargs: kargs passed
Oct  2 19:08:32.080970 ignition[1127]: Ignition finished successfully
Oct  2 19:08:32.083536 systemd[1]: Finished ignition-kargs.service.
Oct  2 19:08:32.093536 kernel: kauditd_printk_skb: 20 callbacks suppressed
Oct  2 19:08:32.093662 kernel: audit: type=1130 audit(1696273712.084:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.086690 systemd[1]: Starting ignition-disks.service...
Oct  2 19:08:32.099912 ignition[1133]: Ignition 2.14.0
Oct  2 19:08:32.100200 ignition[1133]: Stage: disks
Oct  2 19:08:32.100404 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:32.100435 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:32.109774 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:32.111224 ignition[1133]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:32.113226 ignition[1133]: INFO     : PUT result: OK
Oct  2 19:08:32.116363 ignition[1133]: disks: disks passed
Oct  2 19:08:32.116415 ignition[1133]: Ignition finished successfully
Oct  2 19:08:32.119082 systemd[1]: Finished ignition-disks.service.
Oct  2 19:08:32.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.120619 systemd[1]: Reached target initrd-root-device.target.
Oct  2 19:08:32.125638 kernel: audit: type=1130 audit(1696273712.119:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.127641 systemd[1]: Reached target local-fs-pre.target.
Oct  2 19:08:32.128810 systemd[1]: Reached target local-fs.target.
Oct  2 19:08:32.129817 systemd[1]: Reached target sysinit.target.
Oct  2 19:08:32.129857 systemd[1]: Reached target basic.target.
Oct  2 19:08:32.133909 systemd[1]: Starting systemd-fsck-root.service...
Oct  2 19:08:32.167226 systemd-fsck[1141]: ROOT: clean, 603/553520 files, 56012/553472 blocks
Oct  2 19:08:32.173497 systemd[1]: Finished systemd-fsck-root.service.
Oct  2 19:08:32.182416 systemd[1]: Mounting sysroot.mount...
Oct  2 19:08:32.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.192643 kernel: audit: type=1130 audit(1696273712.174:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.205075 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Oct  2 19:08:32.210968 systemd[1]: Mounted sysroot.mount.
Oct  2 19:08:32.212842 systemd[1]: Reached target initrd-root-fs.target.
Oct  2 19:08:32.225788 systemd[1]: Mounting sysroot-usr.mount...
Oct  2 19:08:32.231380 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Oct  2 19:08:32.231440 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Oct  2 19:08:32.231475 systemd[1]: Reached target ignition-diskful.target.
Oct  2 19:08:32.234328 systemd[1]: Mounted sysroot-usr.mount.
Oct  2 19:08:32.246211 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 19:08:32.254486 systemd[1]: Starting initrd-setup-root.service...
Oct  2 19:08:32.268590 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1158)
Oct  2 19:08:32.273611 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:08:32.273686 kernel: BTRFS info (device nvme0n1p6): using free space tree
Oct  2 19:08:32.273707 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Oct  2 19:08:32.273724 initrd-setup-root[1163]: cut: /sysroot/etc/passwd: No such file or directory
Oct  2 19:08:32.281612 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Oct  2 19:08:32.283404 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 19:08:32.286892 initrd-setup-root[1189]: cut: /sysroot/etc/group: No such file or directory
Oct  2 19:08:32.293360 initrd-setup-root[1197]: cut: /sysroot/etc/shadow: No such file or directory
Oct  2 19:08:32.299375 initrd-setup-root[1205]: cut: /sysroot/etc/gshadow: No such file or directory
Oct  2 19:08:32.486734 systemd[1]: Finished initrd-setup-root.service.
Oct  2 19:08:32.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.491901 systemd[1]: Starting ignition-mount.service...
Oct  2 19:08:32.499060 kernel: audit: type=1130 audit(1696273712.489:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.500005 systemd[1]: Starting sysroot-boot.service...
Oct  2 19:08:32.507056 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Oct  2 19:08:32.507178 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Oct  2 19:08:32.509096 systemd-networkd[1097]: eth0: Gained IPv6LL
Oct  2 19:08:32.530205 ignition[1224]: INFO     : Ignition 2.14.0
Oct  2 19:08:32.530205 ignition[1224]: INFO     : Stage: mount
Oct  2 19:08:32.532531 ignition[1224]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:32.532531 ignition[1224]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:32.550301 ignition[1224]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:32.551807 ignition[1224]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:32.555155 systemd[1]: Finished sysroot-boot.service.
Oct  2 19:08:32.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.561635 kernel: audit: type=1130 audit(1696273712.555:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.561670 ignition[1224]: INFO     : PUT result: OK
Oct  2 19:08:32.569928 ignition[1224]: INFO     : mount: mount passed
Oct  2 19:08:32.571198 ignition[1224]: INFO     : Ignition finished successfully
Oct  2 19:08:32.573301 systemd[1]: Finished ignition-mount.service.
Oct  2 19:08:32.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.581586 systemd[1]: Starting ignition-files.service...
Oct  2 19:08:32.589121 kernel: audit: type=1130 audit(1696273712.578:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:32.594453 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 19:08:32.606602 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1233)
Oct  2 19:08:32.610186 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:08:32.610237 kernel: BTRFS info (device nvme0n1p6): using free space tree
Oct  2 19:08:32.610250 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Oct  2 19:08:32.616764 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Oct  2 19:08:32.619918 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 19:08:32.633143 ignition[1252]: INFO     : Ignition 2.14.0
Oct  2 19:08:32.633143 ignition[1252]: INFO     : Stage: files
Oct  2 19:08:32.635345 ignition[1252]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:32.635345 ignition[1252]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:32.646944 ignition[1252]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:32.649073 ignition[1252]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:32.651016 ignition[1252]: INFO     : PUT result: OK
Oct  2 19:08:32.655934 ignition[1252]: DEBUG    : files: compiled without relabeling support, skipping
Oct  2 19:08:32.661722 ignition[1252]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Oct  2 19:08:32.661722 ignition[1252]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Oct  2 19:08:32.675512 ignition[1252]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Oct  2 19:08:32.681179 ignition[1252]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Oct  2 19:08:32.684022 unknown[1252]: wrote ssh authorized keys file for user: core
Oct  2 19:08:32.687011 ignition[1252]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Oct  2 19:08:32.689284 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Oct  2 19:08:32.691792 ignition[1252]: INFO     : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1
Oct  2 19:08:32.868446 ignition[1252]: INFO     : GET result: OK
Oct  2 19:08:33.093197 ignition[1252]: DEBUG    : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d
Oct  2 19:08:33.096415 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Oct  2 19:08:33.096415 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz"
Oct  2 19:08:33.096415 ignition[1252]: INFO     : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-amd64.tar.gz: attempt #1
Oct  2 19:08:33.194162 ignition[1252]: INFO     : GET result: OK
Oct  2 19:08:33.295342 ignition[1252]: DEBUG    : file matches expected sum of: 961188117863ca9af5b084e84691e372efee93ad09daf6a0422e8d75a5803f394d8968064f7ca89f14e8973766201e731241f32538cf2c8d91f0233e786302df
Oct  2 19:08:33.299912 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz"
Oct  2 19:08:33.299912 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/etc/eks/bootstrap.sh"
Oct  2 19:08:33.299912 ignition[1252]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 19:08:33.308823 ignition[1252]: INFO     : op(1): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740"
Oct  2 19:08:33.310752 ignition[1252]: CRITICAL : op(1): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740": device or resource busy
Oct  2 19:08:33.310752 ignition[1252]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem576931740", trying btrfs: device or resource busy
Oct  2 19:08:33.310752 ignition[1252]: INFO     : op(2): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740"
Oct  2 19:08:33.323094 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1254)
Oct  2 19:08:33.323117 ignition[1252]: INFO     : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem576931740"
Oct  2 19:08:33.323117 ignition[1252]: INFO     : op(3): [started]  unmounting "/mnt/oem576931740"
Oct  2 19:08:33.323117 ignition[1252]: INFO     : op(3): [finished] unmounting "/mnt/oem576931740"
Oct  2 19:08:33.323117 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh"
Oct  2 19:08:33.324080 systemd[1]: mnt-oem576931740.mount: Deactivated successfully.
Oct  2 19:08:33.333828 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubeadm"
Oct  2 19:08:33.333828 ignition[1252]: INFO     : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubeadm: attempt #1
Oct  2 19:08:33.432272 ignition[1252]: INFO     : GET result: OK
Oct  2 19:08:34.290469 ignition[1252]: DEBUG    : file matches expected sum of: 43b8f213f1732c092e34008d5334e6622a6603f7ec5890c395ac911d50069d0dc11a81fa38436df40fc875a10fee6ee13aa285c017f1de210171065e847c99c5
Oct  2 19:08:34.293859 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm"
Oct  2 19:08:34.293859 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/opt/bin/kubelet"
Oct  2 19:08:34.293859 ignition[1252]: INFO     : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubelet: attempt #1
Oct  2 19:08:34.346965 ignition[1252]: INFO     : GET result: OK
Oct  2 19:08:35.167321 ignition[1252]: DEBUG    : file matches expected sum of: 82b36a0b83a1d48ef1f70e3ed2a263b3ce935304cdc0606d194b290217fb04f98628b0d82e200b51ccf5c05c718b2476274ae710bb143fffe28dc6bbf8407d54
Oct  2 19:08:35.174773 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet"
Oct  2 19:08:35.174773 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/home/core/install.sh"
Oct  2 19:08:35.182759 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh"
Oct  2 19:08:35.182759 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/etc/docker/daemon.json"
Oct  2 19:08:35.182759 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json"
Oct  2 19:08:35.182759 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Oct  2 19:08:35.182759 ignition[1252]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 19:08:35.199082 ignition[1252]: INFO     : op(4): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252"
Oct  2 19:08:35.202147 ignition[1252]: CRITICAL : op(4): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252": device or resource busy
Oct  2 19:08:35.202147 ignition[1252]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3742898252", trying btrfs: device or resource busy
Oct  2 19:08:35.202147 ignition[1252]: INFO     : op(5): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252"
Oct  2 19:08:35.209680 ignition[1252]: INFO     : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3742898252"
Oct  2 19:08:35.215342 ignition[1252]: INFO     : op(6): [started]  unmounting "/mnt/oem3742898252"
Oct  2 19:08:35.218042 systemd[1]: mnt-oem3742898252.mount: Deactivated successfully.
Oct  2 19:08:35.221696 ignition[1252]: INFO     : op(6): [finished] unmounting "/mnt/oem3742898252"
Oct  2 19:08:35.225046 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Oct  2 19:08:35.225046 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Oct  2 19:08:35.225046 ignition[1252]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 19:08:35.237969 ignition[1252]: INFO     : op(7): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811"
Oct  2 19:08:35.237969 ignition[1252]: CRITICAL : op(7): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811": device or resource busy
Oct  2 19:08:35.237969 ignition[1252]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1858116811", trying btrfs: device or resource busy
Oct  2 19:08:35.237969 ignition[1252]: INFO     : op(8): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811"
Oct  2 19:08:35.247493 ignition[1252]: INFO     : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1858116811"
Oct  2 19:08:35.247493 ignition[1252]: INFO     : op(9): [started]  unmounting "/mnt/oem1858116811"
Oct  2 19:08:35.247493 ignition[1252]: INFO     : op(9): [finished] unmounting "/mnt/oem1858116811"
Oct  2 19:08:35.247493 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Oct  2 19:08:35.243057 systemd[1]: mnt-oem1858116811.mount: Deactivated successfully.
Oct  2 19:08:35.258158 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Oct  2 19:08:35.258158 ignition[1252]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 19:08:35.270634 ignition[1252]: INFO     : op(a): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492"
Oct  2 19:08:35.272671 ignition[1252]: CRITICAL : op(a): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492": device or resource busy
Oct  2 19:08:35.272671 ignition[1252]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3706430492", trying btrfs: device or resource busy
Oct  2 19:08:35.272671 ignition[1252]: INFO     : op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492"
Oct  2 19:08:35.279622 ignition[1252]: INFO     : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3706430492"
Oct  2 19:08:35.279622 ignition[1252]: INFO     : op(c): [started]  unmounting "/mnt/oem3706430492"
Oct  2 19:08:35.279622 ignition[1252]: INFO     : op(c): [finished] unmounting "/mnt/oem3706430492"
Oct  2 19:08:35.279622 ignition[1252]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Oct  2 19:08:35.279622 ignition[1252]: INFO     : files: op(d): [started]  processing unit "coreos-metadata-sshkeys@.service"
Oct  2 19:08:35.279622 ignition[1252]: INFO     : files: op(d): [finished] processing unit "coreos-metadata-sshkeys@.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(e): [started]  processing unit "amazon-ssm-agent.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(e): op(f): [started]  writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(e): op(f): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(e): [finished] processing unit "amazon-ssm-agent.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(10): [started]  processing unit "nvidia.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(10): [finished] processing unit "nvidia.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(11): [started]  processing unit "prepare-cni-plugins.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(11): op(12): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(11): [finished] processing unit "prepare-cni-plugins.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(13): [started]  processing unit "prepare-critools.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(13): op(14): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(13): [finished] processing unit "prepare-critools.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(15): [started]  setting preset to enabled for "prepare-critools.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(15): [finished] setting preset to enabled for "prepare-critools.service"
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(16): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Oct  2 19:08:35.293395 ignition[1252]: INFO     : files: op(17): [started]  setting preset to enabled for "amazon-ssm-agent.service"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: op(18): [started]  setting preset to enabled for "nvidia.service"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: op(18): [finished] setting preset to enabled for "nvidia.service"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: op(19): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: createResultFile: createFiles: op(1a): [started]  writing file "/sysroot/etc/.ignition-result.json"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json"
Oct  2 19:08:35.336162 ignition[1252]: INFO     : files: files passed
Oct  2 19:08:35.336162 ignition[1252]: INFO     : Ignition finished successfully
Oct  2 19:08:35.349244 systemd[1]: Finished ignition-files.service.
Oct  2 19:08:35.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.364645 kernel: audit: type=1130 audit(1696273715.356:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.365554 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Oct  2 19:08:35.366864 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Oct  2 19:08:35.367738 systemd[1]: Starting ignition-quench.service...
Oct  2 19:08:35.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.373173 systemd[1]: ignition-quench.service: Deactivated successfully.
Oct  2 19:08:35.390055 kernel: audit: type=1130 audit(1696273715.376:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.390082 kernel: audit: type=1131 audit(1696273715.377:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.373437 systemd[1]: Finished ignition-quench.service.
Oct  2 19:08:35.391216 initrd-setup-root-after-ignition[1277]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Oct  2 19:08:35.391588 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Oct  2 19:08:35.409144 kernel: audit: type=1130 audit(1696273715.396:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.398014 systemd[1]: Reached target ignition-complete.target.
Oct  2 19:08:35.411133 systemd[1]: Starting initrd-parse-etc.service...
Oct  2 19:08:35.430936 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Oct  2 19:08:35.431060 systemd[1]: Finished initrd-parse-etc.service.
Oct  2 19:08:35.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.434772 systemd[1]: Reached target initrd-fs.target.
Oct  2 19:08:35.436476 systemd[1]: Reached target initrd.target.
Oct  2 19:08:35.438553 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Oct  2 19:08:35.441230 systemd[1]: Starting dracut-pre-pivot.service...
Oct  2 19:08:35.458964 systemd[1]: Finished dracut-pre-pivot.service.
Oct  2 19:08:35.461247 systemd[1]: Starting initrd-cleanup.service...
Oct  2 19:08:35.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.476914 systemd[1]: Stopped target nss-lookup.target.
Oct  2 19:08:35.477136 systemd[1]: Stopped target remote-cryptsetup.target.
Oct  2 19:08:35.482714 systemd[1]: Stopped target timers.target.
Oct  2 19:08:35.487009 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Oct  2 19:08:35.489393 systemd[1]: Stopped dracut-pre-pivot.service.
Oct  2 19:08:35.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.493370 systemd[1]: Stopped target initrd.target.
Oct  2 19:08:35.496774 systemd[1]: Stopped target basic.target.
Oct  2 19:08:35.498692 systemd[1]: Stopped target ignition-complete.target.
Oct  2 19:08:35.502826 systemd[1]: Stopped target ignition-diskful.target.
Oct  2 19:08:35.505842 systemd[1]: Stopped target initrd-root-device.target.
Oct  2 19:08:35.508624 systemd[1]: Stopped target remote-fs.target.
Oct  2 19:08:35.511755 systemd[1]: Stopped target remote-fs-pre.target.
Oct  2 19:08:35.514461 systemd[1]: Stopped target sysinit.target.
Oct  2 19:08:35.517393 systemd[1]: Stopped target local-fs.target.
Oct  2 19:08:35.519987 systemd[1]: Stopped target local-fs-pre.target.
Oct  2 19:08:35.521950 systemd[1]: Stopped target swap.target.
Oct  2 19:08:35.524739 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Oct  2 19:08:35.524986 systemd[1]: Stopped dracut-pre-mount.service.
Oct  2 19:08:35.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.528212 systemd[1]: Stopped target cryptsetup.target.
Oct  2 19:08:35.530208 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Oct  2 19:08:35.531709 systemd[1]: Stopped dracut-initqueue.service.
Oct  2 19:08:35.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.534010 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Oct  2 19:08:35.537477 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Oct  2 19:08:35.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.540389 systemd[1]: ignition-files.service: Deactivated successfully.
Oct  2 19:08:35.541679 systemd[1]: Stopped ignition-files.service.
Oct  2 19:08:35.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.547669 systemd[1]: Stopping ignition-mount.service...
Oct  2 19:08:35.554475 systemd[1]: Stopping sysroot-boot.service...
Oct  2 19:08:35.555557 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Oct  2 19:08:35.558460 systemd[1]: Stopped systemd-udev-trigger.service.
Oct  2 19:08:35.561802 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Oct  2 19:08:35.564225 systemd[1]: Stopped dracut-pre-trigger.service.
Oct  2 19:08:35.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.572153 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Oct  2 19:08:35.574037 systemd[1]: Finished initrd-cleanup.service.
Oct  2 19:08:35.578679 ignition[1290]: INFO     : Ignition 2.14.0
Oct  2 19:08:35.578679 ignition[1290]: INFO     : Stage: umount
Oct  2 19:08:35.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.583344 ignition[1290]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 19:08:35.583344 ignition[1290]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Oct  2 19:08:35.598626 ignition[1290]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Oct  2 19:08:35.600742 ignition[1290]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Oct  2 19:08:35.603286 ignition[1290]: INFO     : PUT result: OK
Oct  2 19:08:35.608278 systemd[1]: sysroot-boot.service: Deactivated successfully.
Oct  2 19:08:35.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.610435 ignition[1290]: INFO     : umount: umount passed
Oct  2 19:08:35.610435 ignition[1290]: INFO     : Ignition finished successfully
Oct  2 19:08:35.608401 systemd[1]: Stopped sysroot-boot.service.
Oct  2 19:08:35.614631 systemd[1]: ignition-mount.service: Deactivated successfully.
Oct  2 19:08:35.614722 systemd[1]: Stopped ignition-mount.service.
Oct  2 19:08:35.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.617176 systemd[1]: ignition-disks.service: Deactivated successfully.
Oct  2 19:08:35.617226 systemd[1]: Stopped ignition-disks.service.
Oct  2 19:08:35.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.626655 systemd[1]: ignition-kargs.service: Deactivated successfully.
Oct  2 19:08:35.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.626744 systemd[1]: Stopped ignition-kargs.service.
Oct  2 19:08:35.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.634324 systemd[1]: ignition-fetch.service: Deactivated successfully.
Oct  2 19:08:35.634753 systemd[1]: Stopped ignition-fetch.service.
Oct  2 19:08:35.638606 systemd[1]: Stopped target network.target.
Oct  2 19:08:35.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.640351 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Oct  2 19:08:35.646243 systemd[1]: Stopped ignition-fetch-offline.service.
Oct  2 19:08:35.653601 systemd[1]: Stopped target paths.target.
Oct  2 19:08:35.655755 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Oct  2 19:08:35.660870 systemd[1]: Stopped systemd-ask-password-console.path.
Oct  2 19:08:35.662819 systemd[1]: Stopped target slices.target.
Oct  2 19:08:35.664658 systemd[1]: Stopped target sockets.target.
Oct  2 19:08:35.666750 systemd[1]: iscsid.socket: Deactivated successfully.
Oct  2 19:08:35.666803 systemd[1]: Closed iscsid.socket.
Oct  2 19:08:35.672260 systemd[1]: iscsiuio.socket: Deactivated successfully.
Oct  2 19:08:35.672345 systemd[1]: Closed iscsiuio.socket.
Oct  2 19:08:35.675784 systemd[1]: ignition-setup.service: Deactivated successfully.
Oct  2 19:08:35.675852 systemd[1]: Stopped ignition-setup.service.
Oct  2 19:08:35.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.679697 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Oct  2 19:08:35.679761 systemd[1]: Stopped initrd-setup-root.service.
Oct  2 19:08:35.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.683315 systemd[1]: Stopping systemd-networkd.service...
Oct  2 19:08:35.684419 systemd[1]: Stopping systemd-resolved.service...
Oct  2 19:08:35.693719 systemd-networkd[1097]: eth0: DHCPv6 lease lost
Oct  2 19:08:35.697900 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 19:08:35.699721 systemd[1]: Stopped systemd-networkd.service.
Oct  2 19:08:35.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.702845 systemd[1]: systemd-resolved.service: Deactivated successfully.
Oct  2 19:08:35.704076 systemd[1]: Stopped systemd-resolved.service.
Oct  2 19:08:35.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.705000 audit: BPF prog-id=9 op=UNLOAD
Oct  2 19:08:35.706801 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Oct  2 19:08:35.706855 systemd[1]: Closed systemd-networkd.socket.
Oct  2 19:08:35.709000 audit: BPF prog-id=6 op=UNLOAD
Oct  2 19:08:35.711355 systemd[1]: Stopping network-cleanup.service...
Oct  2 19:08:35.714640 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Oct  2 19:08:35.714789 systemd[1]: Stopped parse-ip-for-networkd.service.
Oct  2 19:08:35.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.719133 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Oct  2 19:08:35.719189 systemd[1]: Stopped systemd-sysctl.service.
Oct  2 19:08:35.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.722242 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Oct  2 19:08:35.722293 systemd[1]: Stopped systemd-modules-load.service.
Oct  2 19:08:35.725261 systemd[1]: Stopping systemd-udevd.service...
Oct  2 19:08:35.744905 systemd[1]: systemd-udevd.service: Deactivated successfully.
Oct  2 19:08:35.746590 systemd[1]: Stopped systemd-udevd.service.
Oct  2 19:08:35.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.748989 systemd[1]: network-cleanup.service: Deactivated successfully.
Oct  2 19:08:35.750281 systemd[1]: Stopped network-cleanup.service.
Oct  2 19:08:35.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.752954 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Oct  2 19:08:35.752997 systemd[1]: Closed systemd-udevd-control.socket.
Oct  2 19:08:35.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.754551 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Oct  2 19:08:35.754721 systemd[1]: Closed systemd-udevd-kernel.socket.
Oct  2 19:08:35.757646 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Oct  2 19:08:35.757699 systemd[1]: Stopped dracut-pre-udev.service.
Oct  2 19:08:35.760608 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Oct  2 19:08:35.760712 systemd[1]: Stopped dracut-cmdline.service.
Oct  2 19:08:35.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.761682 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Oct  2 19:08:35.761734 systemd[1]: Stopped dracut-cmdline-ask.service.
Oct  2 19:08:35.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:35.763125 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Oct  2 19:08:35.763449 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Oct  2 19:08:35.763516 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service.
Oct  2 19:08:35.771896 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Oct  2 19:08:35.771968 systemd[1]: Stopped kmod-static-nodes.service.
Oct  2 19:08:35.776466 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Oct  2 19:08:35.776536 systemd[1]: Stopped systemd-vconsole-setup.service.
Oct  2 19:08:35.779088 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Oct  2 19:08:35.779298 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Oct  2 19:08:35.781748 systemd[1]: Reached target initrd-switch-root.target.
Oct  2 19:08:35.787828 systemd[1]: Starting initrd-switch-root.service...
Oct  2 19:08:35.810679 systemd[1]: Switching root.
Oct  2 19:08:35.840575 systemd-journald[185]: Received SIGTERM from PID 1 (systemd).
Oct  2 19:08:35.840672 systemd-journald[185]: Journal stopped
Oct  2 19:08:41.677826 kernel: SELinux:  Class mctp_socket not defined in policy.
Oct  2 19:08:41.677924 kernel: SELinux:  Class anon_inode not defined in policy.
Oct  2 19:08:41.677949 kernel: SELinux: the above unknown classes and permissions will be allowed
Oct  2 19:08:41.677973 kernel: SELinux:  policy capability network_peer_controls=1
Oct  2 19:08:41.678000 kernel: SELinux:  policy capability open_perms=1
Oct  2 19:08:41.678021 kernel: SELinux:  policy capability extended_socket_class=1
Oct  2 19:08:41.678042 kernel: SELinux:  policy capability always_check_network=0
Oct  2 19:08:41.678073 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct  2 19:08:41.678091 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct  2 19:08:41.678109 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Oct  2 19:08:41.678127 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Oct  2 19:08:41.678146 systemd[1]: Successfully loaded SELinux policy in 109.450ms.
Oct  2 19:08:41.678185 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.036ms.
Oct  2 19:08:41.678209 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 19:08:41.678229 systemd[1]: Detected virtualization amazon.
Oct  2 19:08:41.678251 systemd[1]: Detected architecture x86-64.
Oct  2 19:08:41.678269 systemd[1]: Detected first boot.
Oct  2 19:08:41.678287 systemd[1]: Initializing machine ID from VM UUID.
Oct  2 19:08:41.678305 systemd[1]: Populated /etc with preset unit settings.
Oct  2 19:08:41.678325 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:08:41.678355 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:08:41.678376 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:08:41.678398 kernel: kauditd_printk_skb: 44 callbacks suppressed
Oct  2 19:08:41.678421 kernel: audit: type=1334 audit(1696273721.300:85): prog-id=12 op=LOAD
Oct  2 19:08:41.678439 kernel: audit: type=1334 audit(1696273721.300:86): prog-id=3 op=UNLOAD
Oct  2 19:08:41.678457 kernel: audit: type=1334 audit(1696273721.301:87): prog-id=13 op=LOAD
Oct  2 19:08:41.678474 kernel: audit: type=1334 audit(1696273721.303:88): prog-id=14 op=LOAD
Oct  2 19:08:41.678491 kernel: audit: type=1334 audit(1696273721.303:89): prog-id=4 op=UNLOAD
Oct  2 19:08:41.678510 kernel: audit: type=1334 audit(1696273721.303:90): prog-id=5 op=UNLOAD
Oct  2 19:08:41.678530 kernel: audit: type=1334 audit(1696273721.308:91): prog-id=15 op=LOAD
Oct  2 19:08:41.678548 kernel: audit: type=1334 audit(1696273721.308:92): prog-id=12 op=UNLOAD
Oct  2 19:08:41.678580 kernel: audit: type=1334 audit(1696273721.309:93): prog-id=16 op=LOAD
Oct  2 19:08:41.678599 kernel: audit: type=1334 audit(1696273721.311:94): prog-id=17 op=LOAD
Oct  2 19:08:41.678618 systemd[1]: iscsiuio.service: Deactivated successfully.
Oct  2 19:08:41.678639 systemd[1]: Stopped iscsiuio.service.
Oct  2 19:08:41.678658 systemd[1]: iscsid.service: Deactivated successfully.
Oct  2 19:08:41.678679 systemd[1]: Stopped iscsid.service.
Oct  2 19:08:41.678698 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Oct  2 19:08:41.678722 systemd[1]: Stopped initrd-switch-root.service.
Oct  2 19:08:41.678741 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct  2 19:08:41.678762 systemd[1]: Created slice system-addon\x2dconfig.slice.
Oct  2 19:08:41.678783 systemd[1]: Created slice system-addon\x2drun.slice.
Oct  2 19:08:41.678803 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Oct  2 19:08:41.678823 systemd[1]: Created slice system-getty.slice.
Oct  2 19:08:41.678844 systemd[1]: Created slice system-modprobe.slice.
Oct  2 19:08:41.678865 systemd[1]: Created slice system-serial\x2dgetty.slice.
Oct  2 19:08:41.678889 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Oct  2 19:08:41.678976 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Oct  2 19:08:41.678999 systemd[1]: Created slice user.slice.
Oct  2 19:08:41.679017 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 19:08:41.679038 systemd[1]: Started systemd-ask-password-wall.path.
Oct  2 19:08:41.679057 systemd[1]: Set up automount boot.automount.
Oct  2 19:08:41.679077 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Oct  2 19:08:41.679097 systemd[1]: Stopped target initrd-switch-root.target.
Oct  2 19:08:41.679117 systemd[1]: Stopped target initrd-fs.target.
Oct  2 19:08:41.679139 systemd[1]: Stopped target initrd-root-fs.target.
Oct  2 19:08:41.679158 systemd[1]: Reached target integritysetup.target.
Oct  2 19:08:41.679177 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 19:08:41.679198 systemd[1]: Reached target remote-fs.target.
Oct  2 19:08:41.679217 systemd[1]: Reached target slices.target.
Oct  2 19:08:41.679237 systemd[1]: Reached target swap.target.
Oct  2 19:08:41.679257 systemd[1]: Reached target torcx.target.
Oct  2 19:08:41.679278 systemd[1]: Reached target veritysetup.target.
Oct  2 19:08:41.679296 systemd[1]: Listening on systemd-coredump.socket.
Oct  2 19:08:41.679319 systemd[1]: Listening on systemd-initctl.socket.
Oct  2 19:08:41.679339 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 19:08:41.679361 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 19:08:41.679380 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 19:08:41.679399 systemd[1]: Listening on systemd-userdbd.socket.
Oct  2 19:08:41.679416 systemd[1]: Mounting dev-hugepages.mount...
Oct  2 19:08:41.679433 systemd[1]: Mounting dev-mqueue.mount...
Oct  2 19:08:41.679449 systemd[1]: Mounting media.mount...
Oct  2 19:08:41.679466 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 19:08:41.679489 systemd[1]: Mounting sys-kernel-debug.mount...
Oct  2 19:08:41.679508 systemd[1]: Mounting sys-kernel-tracing.mount...
Oct  2 19:08:41.679528 systemd[1]: Mounting tmp.mount...
Oct  2 19:08:41.679549 systemd[1]: Starting flatcar-tmpfiles.service...
Oct  2 19:08:41.679581 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Oct  2 19:08:41.679598 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 19:08:41.679616 systemd[1]: Starting modprobe@configfs.service...
Oct  2 19:08:41.679633 systemd[1]: Starting modprobe@dm_mod.service...
Oct  2 19:08:41.679650 systemd[1]: Starting modprobe@drm.service...
Oct  2 19:08:41.679678 systemd[1]: Starting modprobe@efi_pstore.service...
Oct  2 19:08:41.679700 systemd[1]: Starting modprobe@fuse.service...
Oct  2 19:08:41.679720 systemd[1]: Starting modprobe@loop.service...
Oct  2 19:08:41.679740 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Oct  2 19:08:41.679761 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Oct  2 19:08:41.679784 systemd[1]: Stopped systemd-fsck-root.service.
Oct  2 19:08:41.679801 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Oct  2 19:08:41.679821 systemd[1]: Stopped systemd-fsck-usr.service.
Oct  2 19:08:41.679842 systemd[1]: Stopped systemd-journald.service.
Oct  2 19:08:41.679863 systemd[1]: Starting systemd-journald.service...
Oct  2 19:08:41.679880 systemd[1]: Starting systemd-modules-load.service...
Oct  2 19:08:41.679898 systemd[1]: Starting systemd-network-generator.service...
Oct  2 19:08:41.679915 systemd[1]: Starting systemd-remount-fs.service...
Oct  2 19:08:41.679932 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 19:08:41.679953 systemd[1]: verity-setup.service: Deactivated successfully.
Oct  2 19:08:41.679971 systemd[1]: Stopped verity-setup.service.
Oct  2 19:08:41.679991 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 19:08:41.680010 systemd[1]: Mounted dev-hugepages.mount.
Oct  2 19:08:41.680030 systemd[1]: Mounted dev-mqueue.mount.
Oct  2 19:08:41.680050 systemd[1]: Mounted media.mount.
Oct  2 19:08:41.680069 systemd[1]: Mounted sys-kernel-debug.mount.
Oct  2 19:08:41.680089 systemd[1]: Mounted sys-kernel-tracing.mount.
Oct  2 19:08:41.680107 systemd[1]: Mounted tmp.mount.
Oct  2 19:08:41.680131 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 19:08:41.680150 kernel: loop: module loaded
Oct  2 19:08:41.680169 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Oct  2 19:08:41.680189 systemd[1]: Finished modprobe@configfs.service.
Oct  2 19:08:41.680208 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Oct  2 19:08:41.680228 systemd[1]: Finished modprobe@dm_mod.service.
Oct  2 19:08:41.680248 kernel: fuse: init (API version 7.34)
Oct  2 19:08:41.680268 systemd[1]: modprobe@drm.service: Deactivated successfully.
Oct  2 19:08:41.680288 systemd[1]: Finished modprobe@drm.service.
Oct  2 19:08:41.680307 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Oct  2 19:08:41.680326 systemd[1]: Finished modprobe@efi_pstore.service.
Oct  2 19:08:41.680345 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Oct  2 19:08:41.680364 systemd[1]: Finished modprobe@fuse.service.
Oct  2 19:08:41.680383 systemd[1]: modprobe@loop.service: Deactivated successfully.
Oct  2 19:08:41.680405 systemd[1]: Finished modprobe@loop.service.
Oct  2 19:08:41.680424 systemd[1]: Finished systemd-modules-load.service.
Oct  2 19:08:41.680444 systemd[1]: Finished systemd-network-generator.service.
Oct  2 19:08:41.680464 systemd[1]: Finished systemd-remount-fs.service.
Oct  2 19:08:41.680484 systemd[1]: Reached target network-pre.target.
Oct  2 19:08:41.680506 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Oct  2 19:08:41.680530 systemd-journald[1399]: Journal started
Oct  2 19:08:41.680636 systemd-journald[1399]: Runtime Journal (/run/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc) is 4.8M, max 38.7M, 33.9M free.
Oct  2 19:08:36.541000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct  2 19:08:36.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 19:08:36.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 19:08:36.717000 audit: BPF prog-id=10 op=LOAD
Oct  2 19:08:36.717000 audit: BPF prog-id=10 op=UNLOAD
Oct  2 19:08:36.717000 audit: BPF prog-id=11 op=LOAD
Oct  2 19:08:36.717000 audit: BPF prog-id=11 op=UNLOAD
Oct  2 19:08:41.300000 audit: BPF prog-id=12 op=LOAD
Oct  2 19:08:41.300000 audit: BPF prog-id=3 op=UNLOAD
Oct  2 19:08:41.301000 audit: BPF prog-id=13 op=LOAD
Oct  2 19:08:41.303000 audit: BPF prog-id=14 op=LOAD
Oct  2 19:08:41.303000 audit: BPF prog-id=4 op=UNLOAD
Oct  2 19:08:41.303000 audit: BPF prog-id=5 op=UNLOAD
Oct  2 19:08:41.308000 audit: BPF prog-id=15 op=LOAD
Oct  2 19:08:41.308000 audit: BPF prog-id=12 op=UNLOAD
Oct  2 19:08:41.309000 audit: BPF prog-id=16 op=LOAD
Oct  2 19:08:41.311000 audit: BPF prog-id=17 op=LOAD
Oct  2 19:08:41.311000 audit: BPF prog-id=13 op=UNLOAD
Oct  2 19:08:41.311000 audit: BPF prog-id=14 op=UNLOAD
Oct  2 19:08:41.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.324000 audit: BPF prog-id=15 op=UNLOAD
Oct  2 19:08:41.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.534000 audit: BPF prog-id=18 op=LOAD
Oct  2 19:08:41.534000 audit: BPF prog-id=19 op=LOAD
Oct  2 19:08:41.534000 audit: BPF prog-id=20 op=LOAD
Oct  2 19:08:41.534000 audit: BPF prog-id=16 op=UNLOAD
Oct  2 19:08:41.534000 audit: BPF prog-id=17 op=UNLOAD
Oct  2 19:08:41.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.694533 systemd[1]: Mounting sys-kernel-config.mount...
Oct  2 19:08:41.694615 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Oct  2 19:08:41.694648 systemd[1]: Starting systemd-hwdb-update.service...
Oct  2 19:08:41.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.701030 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Oct  2 19:08:41.701070 systemd[1]: Starting systemd-random-seed.service...
Oct  2 19:08:41.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.674000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Oct  2 19:08:41.674000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe076dc2a0 a2=4000 a3=7ffe076dc33c items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:41.674000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Oct  2 19:08:36.939326 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:08:41.299337 systemd[1]: Queued start job for default target multi-user.target.
Oct  2 19:08:41.710745 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Oct  2 19:08:36.940212 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 19:08:41.315110 systemd[1]: systemd-journald.service: Deactivated successfully.
Oct  2 19:08:36.940242 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 19:08:36.940290 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Oct  2 19:08:36.940307 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="skipped missing lower profile" missing profile=oem
Oct  2 19:08:36.940353 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Oct  2 19:08:36.940381 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Oct  2 19:08:36.940807 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Oct  2 19:08:36.940881 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 19:08:36.940901 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 19:08:41.730923 systemd[1]: Starting systemd-sysctl.service...
Oct  2 19:08:41.731008 systemd[1]: Started systemd-journald.service.
Oct  2 19:08:41.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:36.941643 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Oct  2 19:08:41.721611 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Oct  2 19:08:36.941699 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Oct  2 19:08:41.723373 systemd[1]: Mounted sys-kernel-config.mount.
Oct  2 19:08:36.941729 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0
Oct  2 19:08:41.726162 systemd[1]: Starting systemd-journal-flush.service...
Oct  2 19:08:36.941755 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Oct  2 19:08:36.942186 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0
Oct  2 19:08:36.942250 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Oct  2 19:08:40.684435 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:08:40.684735 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:08:40.684847 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:08:40.685032 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:08:40.685083 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Oct  2 19:08:40.685140 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:08:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Oct  2 19:08:41.738348 systemd[1]: Finished systemd-random-seed.service.
Oct  2 19:08:41.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.739743 systemd[1]: Reached target first-boot-complete.target.
Oct  2 19:08:41.747075 systemd[1]: Finished systemd-sysctl.service.
Oct  2 19:08:41.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.774450 systemd-journald[1399]: Time spent on flushing to /var/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc is 67.561ms for 1194 entries.
Oct  2 19:08:41.774450 systemd-journald[1399]: System Journal (/var/log/journal/ec2f88bb22202d0e901cd28d8f8e00cc) is 8.0M, max 195.6M, 187.6M free.
Oct  2 19:08:41.850271 systemd-journald[1399]: Received client request to flush runtime journal.
Oct  2 19:08:41.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.791666 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 19:08:41.795452 systemd[1]: Starting systemd-udev-settle.service...
Oct  2 19:08:41.853799 udevadm[1432]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Oct  2 19:08:41.830392 systemd[1]: Finished flatcar-tmpfiles.service.
Oct  2 19:08:41.833637 systemd[1]: Starting systemd-sysusers.service...
Oct  2 19:08:41.851706 systemd[1]: Finished systemd-journal-flush.service.
Oct  2 19:08:41.959605 systemd[1]: Finished systemd-sysusers.service.
Oct  2 19:08:41.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:41.965621 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 19:08:42.062690 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 19:08:42.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:42.636485 systemd[1]: Finished systemd-hwdb-update.service.
Oct  2 19:08:42.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:42.636000 audit: BPF prog-id=21 op=LOAD
Oct  2 19:08:42.637000 audit: BPF prog-id=22 op=LOAD
Oct  2 19:08:42.637000 audit: BPF prog-id=7 op=UNLOAD
Oct  2 19:08:42.637000 audit: BPF prog-id=8 op=UNLOAD
Oct  2 19:08:42.639661 systemd[1]: Starting systemd-udevd.service...
Oct  2 19:08:42.662541 systemd-udevd[1442]: Using default interface naming scheme 'v252'.
Oct  2 19:08:42.706448 systemd[1]: Started systemd-udevd.service.
Oct  2 19:08:42.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:42.708000 audit: BPF prog-id=23 op=LOAD
Oct  2 19:08:42.711444 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:08:42.730000 audit: BPF prog-id=24 op=LOAD
Oct  2 19:08:42.730000 audit: BPF prog-id=25 op=LOAD
Oct  2 19:08:42.730000 audit: BPF prog-id=26 op=LOAD
Oct  2 19:08:42.733384 systemd[1]: Starting systemd-userdbd.service...
Oct  2 19:08:42.809340 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Oct  2 19:08:42.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:42.818568 systemd[1]: Started systemd-userdbd.service.
Oct  2 19:08:42.822249 (udev-worker)[1444]: Network interface NamePolicy= disabled on kernel command line.
Oct  2 19:08:42.916936 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3
Oct  2 19:08:42.924668 kernel: ACPI: button: Power Button [PWRF]
Oct  2 19:08:42.931586 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4
Oct  2 19:08:42.937000 audit[1445]: AVC avc:  denied  { confidentiality } for  pid=1445 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 19:08:42.937000 audit[1445]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560035c6cc70 a1=32194 a2=7f632cbc4bc5 a3=5 items=106 ppid=1442 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:42.937000 audit: CWD cwd="/"
Oct  2 19:08:42.937000 audit: PATH item=0 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=1 name=(null) inode=15439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=2 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=3 name=(null) inode=15440 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=4 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=5 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=6 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=7 name=(null) inode=15442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=8 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=9 name=(null) inode=15443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=10 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=11 name=(null) inode=15444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=12 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=13 name=(null) inode=15445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=14 name=(null) inode=15441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=15 name=(null) inode=15446 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=16 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=17 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=18 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=19 name=(null) inode=15448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=20 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=21 name=(null) inode=15449 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=22 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=23 name=(null) inode=15450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=24 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=25 name=(null) inode=15451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=26 name=(null) inode=15447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=27 name=(null) inode=15452 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=28 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=29 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=30 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=31 name=(null) inode=15454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=32 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=33 name=(null) inode=15455 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=34 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=35 name=(null) inode=15456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=36 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=37 name=(null) inode=15457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=38 name=(null) inode=15453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=39 name=(null) inode=15458 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=40 name=(null) inode=15438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=41 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=42 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=43 name=(null) inode=15460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=44 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=45 name=(null) inode=15461 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=46 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=47 name=(null) inode=15462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=48 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=49 name=(null) inode=15463 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=50 name=(null) inode=15459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=51 name=(null) inode=15464 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=53 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=54 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=55 name=(null) inode=15466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=56 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=57 name=(null) inode=15467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=58 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=59 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=60 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=61 name=(null) inode=15469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=62 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=63 name=(null) inode=15470 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=64 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=65 name=(null) inode=15471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=66 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=67 name=(null) inode=15472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=68 name=(null) inode=15468 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=69 name=(null) inode=15473 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=70 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=71 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=72 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=73 name=(null) inode=15475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=74 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=75 name=(null) inode=15476 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=76 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=77 name=(null) inode=15477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=78 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.969767 kernel: ACPI: button: Sleep Button [SLPF]
Oct  2 19:08:42.977921 systemd-networkd[1452]: lo: Link UP
Oct  2 19:08:42.977932 systemd-networkd[1452]: lo: Gained carrier
Oct  2 19:08:42.978500 systemd-networkd[1452]: Enumeration completed
Oct  2 19:08:42.978645 systemd-networkd[1452]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:08:42.937000 audit: PATH item=79 name=(null) inode=15478 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=80 name=(null) inode=15474 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=81 name=(null) inode=15479 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=82 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=83 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=84 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=85 name=(null) inode=15481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=86 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=87 name=(null) inode=15482 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=88 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=89 name=(null) inode=15483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=90 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=91 name=(null) inode=15484 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=92 name=(null) inode=15480 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:42.980332 systemd[1]: Started systemd-networkd.service.
Oct  2 19:08:42.937000 audit: PATH item=93 name=(null) inode=15485 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=94 name=(null) inode=15465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=95 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=96 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=97 name=(null) inode=15487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=98 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=99 name=(null) inode=15488 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=100 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.983689 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 19:08:42.986741 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:08:42.985946 systemd-networkd[1452]: eth0: Link UP
Oct  2 19:08:42.986098 systemd-networkd[1452]: eth0: Gained carrier
Oct  2 19:08:42.937000 audit: PATH item=101 name=(null) inode=15489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=102 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=103 name=(null) inode=15490 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=104 name=(null) inode=15486 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PATH item=105 name=(null) inode=15491 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:42.937000 audit: PROCTITLE proctitle="(udev-worker)"
Oct  2 19:08:43.001742 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5
Oct  2 19:08:43.005785 systemd-networkd[1452]: eth0: DHCPv4 address 172.31.31.246/20, gateway 172.31.16.1 acquired from 172.31.16.1
Oct  2 19:08:43.038582 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255
Oct  2 19:08:43.058582 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1457)
Oct  2 19:08:43.098583 kernel: mousedev: PS/2 mouse device common for all mice
Oct  2 19:08:43.236254 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 19:08:43.349044 systemd[1]: Finished systemd-udev-settle.service.
Oct  2 19:08:43.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.351880 systemd[1]: Starting lvm2-activation-early.service...
Oct  2 19:08:43.402094 lvm[1556]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 19:08:43.433878 systemd[1]: Finished lvm2-activation-early.service.
Oct  2 19:08:43.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.435292 systemd[1]: Reached target cryptsetup.target.
Oct  2 19:08:43.438076 systemd[1]: Starting lvm2-activation.service...
Oct  2 19:08:43.444287 lvm[1557]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 19:08:43.472978 systemd[1]: Finished lvm2-activation.service.
Oct  2 19:08:43.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.474204 systemd[1]: Reached target local-fs-pre.target.
Oct  2 19:08:43.475510 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Oct  2 19:08:43.475575 systemd[1]: Reached target local-fs.target.
Oct  2 19:08:43.476554 systemd[1]: Reached target machines.target.
Oct  2 19:08:43.479104 systemd[1]: Starting ldconfig.service...
Oct  2 19:08:43.480484 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Oct  2 19:08:43.480578 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:08:43.481859 systemd[1]: Starting systemd-boot-update.service...
Oct  2 19:08:43.484475 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Oct  2 19:08:43.487221 systemd[1]: Starting systemd-machine-id-commit.service...
Oct  2 19:08:43.488671 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Oct  2 19:08:43.488733 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Oct  2 19:08:43.489867 systemd[1]: Starting systemd-tmpfiles-setup.service...
Oct  2 19:08:43.518158 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1559 (bootctl)
Oct  2 19:08:43.520668 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Oct  2 19:08:43.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.542025 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Oct  2 19:08:43.545364 systemd-tmpfiles[1562]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Oct  2 19:08:43.556455 systemd-tmpfiles[1562]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Oct  2 19:08:43.565930 systemd-tmpfiles[1562]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Oct  2 19:08:43.681603 systemd-fsck[1567]: fsck.fat 4.2 (2021-01-31)
Oct  2 19:08:43.681603 systemd-fsck[1567]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters
Oct  2 19:08:43.684366 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Oct  2 19:08:43.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.688168 systemd[1]: Mounting boot.mount...
Oct  2 19:08:43.719972 systemd[1]: Mounted boot.mount.
Oct  2 19:08:43.751858 systemd[1]: Finished systemd-boot-update.service.
Oct  2 19:08:43.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.858134 systemd[1]: Finished systemd-tmpfiles-setup.service.
Oct  2 19:08:43.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.861872 systemd[1]: Starting audit-rules.service...
Oct  2 19:08:43.865073 systemd[1]: Starting clean-ca-certificates.service...
Oct  2 19:08:43.870000 audit: BPF prog-id=27 op=LOAD
Oct  2 19:08:43.869322 systemd[1]: Starting systemd-journal-catalog-update.service...
Oct  2 19:08:43.874334 systemd[1]: Starting systemd-resolved.service...
Oct  2 19:08:43.890000 audit: BPF prog-id=28 op=LOAD
Oct  2 19:08:43.893654 systemd[1]: Starting systemd-timesyncd.service...
Oct  2 19:08:43.899098 systemd[1]: Starting systemd-update-utmp.service...
Oct  2 19:08:43.919000 audit[1587]: SYSTEM_BOOT pid=1587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.920292 systemd[1]: Finished clean-ca-certificates.service.
Oct  2 19:08:43.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.927454 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Oct  2 19:08:43.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:43.936370 systemd[1]: Finished systemd-update-utmp.service.
Oct  2 19:08:44.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:44.011484 systemd[1]: Finished systemd-journal-catalog-update.service.
Oct  2 19:08:44.041000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Oct  2 19:08:44.041000 audit[1601]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff82187a60 a2=420 a3=0 items=0 ppid=1581 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:44.041000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Oct  2 19:08:44.043708 augenrules[1601]: No rules
Oct  2 19:08:44.044688 systemd[1]: Finished audit-rules.service.
Oct  2 19:08:44.073055 systemd[1]: Started systemd-timesyncd.service.
Oct  2 19:08:44.074616 systemd[1]: Reached target time-set.target.
Oct  2 19:08:44.104678 systemd-resolved[1584]: Positive Trust Anchors:
Oct  2 19:08:44.104701 systemd-resolved[1584]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 19:08:44.104744 systemd-resolved[1584]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 19:08:44.142484 systemd-resolved[1584]: Defaulting to hostname 'linux'.
Oct  2 19:08:44.144940 systemd[1]: Started systemd-resolved.service.
Oct  2 19:08:44.146914 systemd[1]: Reached target network.target.
Oct  2 19:08:44.147930 systemd[1]: Reached target nss-lookup.target.
Oct  2 19:08:44.181293 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Oct  2 19:08:44.182542 systemd[1]: Finished systemd-machine-id-commit.service.
Oct  2 19:08:45.451743 systemd-timesyncd[1586]: Contacted time server 74.6.168.73:123 (0.flatcar.pool.ntp.org).
Oct  2 19:08:45.451876 systemd-timesyncd[1586]: Initial clock synchronization to Mon 2023-10-02 19:08:45.451388 UTC.
Oct  2 19:08:45.452504 systemd-resolved[1584]: Clock change detected. Flushing caches.
Oct  2 19:08:45.580208 systemd-networkd[1452]: eth0: Gained IPv6LL
Oct  2 19:08:45.583081 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 19:08:45.584627 systemd[1]: Reached target network-online.target.
Oct  2 19:08:45.852124 ldconfig[1558]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Oct  2 19:08:45.859295 systemd[1]: Finished ldconfig.service.
Oct  2 19:08:45.863245 systemd[1]: Starting systemd-update-done.service...
Oct  2 19:08:45.874048 systemd[1]: Finished systemd-update-done.service.
Oct  2 19:08:45.875842 systemd[1]: Reached target sysinit.target.
Oct  2 19:08:45.877223 systemd[1]: Started motdgen.path.
Oct  2 19:08:45.879258 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Oct  2 19:08:45.881569 systemd[1]: Started logrotate.timer.
Oct  2 19:08:45.882561 systemd[1]: Started mdadm.timer.
Oct  2 19:08:45.883920 systemd[1]: Started systemd-tmpfiles-clean.timer.
Oct  2 19:08:45.885474 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Oct  2 19:08:45.885523 systemd[1]: Reached target paths.target.
Oct  2 19:08:45.887090 systemd[1]: Reached target timers.target.
Oct  2 19:08:45.888299 systemd[1]: Listening on dbus.socket.
Oct  2 19:08:45.892548 systemd[1]: Starting docker.socket...
Oct  2 19:08:45.900948 systemd[1]: Listening on sshd.socket.
Oct  2 19:08:45.903737 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:08:45.905299 systemd[1]: Listening on docker.socket.
Oct  2 19:08:45.906655 systemd[1]: Reached target sockets.target.
Oct  2 19:08:45.908378 systemd[1]: Reached target basic.target.
Oct  2 19:08:45.911205 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 19:08:45.911245 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 19:08:45.913027 systemd[1]: Started amazon-ssm-agent.service.
Oct  2 19:08:45.917059 systemd[1]: Starting containerd.service...
Oct  2 19:08:45.925289 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Oct  2 19:08:45.928118 systemd[1]: Starting dbus.service...
Oct  2 19:08:45.931392 systemd[1]: Starting enable-oem-cloudinit.service...
Oct  2 19:08:45.945888 systemd[1]: Starting extend-filesystems.service...
Oct  2 19:08:45.949561 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Oct  2 19:08:45.951933 systemd[1]: Starting motdgen.service...
Oct  2 19:08:45.956540 systemd[1]: Started nvidia.service.
Oct  2 19:08:45.962174 systemd[1]: Starting prepare-cni-plugins.service...
Oct  2 19:08:45.972201 systemd[1]: Starting prepare-critools.service...
Oct  2 19:08:45.977519 systemd[1]: Starting ssh-key-proc-cmdline.service...
Oct  2 19:08:45.982338 systemd[1]: Starting sshd-keygen.service...
Oct  2 19:08:45.991325 systemd[1]: Starting systemd-logind.service...
Oct  2 19:08:45.998668 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:08:45.998756 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Oct  2 19:08:45.999742 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Oct  2 19:08:46.009639 systemd[1]: Starting update-engine.service...
Oct  2 19:08:46.019763 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Oct  2 19:08:46.084420 jq[1627]: true
Oct  2 19:08:46.150605 tar[1630]: crictl
Oct  2 19:08:46.093422 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Oct  2 19:08:46.180064 jq[1638]: true
Oct  2 19:08:46.093906 systemd[1]: Finished ssh-key-proc-cmdline.service.
Oct  2 19:08:46.187708 jq[1616]: false
Oct  2 19:08:46.205749 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Oct  2 19:08:46.205981 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Oct  2 19:08:46.209405 tar[1629]: ./
Oct  2 19:08:46.209405 tar[1629]: ./macvlan
Oct  2 19:08:46.224390 dbus-daemon[1615]: [system] SELinux support is enabled
Oct  2 19:08:46.225003 systemd[1]: Started dbus.service.
Oct  2 19:08:46.230792 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Oct  2 19:08:46.230842 systemd[1]: Reached target system-config.target.
Oct  2 19:08:46.233284 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Oct  2 19:08:46.233313 systemd[1]: Reached target user-config.target.
Oct  2 19:08:46.260510 dbus-daemon[1615]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1452 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0")
Oct  2 19:08:46.263250 extend-filesystems[1617]: Found nvme0n1
Oct  2 19:08:46.301271 dbus-daemon[1615]: [system] Successfully activated service 'org.freedesktop.systemd1'
Oct  2 19:08:46.301663 extend-filesystems[1617]: Found nvme0n1p1
Oct  2 19:08:46.312872 extend-filesystems[1617]: Found nvme0n1p2
Oct  2 19:08:46.312872 extend-filesystems[1617]: Found nvme0n1p3
Oct  2 19:08:46.312872 extend-filesystems[1617]: Found usr
Oct  2 19:08:46.308485 systemd[1]: Starting systemd-hostnamed.service...
Oct  2 19:08:46.321344 extend-filesystems[1617]: Found nvme0n1p4
Oct  2 19:08:46.322749 extend-filesystems[1617]: Found nvme0n1p6
Oct  2 19:08:46.322749 extend-filesystems[1617]: Found nvme0n1p7
Oct  2 19:08:46.322749 extend-filesystems[1617]: Found nvme0n1p9
Oct  2 19:08:46.322749 extend-filesystems[1617]: Checking size of /dev/nvme0n1p9
Oct  2 19:08:46.358710 systemd[1]: motdgen.service: Deactivated successfully.
Oct  2 19:08:46.358957 systemd[1]: Finished motdgen.service.
Oct  2 19:08:46.414885 extend-filesystems[1617]: Resized partition /dev/nvme0n1p9
Oct  2 19:08:46.464447 amazon-ssm-agent[1612]: 2023/10/02 19:08:46 Failed to load instance info from vault. RegistrationKey does not exist.
Oct  2 19:08:46.469788 extend-filesystems[1681]: resize2fs 1.46.5 (30-Dec-2021)
Oct  2 19:08:46.471509 amazon-ssm-agent[1612]: Initializing new seelog logger
Oct  2 19:08:46.471509 amazon-ssm-agent[1612]: New Seelog Logger Creation Complete
Oct  2 19:08:46.471509 amazon-ssm-agent[1612]: 2023/10/02 19:08:46 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json.
Oct  2 19:08:46.471509 amazon-ssm-agent[1612]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json.
Oct  2 19:08:46.471509 amazon-ssm-agent[1612]: 2023/10/02 19:08:46 processing appconfig overrides
Oct  2 19:08:46.476077 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks
Oct  2 19:08:46.495472 update_engine[1626]: I1002 19:08:46.494488  1626 main.cc:92] Flatcar Update Engine starting
Oct  2 19:08:46.510050 systemd[1]: Started update-engine.service.
Oct  2 19:08:46.510628 update_engine[1626]: I1002 19:08:46.510504  1626 update_check_scheduler.cc:74] Next update check in 4m31s
Oct  2 19:08:46.513778 systemd[1]: Started locksmithd.service.
Oct  2 19:08:46.581593 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915
Oct  2 19:08:46.611841 systemd-logind[1624]: Watching system buttons on /dev/input/event1 (Power Button)
Oct  2 19:08:46.616197 systemd-logind[1624]: Watching system buttons on /dev/input/event2 (Sleep Button)
Oct  2 19:08:46.616379 systemd-logind[1624]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Oct  2 19:08:46.617139 systemd-logind[1624]: New seat seat0.
Oct  2 19:08:46.625722 extend-filesystems[1681]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required
Oct  2 19:08:46.625722 extend-filesystems[1681]: old_desc_blocks = 1, new_desc_blocks = 1
Oct  2 19:08:46.625722 extend-filesystems[1681]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long.
Oct  2 19:08:46.619782 systemd[1]: extend-filesystems.service: Deactivated successfully.
Oct  2 19:08:46.687016 extend-filesystems[1617]: Resized filesystem in /dev/nvme0n1p9
Oct  2 19:08:46.688828 bash[1682]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 19:08:46.620586 systemd[1]: Finished extend-filesystems.service.
Oct  2 19:08:46.668997 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Oct  2 19:08:46.689622 systemd[1]: Started systemd-logind.service.
Oct  2 19:08:46.714587 env[1631]: time="2023-10-02T19:08:46.714436485Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Oct  2 19:08:46.759530 tar[1629]: ./static
Oct  2 19:08:46.880602 systemd[1]: nvidia.service: Deactivated successfully.
Oct  2 19:08:46.896324 dbus-daemon[1615]: [system] Successfully activated service 'org.freedesktop.hostname1'
Oct  2 19:08:46.897833 systemd[1]: Started systemd-hostnamed.service.
Oct  2 19:08:46.900979 dbus-daemon[1615]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1662 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0")
Oct  2 19:08:46.907967 systemd[1]: Starting polkit.service...
Oct  2 19:08:46.971053 tar[1629]: ./vlan
Oct  2 19:08:46.996334 polkitd[1727]: Started polkitd version 121
Oct  2 19:08:47.006015 env[1631]: time="2023-10-02T19:08:47.005900827Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Oct  2 19:08:47.006171 env[1631]: time="2023-10-02T19:08:47.006098431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027168894Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027237366Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027694102Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027725452Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027746333Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027776868Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028203 env[1631]: time="2023-10-02T19:08:47.027918833Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:08:47.028840 env[1631]: time="2023-10-02T19:08:47.028795502Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:08:47.029155 env[1631]: time="2023-10-02T19:08:47.029126361Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:08:47.029263 env[1631]: time="2023-10-02T19:08:47.029247330Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Oct  2 19:08:47.029436 env[1631]: time="2023-10-02T19:08:47.029414849Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Oct  2 19:08:47.029559 env[1631]: time="2023-10-02T19:08:47.029542557Z" level=info msg="metadata content store policy set" policy=shared
Oct  2 19:08:47.036624 polkitd[1727]: Loading rules from directory /etc/polkit-1/rules.d
Oct  2 19:08:47.038790 polkitd[1727]: Loading rules from directory /usr/share/polkit-1/rules.d
Oct  2 19:08:47.041295 env[1631]: time="2023-10-02T19:08:47.041240558Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Oct  2 19:08:47.041504 env[1631]: time="2023-10-02T19:08:47.041481057Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Oct  2 19:08:47.041528 polkitd[1727]: Finished loading, compiling and executing 2 rules
Oct  2 19:08:47.041679 env[1631]: time="2023-10-02T19:08:47.041657965Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Oct  2 19:08:47.041935 env[1631]: time="2023-10-02T19:08:47.041901325Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042062 env[1631]: time="2023-10-02T19:08:47.042043982Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042163 env[1631]: time="2023-10-02T19:08:47.042147035Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042266 env[1631]: time="2023-10-02T19:08:47.042250798Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042373 env[1631]: time="2023-10-02T19:08:47.042357933Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042466 env[1631]: time="2023-10-02T19:08:47.042451148Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042577 env[1631]: time="2023-10-02T19:08:47.042561704Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042670 env[1631]: time="2023-10-02T19:08:47.042657294Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.042765 env[1631]: time="2023-10-02T19:08:47.042749620Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Oct  2 19:08:47.043004 env[1631]: time="2023-10-02T19:08:47.042988357Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Oct  2 19:08:47.043230 env[1631]: time="2023-10-02T19:08:47.043212302Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Oct  2 19:08:47.043367 dbus-daemon[1615]: [system] Successfully activated service 'org.freedesktop.PolicyKit1'
Oct  2 19:08:47.043571 systemd[1]: Started polkit.service.
Oct  2 19:08:47.045295 env[1631]: time="2023-10-02T19:08:47.045109444Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Oct  2 19:08:47.045295 env[1631]: time="2023-10-02T19:08:47.045220402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045295 env[1631]: time="2023-10-02T19:08:47.045245561Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Oct  2 19:08:47.045453 env[1631]: time="2023-10-02T19:08:47.045355266Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045453 env[1631]: time="2023-10-02T19:08:47.045377349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045615 env[1631]: time="2023-10-02T19:08:47.045470168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045615 env[1631]: time="2023-10-02T19:08:47.045492470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045511670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045645951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045667065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045708 env[1631]: time="2023-10-02T19:08:47.045684412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.045905 env[1631]: time="2023-10-02T19:08:47.045722568Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.045995765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046025359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046083971Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046101498Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046122484Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046153782Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046180061Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Oct  2 19:08:47.046472 env[1631]: time="2023-10-02T19:08:47.046240771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Oct  2 19:08:47.046800 env[1631]: time="2023-10-02T19:08:47.046589561Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Oct  2 19:08:47.046800 env[1631]: time="2023-10-02T19:08:47.046701499Z" level=info msg="Connect containerd service"
Oct  2 19:08:47.046800 env[1631]: time="2023-10-02T19:08:47.046765771Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Oct  2 19:08:47.048410 polkitd[1727]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Oct  2 19:08:47.057546 env[1631]: time="2023-10-02T19:08:47.057502145Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 19:08:47.057971 env[1631]: time="2023-10-02T19:08:47.057952589Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Oct  2 19:08:47.058124 env[1631]: time="2023-10-02T19:08:47.058108196Z" level=info msg=serving... address=/run/containerd/containerd.sock
Oct  2 19:08:47.058197 env[1631]: time="2023-10-02T19:08:47.058100854Z" level=info msg="Start subscribing containerd event"
Oct  2 19:08:47.058453 env[1631]: time="2023-10-02T19:08:47.058424432Z" level=info msg="Start recovering state"
Oct  2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058556554Z" level=info msg="Start event monitor"
Oct  2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058575997Z" level=info msg="Start snapshots syncer"
Oct  2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058589900Z" level=info msg="Start cni network conf syncer for default"
Oct  2 19:08:47.058735 env[1631]: time="2023-10-02T19:08:47.058599612Z" level=info msg="Start streaming server"
Oct  2 19:08:47.058640 systemd[1]: Started containerd.service.
Oct  2 19:08:47.095786 systemd-hostnamed[1662]: Hostname set to <ip-172-31-31-246> (transient)
Oct  2 19:08:47.095787 systemd-resolved[1584]: System hostname changed to 'ip-172-31-31-246'.
Oct  2 19:08:47.100112 env[1631]: time="2023-10-02T19:08:47.100069112Z" level=info msg="containerd successfully booted in 0.527865s"
Oct  2 19:08:47.167432 tar[1629]: ./portmap
Oct  2 19:08:47.344790 amazon-ssm-agent[1612]: 2023-10-02 19:08:47 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-02d003a8daa88f21f is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-02d003a8daa88f21f because no identity-based policy allows the ssm:UpdateInstanceInformation action
Oct  2 19:08:47.344790 amazon-ssm-agent[1612]:         status code: 400, request id: af99b211-606f-461c-9be6-fbd1c0bd7b5b
Oct  2 19:08:47.344790 amazon-ssm-agent[1612]: 2023-10-02 19:08:47 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period
Oct  2 19:08:47.358866 tar[1629]: ./host-local
Oct  2 19:08:47.405610 coreos-metadata[1614]: Oct 02 19:08:47.405 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Oct  2 19:08:47.408489 coreos-metadata[1614]: Oct 02 19:08:47.408 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1
Oct  2 19:08:47.409119 coreos-metadata[1614]: Oct 02 19:08:47.408 INFO Fetch successful
Oct  2 19:08:47.409119 coreos-metadata[1614]: Oct 02 19:08:47.409 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1
Oct  2 19:08:47.409894 coreos-metadata[1614]: Oct 02 19:08:47.409 INFO Fetch successful
Oct  2 19:08:47.411857 unknown[1614]: wrote ssh authorized keys file for user: core
Oct  2 19:08:47.442062 update-ssh-keys[1790]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 19:08:47.442436 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Oct  2 19:08:47.513562 tar[1629]: ./vrf
Oct  2 19:08:47.642968 tar[1629]: ./bridge
Oct  2 19:08:47.678973 systemd[1]: Finished prepare-critools.service.
Oct  2 19:08:47.723563 tar[1629]: ./tuning
Oct  2 19:08:47.780693 tar[1629]: ./firewall
Oct  2 19:08:47.867349 tar[1629]: ./host-device
Oct  2 19:08:47.938158 tar[1629]: ./sbr
Oct  2 19:08:47.992913 tar[1629]: ./loopback
Oct  2 19:08:48.044404 tar[1629]: ./dhcp
Oct  2 19:08:48.178286 tar[1629]: ./ptp
Oct  2 19:08:48.238011 tar[1629]: ./ipvlan
Oct  2 19:08:48.301489 tar[1629]: ./bandwidth
Oct  2 19:08:48.379172 systemd[1]: Finished prepare-cni-plugins.service.
Oct  2 19:08:48.459881 locksmithd[1690]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Oct  2 19:08:49.217865 sshd_keygen[1643]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Oct  2 19:08:49.242508 systemd[1]: Finished sshd-keygen.service.
Oct  2 19:08:49.245499 systemd[1]: Starting issuegen.service...
Oct  2 19:08:49.252514 systemd[1]: issuegen.service: Deactivated successfully.
Oct  2 19:08:49.252685 systemd[1]: Finished issuegen.service.
Oct  2 19:08:49.256012 systemd[1]: Starting systemd-user-sessions.service...
Oct  2 19:08:49.264964 systemd[1]: Finished systemd-user-sessions.service.
Oct  2 19:08:49.267870 systemd[1]: Started getty@tty1.service.
Oct  2 19:08:49.270764 systemd[1]: Started serial-getty@ttyS0.service.
Oct  2 19:08:49.272409 systemd[1]: Reached target getty.target.
Oct  2 19:08:49.273758 systemd[1]: Reached target multi-user.target.
Oct  2 19:08:49.277001 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Oct  2 19:08:49.286917 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Oct  2 19:08:49.287416 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Oct  2 19:08:49.288962 systemd[1]: Startup finished in 860ms (kernel) + 8.565s (initrd) + 11.707s (userspace) = 21.133s.
Oct  2 19:08:54.474533 systemd[1]: Created slice system-sshd.slice.
Oct  2 19:08:54.476740 systemd[1]: Started sshd@0-172.31.31.246:22-139.178.89.65:52408.service.
Oct  2 19:08:54.684996 sshd[1823]: Accepted publickey for core from 139.178.89.65 port 52408 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:54.688002 sshd[1823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:54.703127 systemd[1]: Created slice user-500.slice.
Oct  2 19:08:54.705344 systemd[1]: Starting user-runtime-dir@500.service...
Oct  2 19:08:54.709023 systemd-logind[1624]: New session 1 of user core.
Oct  2 19:08:54.720825 systemd[1]: Finished user-runtime-dir@500.service.
Oct  2 19:08:54.724009 systemd[1]: Starting user@500.service...
Oct  2 19:08:54.731894 (systemd)[1826]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:54.847236 systemd[1826]: Queued start job for default target default.target.
Oct  2 19:08:54.847962 systemd[1826]: Reached target paths.target.
Oct  2 19:08:54.847997 systemd[1826]: Reached target sockets.target.
Oct  2 19:08:54.848016 systemd[1826]: Reached target timers.target.
Oct  2 19:08:54.848047 systemd[1826]: Reached target basic.target.
Oct  2 19:08:54.848179 systemd[1]: Started user@500.service.
Oct  2 19:08:54.849588 systemd[1]: Started session-1.scope.
Oct  2 19:08:54.850454 systemd[1826]: Reached target default.target.
Oct  2 19:08:54.850760 systemd[1826]: Startup finished in 105ms.
Oct  2 19:08:54.997178 systemd[1]: Started sshd@1-172.31.31.246:22-139.178.89.65:52416.service.
Oct  2 19:08:55.162493 sshd[1835]: Accepted publickey for core from 139.178.89.65 port 52416 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:55.164275 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:55.169061 systemd-logind[1624]: New session 2 of user core.
Oct  2 19:08:55.169667 systemd[1]: Started session-2.scope.
Oct  2 19:08:55.313458 sshd[1835]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:55.318678 systemd[1]: sshd@1-172.31.31.246:22-139.178.89.65:52416.service: Deactivated successfully.
Oct  2 19:08:55.320885 systemd[1]: session-2.scope: Deactivated successfully.
Oct  2 19:08:55.323261 systemd-logind[1624]: Session 2 logged out. Waiting for processes to exit.
Oct  2 19:08:55.325901 systemd-logind[1624]: Removed session 2.
Oct  2 19:08:55.339416 systemd[1]: Started sshd@2-172.31.31.246:22-139.178.89.65:52432.service.
Oct  2 19:08:55.512500 sshd[1841]: Accepted publickey for core from 139.178.89.65 port 52432 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:55.513962 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:55.522308 systemd-logind[1624]: New session 3 of user core.
Oct  2 19:08:55.523592 systemd[1]: Started session-3.scope.
Oct  2 19:08:55.654219 sshd[1841]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:55.657676 systemd[1]: sshd@2-172.31.31.246:22-139.178.89.65:52432.service: Deactivated successfully.
Oct  2 19:08:55.659213 systemd[1]: session-3.scope: Deactivated successfully.
Oct  2 19:08:55.659854 systemd-logind[1624]: Session 3 logged out. Waiting for processes to exit.
Oct  2 19:08:55.660808 systemd-logind[1624]: Removed session 3.
Oct  2 19:08:55.679098 systemd[1]: Started sshd@3-172.31.31.246:22-139.178.89.65:52440.service.
Oct  2 19:08:55.836916 sshd[1847]: Accepted publickey for core from 139.178.89.65 port 52440 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:55.838509 sshd[1847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:55.844365 systemd[1]: Started session-4.scope.
Oct  2 19:08:55.845116 systemd-logind[1624]: New session 4 of user core.
Oct  2 19:08:55.972132 sshd[1847]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:55.975647 systemd[1]: sshd@3-172.31.31.246:22-139.178.89.65:52440.service: Deactivated successfully.
Oct  2 19:08:55.976571 systemd[1]: session-4.scope: Deactivated successfully.
Oct  2 19:08:55.977263 systemd-logind[1624]: Session 4 logged out. Waiting for processes to exit.
Oct  2 19:08:55.978224 systemd-logind[1624]: Removed session 4.
Oct  2 19:08:55.999485 systemd[1]: Started sshd@4-172.31.31.246:22-139.178.89.65:36702.service.
Oct  2 19:08:56.163693 sshd[1853]: Accepted publickey for core from 139.178.89.65 port 36702 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:56.165367 sshd[1853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:56.173092 systemd-logind[1624]: New session 5 of user core.
Oct  2 19:08:56.174182 systemd[1]: Started session-5.scope.
Oct  2 19:08:56.300749 sudo[1856]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Oct  2 19:08:56.301062 sudo[1856]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:08:56.309306 dbus-daemon[1615]: \xd0\xcd\xf1\xc0\u0007V:  received setenforce notice (enforcing=-2113099360)
Oct  2 19:08:56.311516 sudo[1856]: pam_unix(sudo:session): session closed for user root
Oct  2 19:08:56.335787 sshd[1853]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:56.340061 systemd[1]: sshd@4-172.31.31.246:22-139.178.89.65:36702.service: Deactivated successfully.
Oct  2 19:08:56.341157 systemd[1]: session-5.scope: Deactivated successfully.
Oct  2 19:08:56.342085 systemd-logind[1624]: Session 5 logged out. Waiting for processes to exit.
Oct  2 19:08:56.343051 systemd-logind[1624]: Removed session 5.
Oct  2 19:08:56.361716 systemd[1]: Started sshd@5-172.31.31.246:22-139.178.89.65:36710.service.
Oct  2 19:08:56.523028 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 36710 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:56.524573 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:56.530161 systemd-logind[1624]: New session 6 of user core.
Oct  2 19:08:56.530820 systemd[1]: Started session-6.scope.
Oct  2 19:08:56.638672 sudo[1864]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Oct  2 19:08:56.639364 sudo[1864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:08:56.646969 sudo[1864]: pam_unix(sudo:session): session closed for user root
Oct  2 19:08:56.654126 sudo[1863]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Oct  2 19:08:56.654476 sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:08:56.665687 systemd[1]: Stopping audit-rules.service...
Oct  2 19:08:56.666000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 19:08:56.669362 kernel: kauditd_printk_skb: 183 callbacks suppressed
Oct  2 19:08:56.669414 kernel: audit: type=1305 audit(1696273736.666:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 19:08:56.669441 auditctl[1867]: No rules
Oct  2 19:08:56.669933 systemd[1]: audit-rules.service: Deactivated successfully.
Oct  2 19:08:56.670150 systemd[1]: Stopped audit-rules.service.
Oct  2 19:08:56.673269 systemd[1]: Starting audit-rules.service...
Oct  2 19:08:56.666000 audit[1867]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee9a60f10 a2=420 a3=0 items=0 ppid=1 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:56.685340 kernel: audit: type=1300 audit(1696273736.666:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee9a60f10 a2=420 a3=0 items=0 ppid=1 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:56.685462 kernel: audit: type=1327 audit(1696273736.666:165): proctitle=2F7362696E2F617564697463746C002D44
Oct  2 19:08:56.666000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Oct  2 19:08:56.690784 kernel: audit: type=1131 audit(1696273736.668:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.700877 augenrules[1884]: No rules
Oct  2 19:08:56.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.701546 systemd[1]: Finished audit-rules.service.
Oct  2 19:08:56.708840 sudo[1863]: pam_unix(sudo:session): session closed for user root
Oct  2 19:08:56.711062 kernel: audit: type=1130 audit(1696273736.700:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.711141 kernel: audit: type=1106 audit(1696273736.707:168): pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.707000 audit[1863]: USER_END pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.707000 audit[1863]: CRED_DISP pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.719635 kernel: audit: type=1104 audit(1696273736.707:169): pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.731814 sshd[1860]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:56.732000 audit[1860]: USER_END pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.736671 systemd[1]: sshd@5-172.31.31.246:22-139.178.89.65:36710.service: Deactivated successfully.
Oct  2 19:08:56.737983 systemd[1]: session-6.scope: Deactivated successfully.
Oct  2 19:08:56.740858 systemd-logind[1624]: Session 6 logged out. Waiting for processes to exit.
Oct  2 19:08:56.742172 systemd-logind[1624]: Removed session 6.
Oct  2 19:08:56.733000 audit[1860]: CRED_DISP pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.749757 kernel: audit: type=1106 audit(1696273736.732:170): pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.749850 kernel: audit: type=1104 audit(1696273736.733:171): pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.749870 kernel: audit: type=1131 audit(1696273736.733:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.246:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.246:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.757404 systemd[1]: Started sshd@6-172.31.31.246:22-139.178.89.65:36714.service.
Oct  2 19:08:56.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.246:22-139.178.89.65:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:56.919000 audit[1890]: USER_ACCT pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.920923 sshd[1890]: Accepted publickey for core from 139.178.89.65 port 36714 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0
Oct  2 19:08:56.922000 audit[1890]: CRED_ACQ pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.922000 audit[1890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbc0748b0 a2=3 a3=0 items=0 ppid=1 pid=1890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:56.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:56.923782 sshd[1890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:56.930496 systemd[1]: Started session-7.scope.
Oct  2 19:08:56.931015 systemd-logind[1624]: New session 7 of user core.
Oct  2 19:08:56.937000 audit[1890]: USER_START pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:56.939000 audit[1893]: CRED_ACQ pid=1893 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:08:57.032000 audit[1894]: USER_ACCT pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:57.032000 audit[1894]: CRED_REFR pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:57.033741 sudo[1894]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Oct  2 19:08:57.034026 sudo[1894]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:08:57.035000 audit[1894]: USER_START pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:57.609778 systemd[1]: Reloading.
Oct  2 19:08:57.720486 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2023-10-02T19:08:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:08:57.720883 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2023-10-02T19:08:57Z" level=info msg="torcx already run"
Oct  2 19:08:57.842385 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:08:57.842408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:08:57.871370 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.018000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.019000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.019000 audit: BPF prog-id=37 op=LOAD
Oct  2 19:08:58.019000 audit: BPF prog-id=28 op=UNLOAD
Oct  2 19:08:58.020000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.020000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.020000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.020000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit: BPF prog-id=38 op=LOAD
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit: BPF prog-id=39 op=LOAD
Oct  2 19:08:58.021000 audit: BPF prog-id=21 op=UNLOAD
Oct  2 19:08:58.021000 audit: BPF prog-id=22 op=UNLOAD
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit: BPF prog-id=40 op=LOAD
Oct  2 19:08:58.021000 audit: BPF prog-id=24 op=UNLOAD
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.021000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit: BPF prog-id=41 op=LOAD
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.022000 audit: BPF prog-id=42 op=LOAD
Oct  2 19:08:58.022000 audit: BPF prog-id=25 op=UNLOAD
Oct  2 19:08:58.022000 audit: BPF prog-id=26 op=UNLOAD
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit: BPF prog-id=43 op=LOAD
Oct  2 19:08:58.025000 audit: BPF prog-id=32 op=UNLOAD
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit: BPF prog-id=44 op=LOAD
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.025000 audit: BPF prog-id=45 op=LOAD
Oct  2 19:08:58.025000 audit: BPF prog-id=33 op=UNLOAD
Oct  2 19:08:58.025000 audit: BPF prog-id=34 op=UNLOAD
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit: BPF prog-id=46 op=LOAD
Oct  2 19:08:58.027000 audit: BPF prog-id=18 op=UNLOAD
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit: BPF prog-id=47 op=LOAD
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.027000 audit: BPF prog-id=48 op=LOAD
Oct  2 19:08:58.027000 audit: BPF prog-id=19 op=UNLOAD
Oct  2 19:08:58.028000 audit: BPF prog-id=20 op=UNLOAD
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.029000 audit: BPF prog-id=49 op=LOAD
Oct  2 19:08:58.029000 audit: BPF prog-id=27 op=UNLOAD
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.031000 audit: BPF prog-id=50 op=LOAD
Oct  2 19:08:58.031000 audit: BPF prog-id=29 op=UNLOAD
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit: BPF prog-id=51 op=LOAD
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.032000 audit: BPF prog-id=52 op=LOAD
Oct  2 19:08:58.032000 audit: BPF prog-id=30 op=UNLOAD
Oct  2 19:08:58.032000 audit: BPF prog-id=31 op=UNLOAD
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.034000 audit: BPF prog-id=53 op=LOAD
Oct  2 19:08:58.034000 audit: BPF prog-id=35 op=UNLOAD
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:58.035000 audit: BPF prog-id=54 op=LOAD
Oct  2 19:08:58.035000 audit: BPF prog-id=23 op=UNLOAD
Oct  2 19:08:58.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:58.056513 systemd[1]: Started kubelet.service.
Oct  2 19:08:58.085557 systemd[1]: Starting coreos-metadata.service...
Oct  2 19:08:58.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:08:58.198485 kubelet[1976]: E1002 19:08:58.189450    1976 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml"
Oct  2 19:08:58.193480 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 19:08:58.193615 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 19:08:58.256677 coreos-metadata[1984]: Oct 02 19:08:58.256 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Oct  2 19:08:58.257556 coreos-metadata[1984]: Oct 02 19:08:58.257 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1
Oct  2 19:08:58.258188 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetch successful
Oct  2 19:08:58.258280 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1
Oct  2 19:08:58.258867 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetch successful
Oct  2 19:08:58.258937 coreos-metadata[1984]: Oct 02 19:08:58.258 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1
Oct  2 19:08:58.259496 coreos-metadata[1984]: Oct 02 19:08:58.259 INFO Fetch successful
Oct  2 19:08:58.259581 coreos-metadata[1984]: Oct 02 19:08:58.259 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1
Oct  2 19:08:58.260165 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetch successful
Oct  2 19:08:58.260348 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1
Oct  2 19:08:58.260807 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetch successful
Oct  2 19:08:58.260807 coreos-metadata[1984]: Oct 02 19:08:58.260 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1
Oct  2 19:08:58.261369 coreos-metadata[1984]: Oct 02 19:08:58.261 INFO Fetch successful
Oct  2 19:08:58.261428 coreos-metadata[1984]: Oct 02 19:08:58.261 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1
Oct  2 19:08:58.262014 coreos-metadata[1984]: Oct 02 19:08:58.261 INFO Fetch successful
Oct  2 19:08:58.262124 coreos-metadata[1984]: Oct 02 19:08:58.262 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1
Oct  2 19:08:58.262546 coreos-metadata[1984]: Oct 02 19:08:58.262 INFO Fetch successful
Oct  2 19:08:58.274147 systemd[1]: Finished coreos-metadata.service.
Oct  2 19:08:58.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:58.772050 systemd[1]: Stopped kubelet.service.
Oct  2 19:08:58.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:58.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:58.794314 systemd[1]: Reloading.
Oct  2 19:08:58.904061 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2023-10-02T19:08:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:08:58.904155 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2023-10-02T19:08:58Z" level=info msg="torcx already run"
Oct  2 19:08:59.023980 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:08:59.024003 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:08:59.062818 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.168000 audit: BPF prog-id=55 op=LOAD
Oct  2 19:08:59.168000 audit: BPF prog-id=37 op=UNLOAD
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit: BPF prog-id=56 op=LOAD
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit: BPF prog-id=57 op=LOAD
Oct  2 19:08:59.170000 audit: BPF prog-id=38 op=UNLOAD
Oct  2 19:08:59.170000 audit: BPF prog-id=39 op=UNLOAD
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.170000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit: BPF prog-id=58 op=LOAD
Oct  2 19:08:59.171000 audit: BPF prog-id=40 op=UNLOAD
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit: BPF prog-id=59 op=LOAD
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.171000 audit: BPF prog-id=60 op=LOAD
Oct  2 19:08:59.171000 audit: BPF prog-id=41 op=UNLOAD
Oct  2 19:08:59.171000 audit: BPF prog-id=42 op=UNLOAD
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit: BPF prog-id=61 op=LOAD
Oct  2 19:08:59.174000 audit: BPF prog-id=43 op=UNLOAD
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit: BPF prog-id=62 op=LOAD
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.175000 audit: BPF prog-id=63 op=LOAD
Oct  2 19:08:59.175000 audit: BPF prog-id=44 op=UNLOAD
Oct  2 19:08:59.175000 audit: BPF prog-id=45 op=UNLOAD
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.176000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit: BPF prog-id=64 op=LOAD
Oct  2 19:08:59.177000 audit: BPF prog-id=46 op=UNLOAD
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit: BPF prog-id=65 op=LOAD
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.177000 audit: BPF prog-id=66 op=LOAD
Oct  2 19:08:59.178000 audit: BPF prog-id=47 op=UNLOAD
Oct  2 19:08:59.178000 audit: BPF prog-id=48 op=UNLOAD
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.179000 audit: BPF prog-id=67 op=LOAD
Oct  2 19:08:59.180000 audit: BPF prog-id=49 op=UNLOAD
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit: BPF prog-id=68 op=LOAD
Oct  2 19:08:59.183000 audit: BPF prog-id=50 op=UNLOAD
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit: BPF prog-id=69 op=LOAD
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.183000 audit: BPF prog-id=70 op=LOAD
Oct  2 19:08:59.184000 audit: BPF prog-id=51 op=UNLOAD
Oct  2 19:08:59.184000 audit: BPF prog-id=52 op=UNLOAD
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.187000 audit: BPF prog-id=71 op=LOAD
Oct  2 19:08:59.187000 audit: BPF prog-id=53 op=UNLOAD
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.189000 audit: BPF prog-id=72 op=LOAD
Oct  2 19:08:59.189000 audit: BPF prog-id=54 op=UNLOAD
Oct  2 19:08:59.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:59.221915 systemd[1]: Started kubelet.service.
Oct  2 19:08:59.293222 kubelet[2095]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote'
Oct  2 19:08:59.293222 kubelet[2095]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:08:59.293222 kubelet[2095]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:08:59.293222 kubelet[2095]: I1002 19:08:59.286695    2095 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 19:08:59.293222 kubelet[2095]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote'
Oct  2 19:08:59.293222 kubelet[2095]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:08:59.293222 kubelet[2095]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:08:59.764807 kubelet[2095]: I1002 19:08:59.764377    2095 server.go:413] "Kubelet version" kubeletVersion="v1.25.10"
Oct  2 19:08:59.764807 kubelet[2095]: I1002 19:08:59.764415    2095 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 19:08:59.764975 kubelet[2095]: I1002 19:08:59.764869    2095 server.go:825] "Client rotation is on, will bootstrap in background"
Oct  2 19:08:59.768267 kubelet[2095]: I1002 19:08:59.768242    2095 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:08:59.773298 kubelet[2095]: I1002 19:08:59.773274    2095 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 19:08:59.773775 kubelet[2095]: I1002 19:08:59.773760    2095 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 19:08:59.773998 kubelet[2095]: I1002 19:08:59.773986    2095 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none}
Oct  2 19:08:59.774330 kubelet[2095]: I1002 19:08:59.774315    2095 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Oct  2 19:08:59.774479 kubelet[2095]: I1002 19:08:59.774469    2095 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true
Oct  2 19:08:59.774706 kubelet[2095]: I1002 19:08:59.774688    2095 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:08:59.784926 kubelet[2095]: I1002 19:08:59.784894    2095 kubelet.go:381] "Attempting to sync node with API server"
Oct  2 19:08:59.788021 kubelet[2095]: I1002 19:08:59.788004    2095 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 19:08:59.788363 kubelet[2095]: I1002 19:08:59.788348    2095 kubelet.go:281] "Adding apiserver pod source"
Oct  2 19:08:59.788557 kubelet[2095]: I1002 19:08:59.788540    2095 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 19:08:59.788676 kubelet[2095]: E1002 19:08:59.788663    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:08:59.788748 kubelet[2095]: E1002 19:08:59.788625    2095 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:08:59.789591 kubelet[2095]: I1002 19:08:59.789577    2095 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 19:08:59.790175 kubelet[2095]: W1002 19:08:59.790155    2095 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Oct  2 19:08:59.791172 kubelet[2095]: I1002 19:08:59.791148    2095 server.go:1175] "Started kubelet"
Oct  2 19:08:59.792000 audit[2095]: AVC avc:  denied  { mac_admin } for  pid=2095 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:08:59.792000 audit[2095]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da1200 a1=c000b0d6c8 a2=c000da11d0 a3=25 items=0 ppid=1 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:08:59.792000 audit[2095]: AVC avc:  denied  { mac_admin } for  pid=2095 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:08:59.792000 audit[2095]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006db840 a1=c000b0d6e0 a2=c000da1290 a3=25 items=0 ppid=1 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:08:59.793996 kubelet[2095]: I1002 19:08:59.793498    2095 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 19:08:59.793996 kubelet[2095]: I1002 19:08:59.793639    2095 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 19:08:59.793996 kubelet[2095]: I1002 19:08:59.793723    2095 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 19:08:59.810492 kubelet[2095]: I1002 19:08:59.810206    2095 server.go:155] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 19:08:59.811190 kubelet[2095]: I1002 19:08:59.811171    2095 server.go:438] "Adding debug handlers to kubelet server"
Oct  2 19:08:59.815132 kubelet[2095]: I1002 19:08:59.813686    2095 volume_manager.go:293] "Starting Kubelet Volume Manager"
Oct  2 19:08:59.819067 kubelet[2095]: I1002 19:08:59.816101    2095 desired_state_of_world_populator.go:149] "Desired state populator starts to run"
Oct  2 19:08:59.821363 kubelet[2095]: E1002 19:08:59.819686    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaa612be8e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 791122062, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 791122062, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.822040 kubelet[2095]: E1002 19:08:59.822016    2095 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 19:08:59.822520 kubelet[2095]: E1002 19:08:59.822506    2095 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 19:08:59.825246 kubelet[2095]: E1002 19:08:59.825226    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:08:59.827092 kubelet[2095]: W1002 19:08:59.826344    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:08:59.827092 kubelet[2095]: E1002 19:08:59.826373    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:08:59.827092 kubelet[2095]: W1002 19:08:59.826416    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:08:59.827092 kubelet[2095]: E1002 19:08:59.826428    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:08:59.831418 kubelet[2095]: E1002 19:08:59.831285    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaa7f16eb7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 822493367, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 822493367, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.831745 kubelet[2095]: E1002 19:08:59.831714    2095 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Oct  2 19:08:59.849083 kubelet[2095]: W1002 19:08:59.842869    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:08:59.849083 kubelet[2095]: E1002 19:08:59.842904    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:08:59.854000 audit[2107]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.854000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9b3bcb70 a2=0 a3=7fff9b3bcb5c items=0 ppid=2095 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 19:08:59.857000 audit[2114]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.857000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff039ea490 a2=0 a3=7fff039ea47c items=0 ppid=2095 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 19:08:59.859432 kubelet[2095]: E1002 19:08:59.859334    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.859678 kubelet[2095]: I1002 19:08:59.859645    2095 cpu_manager.go:213] "Starting CPU manager" policy="none"
Oct  2 19:08:59.859678 kubelet[2095]: I1002 19:08:59.859672    2095 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s"
Oct  2 19:08:59.859775 kubelet[2095]: I1002 19:08:59.859690    2095 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:08:59.861241 kubelet[2095]: E1002 19:08:59.861161    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.862759 kubelet[2095]: I1002 19:08:59.862729    2095 policy_none.go:49] "None policy: Start"
Oct  2 19:08:59.863512 kubelet[2095]: I1002 19:08:59.863479    2095 memory_manager.go:168] "Starting memorymanager" policy="None"
Oct  2 19:08:59.863512 kubelet[2095]: I1002 19:08:59.863514    2095 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 19:08:59.863848 kubelet[2095]: E1002 19:08:59.863771    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.875942 systemd[1]: Created slice kubepods.slice.
Oct  2 19:08:59.889607 systemd[1]: Created slice kubepods-besteffort.slice.
Oct  2 19:08:59.863000 audit[2117]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.863000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffca4512e0 a2=0 a3=7fffca4512cc items=0 ppid=2095 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:08:59.896000 audit[2122]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.896000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed74f25e0 a2=0 a3=7ffed74f25cc items=0 ppid=2095 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:08:59.900194 systemd[1]: Created slice kubepods-burstable.slice.
Oct  2 19:08:59.904316 kubelet[2095]: I1002 19:08:59.904294    2095 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 19:08:59.904000 audit[2095]: AVC avc:  denied  { mac_admin } for  pid=2095 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:59.904000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:08:59.904000 audit[2095]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f4b1a0 a1=c000b0dad0 a2=c000f4b170 a3=25 items=0 ppid=1 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.904000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:08:59.905904 kubelet[2095]: I1002 19:08:59.905890    2095 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 19:08:59.906159 kubelet[2095]: I1002 19:08:59.906148    2095 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 19:08:59.907933 kubelet[2095]: E1002 19:08:59.907918    2095 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.246\" not found"
Oct  2 19:08:59.911096 kubelet[2095]: E1002 19:08:59.910918    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaad22977d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 909601149, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 909601149, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.916437 kubelet[2095]: E1002 19:08:59.916415    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:08:59.917182 kubelet[2095]: I1002 19:08:59.917166    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:08:59.918705 kubelet[2095]: E1002 19:08:59.918691    2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246"
Oct  2 19:08:59.919381 kubelet[2095]: E1002 19:08:59.919308    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 917116008, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.920485 kubelet[2095]: E1002 19:08:59.920419    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 917131726, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.921411 kubelet[2095]: E1002 19:08:59.921352    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 917136640, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:08:59.982000 audit[2128]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.982000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd9bf11cf0 a2=0 a3=7ffd9bf11cdc items=0 ppid=2095 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Oct  2 19:08:59.984000 audit[2129]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.984000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc70a324e0 a2=0 a3=7ffc70a324cc items=0 ppid=2095 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Oct  2 19:08:59.991000 audit[2132]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.991000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc5c326270 a2=0 a3=7ffc5c32625c items=0 ppid=2095 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Oct  2 19:08:59.996000 audit[2135]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.996000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc2bc3bc90 a2=0 a3=7ffc2bc3bc7c items=0 ppid=2095 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Oct  2 19:08:59.998000 audit[2136]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.998000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeebc13cb0 a2=0 a3=7ffeebc13c9c items=0 ppid=2095 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Oct  2 19:08:59.999000 audit[2137]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:08:59.999000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffee96ce80 a2=0 a3=7fffee96ce6c items=0 ppid=2095 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:59.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 19:09:00.002000 audit[2139]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.002000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd7f1aba0 a2=0 a3=7ffdd7f1ab8c items=0 ppid=2095 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Oct  2 19:09:00.022780 kubelet[2095]: E1002 19:09:00.017307    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.005000 audit[2141]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.005000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe78068570 a2=0 a3=7ffe7806855c items=0 ppid=2095 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 19:09:00.034149 kubelet[2095]: E1002 19:09:00.034116    2095 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Oct  2 19:09:00.034000 audit[2144]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.034000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd742f7d50 a2=0 a3=7ffd742f7d3c items=0 ppid=2095 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Oct  2 19:09:00.047000 audit[2146]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.047000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fffc560ef30 a2=0 a3=7fffc560ef1c items=0 ppid=2095 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Oct  2 19:09:00.068000 audit[2149]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.068000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffcf7bc5980 a2=0 a3=7ffcf7bc596c items=0 ppid=2095 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Oct  2 19:09:00.071298 kubelet[2095]: I1002 19:09:00.071268    2095 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Oct  2 19:09:00.074000 audit[2151]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.074000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd36a36bd0 a2=0 a3=7ffd36a36bbc items=0 ppid=2095 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.074000 audit[2150]: NETFILTER_CFG table=mangle:18 family=10 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.074000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd67ab9930 a2=0 a3=7ffd67ab991c items=0 ppid=2095 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 19:09:00.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 19:09:00.080000 audit[2152]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.080000 audit[2153]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.080000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe428ca9c0 a2=0 a3=7ffe428ca9ac items=0 ppid=2095 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 19:09:00.080000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff257bc4e0 a2=0 a3=7fff257bc4cc items=0 ppid=2095 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Oct  2 19:09:00.086000 audit[2154]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:00.086000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4de9d560 a2=0 a3=7ffd4de9d54c items=0 ppid=2095 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 19:09:00.092000 audit[2156]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.092000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd2ba5d40 a2=0 a3=7ffdd2ba5d2c items=0 ppid=2095 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Oct  2 19:09:00.096000 audit[2157]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.096000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff94a542a0 a2=0 a3=7fff94a5428c items=0 ppid=2095 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 19:09:00.101000 audit[2159]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.101000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc1beaadc0 a2=0 a3=7ffc1beaadac items=0 ppid=2095 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Oct  2 19:09:00.103000 audit[2160]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.103000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff67a02270 a2=0 a3=7fff67a0225c items=0 ppid=2095 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Oct  2 19:09:00.104000 audit[2161]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.104000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca17c1a60 a2=0 a3=7ffca17c1a4c items=0 ppid=2095 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 19:09:00.108000 audit[2163]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.108000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe4a27fd00 a2=0 a3=7ffe4a27fcec items=0 ppid=2095 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Oct  2 19:09:00.111000 audit[2165]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.111000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee75cafa0 a2=0 a3=7ffee75caf8c items=0 ppid=2095 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 19:09:00.116000 audit[2167]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.116000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffdbbe07b30 a2=0 a3=7ffdbbe07b1c items=0 ppid=2095 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Oct  2 19:09:00.120167 kubelet[2095]: I1002 19:09:00.120130    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:09:00.121674 kubelet[2095]: E1002 19:09:00.121646    2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246"
Oct  2 19:09:00.122247 kubelet[2095]: E1002 19:09:00.122151    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 120083394, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:00.121000 audit[2169]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.121000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffef662c2d0 a2=0 a3=7ffef662c2bc items=0 ppid=2095 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Oct  2 19:09:00.123365 kubelet[2095]: E1002 19:09:00.123344    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.123902 kubelet[2095]: E1002 19:09:00.123811    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 120090914, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:00.126000 audit[2171]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.126000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd27fee600 a2=0 a3=7ffd27fee5ec items=0 ppid=2095 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Oct  2 19:09:00.127794 kubelet[2095]: I1002 19:09:00.127769    2095 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Oct  2 19:09:00.127794 kubelet[2095]: I1002 19:09:00.127801    2095 status_manager.go:161] "Starting to sync pod status with apiserver"
Oct  2 19:09:00.127917 kubelet[2095]: I1002 19:09:00.127824    2095 kubelet.go:2010] "Starting kubelet main sync loop"
Oct  2 19:09:00.127917 kubelet[2095]: E1002 19:09:00.127874    2095 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Oct  2 19:09:00.128000 audit[2172]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.128000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa5c28080 a2=0 a3=7fffa5c2806c items=0 ppid=2095 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 19:09:00.130163 kubelet[2095]: W1002 19:09:00.130142    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:00.130325 kubelet[2095]: E1002 19:09:00.130275    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:00.130000 audit[2173]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.130000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d088190 a2=0 a3=7ffd0d08817c items=0 ppid=2095 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 19:09:00.131000 audit[2174]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:00.131000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc860b0ca0 a2=0 a3=7ffc860b0c8c items=0 ppid=2095 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:00.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 19:09:00.203057 kubelet[2095]: E1002 19:09:00.202934    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 120095593, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:00.223858 kubelet[2095]: E1002 19:09:00.223824    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.324250 kubelet[2095]: E1002 19:09:00.324097    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.424575 kubelet[2095]: E1002 19:09:00.424530    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.436257 kubelet[2095]: E1002 19:09:00.436216    2095 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Oct  2 19:09:00.523473 kubelet[2095]: I1002 19:09:00.523404    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:09:00.525503 kubelet[2095]: E1002 19:09:00.525473    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.525804 kubelet[2095]: E1002 19:09:00.525786    2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246"
Oct  2 19:09:00.525983 kubelet[2095]: E1002 19:09:00.525779    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 523347782, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:00.593697 kubelet[2095]: E1002 19:09:00.593526    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 523363177, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:00.626148 kubelet[2095]: E1002 19:09:00.626096    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.726801 kubelet[2095]: E1002 19:09:00.726759    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.743284 kubelet[2095]: W1002 19:09:00.743241    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:09:00.743284 kubelet[2095]: E1002 19:09:00.743283    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:09:00.770832 kubelet[2095]: W1002 19:09:00.770805    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:09:00.770832 kubelet[2095]: E1002 19:09:00.770838    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:09:00.789006 kubelet[2095]: E1002 19:09:00.788959    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:00.793805 kubelet[2095]: E1002 19:09:00.793568    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 0, 523367532, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:00.826913 kubelet[2095]: E1002 19:09:00.826840    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:00.865598 kubelet[2095]: W1002 19:09:00.865491    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:09:00.865598 kubelet[2095]: E1002 19:09:00.865533    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:09:00.927157 kubelet[2095]: E1002 19:09:00.927113    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.027875 kubelet[2095]: E1002 19:09:01.027824    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.128973 kubelet[2095]: E1002 19:09:01.128854    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.229307 kubelet[2095]: E1002 19:09:01.229259    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.238565 kubelet[2095]: E1002 19:09:01.238521    2095 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Oct  2 19:09:01.327232 kubelet[2095]: I1002 19:09:01.327193    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:09:01.329179 kubelet[2095]: E1002 19:09:01.329148    2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246"
Oct  2 19:09:01.329336 kubelet[2095]: E1002 19:09:01.329142    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 1, 327140921, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:01.329517 kubelet[2095]: E1002 19:09:01.329496    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.330967 kubelet[2095]: E1002 19:09:01.330885    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 1, 327154877, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:01.394556 kubelet[2095]: E1002 19:09:01.394386    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 1, 327158921, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:01.430334 kubelet[2095]: E1002 19:09:01.430265    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.531053 kubelet[2095]: E1002 19:09:01.530990    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.631763 kubelet[2095]: E1002 19:09:01.631711    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.651431 kubelet[2095]: W1002 19:09:01.651317    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:01.651431 kubelet[2095]: E1002 19:09:01.651361    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:01.732894 kubelet[2095]: E1002 19:09:01.732843    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.789330 kubelet[2095]: E1002 19:09:01.789278    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:01.832993 kubelet[2095]: E1002 19:09:01.832955    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:01.934148 kubelet[2095]: E1002 19:09:01.934020    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.034789 kubelet[2095]: E1002 19:09:02.034728    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.135749 kubelet[2095]: E1002 19:09:02.135702    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.236211 kubelet[2095]: E1002 19:09:02.236092    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.336985 kubelet[2095]: E1002 19:09:02.336933    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.406487 kubelet[2095]: W1002 19:09:02.406445    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:09:02.406487 kubelet[2095]: E1002 19:09:02.406487    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:09:02.437975 kubelet[2095]: E1002 19:09:02.437920    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.538691 kubelet[2095]: E1002 19:09:02.538587    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.638726 kubelet[2095]: E1002 19:09:02.638671    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.739548 kubelet[2095]: E1002 19:09:02.739502    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.790226 kubelet[2095]: E1002 19:09:02.790116    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:02.839658 kubelet[2095]: E1002 19:09:02.839616    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:02.841426 kubelet[2095]: E1002 19:09:02.841377    2095 controller.go:144] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Oct  2 19:09:02.931190 kubelet[2095]: I1002 19:09:02.931147    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:09:02.933007 kubelet[2095]: E1002 19:09:02.932980    2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246"
Oct  2 19:09:02.933208 kubelet[2095]: E1002 19:09:02.932975    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 931093740, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:02.935090 kubelet[2095]: E1002 19:09:02.934997    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 931108955, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:02.936466 kubelet[2095]: E1002 19:09:02.936382    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 931113071, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:02.941129 kubelet[2095]: E1002 19:09:02.941084    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.041883 kubelet[2095]: E1002 19:09:03.041711    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.142626 kubelet[2095]: E1002 19:09:03.142511    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.243285 kubelet[2095]: E1002 19:09:03.243237    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.340546 kubelet[2095]: W1002 19:09:03.340280    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:09:03.340546 kubelet[2095]: E1002 19:09:03.340404    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:09:03.344282 kubelet[2095]: E1002 19:09:03.344234    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.445073 kubelet[2095]: E1002 19:09:03.444902    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.531277 kubelet[2095]: W1002 19:09:03.531233    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:09:03.531277 kubelet[2095]: E1002 19:09:03.531280    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:09:03.545727 kubelet[2095]: E1002 19:09:03.545677    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.611723 kubelet[2095]: W1002 19:09:03.611610    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:03.611723 kubelet[2095]: E1002 19:09:03.611654    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:03.646077 kubelet[2095]: E1002 19:09:03.646024    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.746659 kubelet[2095]: E1002 19:09:03.746619    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.791307 kubelet[2095]: E1002 19:09:03.791126    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:03.847144 kubelet[2095]: E1002 19:09:03.847043    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:03.947648 kubelet[2095]: E1002 19:09:03.947528    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.048561 kubelet[2095]: E1002 19:09:04.048422    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.148859 kubelet[2095]: E1002 19:09:04.148820    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.249886 kubelet[2095]: E1002 19:09:04.249766    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.350402 kubelet[2095]: E1002 19:09:04.350355    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.451225 kubelet[2095]: E1002 19:09:04.451178    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.552125 kubelet[2095]: E1002 19:09:04.552004    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.652869 kubelet[2095]: E1002 19:09:04.652822    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.753915 kubelet[2095]: E1002 19:09:04.753864    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.791810 kubelet[2095]: E1002 19:09:04.791770    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:04.854930 kubelet[2095]: E1002 19:09:04.854823    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:04.907572 kubelet[2095]: E1002 19:09:04.907542    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:09:04.955740 kubelet[2095]: E1002 19:09:04.955692    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.056690 kubelet[2095]: E1002 19:09:05.056598    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.157760 kubelet[2095]: E1002 19:09:05.156771    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.257672 kubelet[2095]: E1002 19:09:05.257612    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.358610 kubelet[2095]: E1002 19:09:05.358466    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.459293 kubelet[2095]: E1002 19:09:05.459175    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.559922 kubelet[2095]: E1002 19:09:05.559871    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.660585 kubelet[2095]: E1002 19:09:05.660538    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.761373 kubelet[2095]: E1002 19:09:05.761266    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.792855 kubelet[2095]: E1002 19:09:05.792812    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:05.862182 kubelet[2095]: E1002 19:09:05.862070    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:05.963003 kubelet[2095]: E1002 19:09:05.962961    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.044060 kubelet[2095]: E1002 19:09:06.043941    2095 controller.go:144] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "172.31.31.246" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease"
Oct  2 19:09:06.063295 kubelet[2095]: E1002 19:09:06.063254    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.135474 kubelet[2095]: I1002 19:09:06.135443    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:09:06.138598 kubelet[2095]: E1002 19:09:06.138568    2095 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.31.246"
Oct  2 19:09:06.138746 kubelet[2095]: E1002 19:09:06.138533    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa083161", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.31.246 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857539425, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 135409891, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa083161" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:06.140848 kubelet[2095]: E1002 19:09:06.140482    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09e6b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.31.246 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857651379, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 135415863, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09e6b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:06.142286 kubelet[2095]: E1002 19:09:06.141599    2095 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246.178a5ffaaa09faa8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.31.246", UID:"172.31.31.246", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.31.246 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.31.246"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 59, 857656488, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 135418572, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.31.246.178a5ffaaa09faa8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Oct  2 19:09:06.164058 kubelet[2095]: E1002 19:09:06.164002    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.264691 kubelet[2095]: E1002 19:09:06.264645    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.365808 kubelet[2095]: E1002 19:09:06.365624    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.466393 kubelet[2095]: E1002 19:09:06.466344    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.567211 kubelet[2095]: E1002 19:09:06.567167    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.667979 kubelet[2095]: E1002 19:09:06.667791    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.768482 kubelet[2095]: E1002 19:09:06.768432    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.793743 kubelet[2095]: E1002 19:09:06.793652    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:06.869221 kubelet[2095]: E1002 19:09:06.869178    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:06.970213 kubelet[2095]: E1002 19:09:06.970099    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.070783 kubelet[2095]: E1002 19:09:07.070736    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.171372 kubelet[2095]: E1002 19:09:07.171216    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.272582 kubelet[2095]: E1002 19:09:07.272465    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.373166 kubelet[2095]: E1002 19:09:07.373114    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.473819 kubelet[2095]: E1002 19:09:07.473778    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.546642 kubelet[2095]: W1002 19:09:07.546537    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:09:07.546642 kubelet[2095]: E1002 19:09:07.546574    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.31.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Oct  2 19:09:07.574865 kubelet[2095]: E1002 19:09:07.574816    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.675485 kubelet[2095]: E1002 19:09:07.675443    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.776366 kubelet[2095]: E1002 19:09:07.776319    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.794641 kubelet[2095]: E1002 19:09:07.794513    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:07.876947 kubelet[2095]: E1002 19:09:07.876824    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:07.977842 kubelet[2095]: E1002 19:09:07.977789    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.067447 kubelet[2095]: W1002 19:09:08.067416    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:09:08.067447 kubelet[2095]: E1002 19:09:08.067449    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Oct  2 19:09:08.078771 kubelet[2095]: E1002 19:09:08.078719    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.179989 kubelet[2095]: E1002 19:09:08.179782    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.181198 kubelet[2095]: W1002 19:09:08.181171    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:09:08.181198 kubelet[2095]: E1002 19:09:08.181205    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Oct  2 19:09:08.280467 kubelet[2095]: E1002 19:09:08.280417    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.381154 kubelet[2095]: E1002 19:09:08.381102    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.481850 kubelet[2095]: E1002 19:09:08.481742    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.582548 kubelet[2095]: E1002 19:09:08.582496    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.683128 kubelet[2095]: E1002 19:09:08.683086    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.784149 kubelet[2095]: E1002 19:09:08.784021    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.795280 kubelet[2095]: E1002 19:09:08.795236    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:08.884715 kubelet[2095]: E1002 19:09:08.884671    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:08.985871 kubelet[2095]: E1002 19:09:08.985800    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.086753 kubelet[2095]: E1002 19:09:09.086639    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.186949 kubelet[2095]: E1002 19:09:09.186904    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.288048 kubelet[2095]: E1002 19:09:09.287988    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.388913 kubelet[2095]: E1002 19:09:09.388803    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.489518 kubelet[2095]: E1002 19:09:09.489473    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.590278 kubelet[2095]: E1002 19:09:09.590181    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.681871 kubelet[2095]: W1002 19:09:09.681767    2095 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:09.681871 kubelet[2095]: E1002 19:09:09.681808    2095 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Oct  2 19:09:09.690916 kubelet[2095]: E1002 19:09:09.690873    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.767346 kubelet[2095]: I1002 19:09:09.767304    2095 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials"
Oct  2 19:09:09.791759 kubelet[2095]: E1002 19:09:09.791711    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.795935 kubelet[2095]: E1002 19:09:09.795896    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:09.892802 kubelet[2095]: E1002 19:09:09.892753    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:09.908053 kubelet[2095]: E1002 19:09:09.907984    2095 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.246\" not found"
Oct  2 19:09:09.908611 kubelet[2095]: E1002 19:09:09.908574    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:09:09.993317 kubelet[2095]: E1002 19:09:09.993150    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.093800 kubelet[2095]: E1002 19:09:10.093763    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.194792 kubelet[2095]: E1002 19:09:10.194751    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.195297 kubelet[2095]: E1002 19:09:10.195267    2095 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.31.246" not found
Oct  2 19:09:10.295342 kubelet[2095]: E1002 19:09:10.295133    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.395761 kubelet[2095]: E1002 19:09:10.395715    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.496657 kubelet[2095]: E1002 19:09:10.496580    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.597567 kubelet[2095]: E1002 19:09:10.597449    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.698453 kubelet[2095]: E1002 19:09:10.698409    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.796394 kubelet[2095]: E1002 19:09:10.796339    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:10.798576 kubelet[2095]: E1002 19:09:10.798537    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:10.899392 kubelet[2095]: E1002 19:09:10.899280    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.000267 kubelet[2095]: E1002 19:09:11.000190    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.100876 kubelet[2095]: E1002 19:09:11.100832    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.201521 kubelet[2095]: E1002 19:09:11.201406    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.283811 kubelet[2095]: E1002 19:09:11.283722    2095 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.31.246" not found
Oct  2 19:09:11.302115 kubelet[2095]: E1002 19:09:11.302070    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.402847 kubelet[2095]: E1002 19:09:11.402798    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.504019 kubelet[2095]: E1002 19:09:11.503846    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.604650 kubelet[2095]: E1002 19:09:11.604601    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.705581 kubelet[2095]: E1002 19:09:11.705538    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.797359 kubelet[2095]: E1002 19:09:11.797250    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:11.806548 kubelet[2095]: E1002 19:09:11.806501    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:11.907333 kubelet[2095]: E1002 19:09:11.907221    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.008272 kubelet[2095]: E1002 19:09:12.008225    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.109478 kubelet[2095]: E1002 19:09:12.109330    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.210144 kubelet[2095]: E1002 19:09:12.210104    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.310485 kubelet[2095]: E1002 19:09:12.310439    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.411283 kubelet[2095]: E1002 19:09:12.411167    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.458008 kubelet[2095]: E1002 19:09:12.457940    2095 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.31.246\" not found" node="172.31.31.246"
Oct  2 19:09:12.511545 kubelet[2095]: E1002 19:09:12.511504    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.539606 kubelet[2095]: I1002 19:09:12.539572    2095 kubelet_node_status.go:70] "Attempting to register node" node="172.31.31.246"
Oct  2 19:09:12.612487 kubelet[2095]: E1002 19:09:12.612392    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.687758 kubelet[2095]: I1002 19:09:12.687579    2095 kubelet_node_status.go:73] "Successfully registered node" node="172.31.31.246"
Oct  2 19:09:12.713567 kubelet[2095]: E1002 19:09:12.713524    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.764156 sudo[1894]: pam_unix(sudo:session): session closed for user root
Oct  2 19:09:12.767326 kernel: kauditd_printk_skb: 540 callbacks suppressed
Oct  2 19:09:12.767381 kernel: audit: type=1106 audit(1696273752.763:636): pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:12.763000 audit[1894]: USER_END pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:12.763000 audit[1894]: CRED_DISP pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:12.780104 kernel: audit: type=1104 audit(1696273752.763:637): pid=1894 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:12.787547 sshd[1890]: pam_unix(sshd:session): session closed for user core
Oct  2 19:09:12.788000 audit[1890]: USER_END pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:09:12.793302 systemd[1]: sshd@6-172.31.31.246:22-139.178.89.65:36714.service: Deactivated successfully.
Oct  2 19:09:12.794393 systemd[1]: session-7.scope: Deactivated successfully.
Oct  2 19:09:12.798971 kubelet[2095]: E1002 19:09:12.798617    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:12.799412 systemd-logind[1624]: Session 7 logged out. Waiting for processes to exit.
Oct  2 19:09:12.801506 kernel: audit: type=1106 audit(1696273752.788:638): pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:09:12.801585 kernel: audit: type=1104 audit(1696273752.789:639): pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:09:12.789000 audit[1890]: CRED_DISP pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 19:09:12.801086 systemd-logind[1624]: Removed session 7.
Oct  2 19:09:12.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.246:22-139.178.89.65:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:12.813145 kernel: audit: type=1131 audit(1696273752.789:640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.246:22-139.178.89.65:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:12.814413 kubelet[2095]: E1002 19:09:12.814383    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:12.914562 kubelet[2095]: E1002 19:09:12.914511    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.015612 kubelet[2095]: E1002 19:09:13.015487    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.115631 kubelet[2095]: E1002 19:09:13.115576    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.215742 kubelet[2095]: E1002 19:09:13.215687    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.316653 kubelet[2095]: E1002 19:09:13.316252    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.416765 kubelet[2095]: E1002 19:09:13.416714    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.517222 kubelet[2095]: E1002 19:09:13.517181    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.617864 kubelet[2095]: E1002 19:09:13.617745    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.718301 kubelet[2095]: E1002 19:09:13.718257    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.799988 kubelet[2095]: E1002 19:09:13.799888    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:13.818631 kubelet[2095]: E1002 19:09:13.818584    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:13.919452 kubelet[2095]: E1002 19:09:13.919351    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.020136 kubelet[2095]: E1002 19:09:14.020091    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.120932 kubelet[2095]: E1002 19:09:14.120885    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.221110 kubelet[2095]: E1002 19:09:14.220979    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.322138 kubelet[2095]: E1002 19:09:14.322090    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.422863 kubelet[2095]: E1002 19:09:14.422820    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.523496 kubelet[2095]: E1002 19:09:14.523387    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.624105 kubelet[2095]: E1002 19:09:14.624059    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.724857 kubelet[2095]: E1002 19:09:14.724808    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.800524 kubelet[2095]: E1002 19:09:14.800403    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:14.825570 kubelet[2095]: E1002 19:09:14.825525    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:14.909255 kubelet[2095]: E1002 19:09:14.909225    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:09:14.925986 kubelet[2095]: E1002 19:09:14.925939    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.026726 kubelet[2095]: E1002 19:09:15.026681    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.127387 kubelet[2095]: E1002 19:09:15.127342    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.228332 kubelet[2095]: E1002 19:09:15.228287    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.329265 kubelet[2095]: E1002 19:09:15.329219    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.429813 kubelet[2095]: E1002 19:09:15.429704    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.530134 kubelet[2095]: E1002 19:09:15.530087    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.630654 kubelet[2095]: E1002 19:09:15.630611    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.731287 kubelet[2095]: E1002 19:09:15.731179    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.801137 kubelet[2095]: E1002 19:09:15.801052    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:15.831597 kubelet[2095]: E1002 19:09:15.831555    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:15.932345 kubelet[2095]: E1002 19:09:15.932301    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.033060 kubelet[2095]: E1002 19:09:16.032938    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.133810 kubelet[2095]: E1002 19:09:16.133763    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.234598 kubelet[2095]: E1002 19:09:16.234551    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.335612 kubelet[2095]: E1002 19:09:16.335505    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.436566 kubelet[2095]: E1002 19:09:16.436523    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.537043 kubelet[2095]: E1002 19:09:16.536991    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.637543 kubelet[2095]: E1002 19:09:16.637507    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.738140 kubelet[2095]: E1002 19:09:16.738083    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.801681 kubelet[2095]: E1002 19:09:16.801644    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:16.839244 kubelet[2095]: E1002 19:09:16.839205    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:16.940125 kubelet[2095]: E1002 19:09:16.939937    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.040748 kubelet[2095]: E1002 19:09:17.040694    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.126714 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Oct  2 19:09:17.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:17.133069 kernel: audit: type=1131 audit(1696273757.126:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:09:17.141357 kubelet[2095]: E1002 19:09:17.141319    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.149000 audit: BPF prog-id=63 op=UNLOAD
Oct  2 19:09:17.149000 audit: BPF prog-id=62 op=UNLOAD
Oct  2 19:09:17.154004 kernel: audit: type=1334 audit(1696273757.149:642): prog-id=63 op=UNLOAD
Oct  2 19:09:17.156441 kernel: audit: type=1334 audit(1696273757.149:643): prog-id=62 op=UNLOAD
Oct  2 19:09:17.156697 kernel: audit: type=1334 audit(1696273757.149:644): prog-id=61 op=UNLOAD
Oct  2 19:09:17.149000 audit: BPF prog-id=61 op=UNLOAD
Oct  2 19:09:17.241959 kubelet[2095]: E1002 19:09:17.241493    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.342856 kubelet[2095]: E1002 19:09:17.342815    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.443531 kubelet[2095]: E1002 19:09:17.443489    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.544255 kubelet[2095]: E1002 19:09:17.544095    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.644662 kubelet[2095]: E1002 19:09:17.644612    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.745284 kubelet[2095]: E1002 19:09:17.745241    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.802912 kubelet[2095]: E1002 19:09:17.802791    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:17.846392 kubelet[2095]: E1002 19:09:17.846343    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:17.947009 kubelet[2095]: E1002 19:09:17.946965    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:18.047653 kubelet[2095]: E1002 19:09:18.047605    2095 kubelet.go:2448] "Error getting node" err="node \"172.31.31.246\" not found"
Oct  2 19:09:18.148050 kubelet[2095]: I1002 19:09:18.147998    2095 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Oct  2 19:09:18.148703 env[1631]: time="2023-10-02T19:09:18.148655220Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Oct  2 19:09:18.149140 kubelet[2095]: I1002 19:09:18.148921    2095 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Oct  2 19:09:18.149385 kubelet[2095]: E1002 19:09:18.149366    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:09:18.801387 kubelet[2095]: I1002 19:09:18.801341    2095 apiserver.go:52] "Watching apiserver"
Oct  2 19:09:18.803545 kubelet[2095]: E1002 19:09:18.803480    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:18.804256 kubelet[2095]: I1002 19:09:18.804233    2095 topology_manager.go:205] "Topology Admit Handler"
Oct  2 19:09:18.804390 kubelet[2095]: I1002 19:09:18.804370    2095 topology_manager.go:205] "Topology Admit Handler"
Oct  2 19:09:18.814342 systemd[1]: Created slice kubepods-besteffort-podb3c6fc13_5b0a_4c72_a1dd_b7d2475b5f77.slice.
Oct  2 19:09:18.836219 systemd[1]: Created slice kubepods-besteffort-pod583dc39d_ddf8_425b_8f72_0e08fe8debf5.slice.
Oct  2 19:09:18.837428 kubelet[2095]: I1002 19:09:18.837404    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-policysync\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.837607 kubelet[2095]: I1002 19:09:18.837596    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-tigera-ca-bundle\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.839775 kubelet[2095]: I1002 19:09:18.839753    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-node-certs\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.839950 kubelet[2095]: I1002 19:09:18.839935    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-var-lib-calico\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840085 kubelet[2095]: I1002 19:09:18.840072    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/583dc39d-ddf8-425b-8f72-0e08fe8debf5-kube-proxy\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9"
Oct  2 19:09:18.840219 kubelet[2095]: I1002 19:09:18.840195    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-lib-modules\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840290 kubelet[2095]: I1002 19:09:18.840244    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-var-run-calico\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840290 kubelet[2095]: I1002 19:09:18.840284    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-cni-bin-dir\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840385 kubelet[2095]: I1002 19:09:18.840329    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9xs2\" (UniqueName: \"kubernetes.io/projected/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-kube-api-access-h9xs2\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840385 kubelet[2095]: I1002 19:09:18.840368    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/583dc39d-ddf8-425b-8f72-0e08fe8debf5-lib-modules\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9"
Oct  2 19:09:18.840487 kubelet[2095]: I1002 19:09:18.840408    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-flexvol-driver-host\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840487 kubelet[2095]: I1002 19:09:18.840450    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/583dc39d-ddf8-425b-8f72-0e08fe8debf5-xtables-lock\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9"
Oct  2 19:09:18.840593 kubelet[2095]: I1002 19:09:18.840491    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mk9ct\" (UniqueName: \"kubernetes.io/projected/583dc39d-ddf8-425b-8f72-0e08fe8debf5-kube-api-access-mk9ct\") pod \"kube-proxy-dpwx9\" (UID: \"583dc39d-ddf8-425b-8f72-0e08fe8debf5\") " pod="kube-system/kube-proxy-dpwx9"
Oct  2 19:09:18.840593 kubelet[2095]: I1002 19:09:18.840531    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-xtables-lock\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840593 kubelet[2095]: I1002 19:09:18.840570    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-cni-net-dir\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840715 kubelet[2095]: I1002 19:09:18.840609    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77-cni-log-dir\") pod \"calico-node-q6mqp\" (UID: \"b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77\") " pod="calico-system/calico-node-q6mqp"
Oct  2 19:09:18.840715 kubelet[2095]: I1002 19:09:18.840627    2095 reconciler.go:169] "Reconciler: start to sync state"
Oct  2 19:09:19.042258 kubelet[2095]: E1002 19:09:19.042194    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.042258 kubelet[2095]: W1002 19:09:19.042250    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.042503 kubelet[2095]: E1002 19:09:19.042283    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.042563 kubelet[2095]: E1002 19:09:19.042519    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.042563 kubelet[2095]: W1002 19:09:19.042529    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.042563 kubelet[2095]: E1002 19:09:19.042545    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.143656 kubelet[2095]: E1002 19:09:19.143626    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.143656 kubelet[2095]: W1002 19:09:19.143648    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.143899 kubelet[2095]: E1002 19:09:19.143671    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.143965 kubelet[2095]: E1002 19:09:19.143937    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.143965 kubelet[2095]: W1002 19:09:19.143948    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.144068 kubelet[2095]: E1002 19:09:19.143977    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.244998 kubelet[2095]: E1002 19:09:19.243194    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.244998 kubelet[2095]: W1002 19:09:19.243299    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.244998 kubelet[2095]: E1002 19:09:19.243327    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.245421 kubelet[2095]: E1002 19:09:19.245401    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.245421 kubelet[2095]: W1002 19:09:19.245417    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.245532 kubelet[2095]: E1002 19:09:19.245439    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.346977 kubelet[2095]: E1002 19:09:19.346945    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.346977 kubelet[2095]: W1002 19:09:19.346971    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.347167 kubelet[2095]: E1002 19:09:19.346995    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.420229 kubelet[2095]: E1002 19:09:19.419177    2095 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:09:19.420229 kubelet[2095]: W1002 19:09:19.420074    2095 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:09:19.420229 kubelet[2095]: E1002 19:09:19.420113    2095 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:09:19.433442 env[1631]: time="2023-10-02T19:09:19.433389855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q6mqp,Uid:b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77,Namespace:calico-system,Attempt:0,}"
Oct  2 19:09:19.442115 env[1631]: time="2023-10-02T19:09:19.442065515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dpwx9,Uid:583dc39d-ddf8-425b-8f72-0e08fe8debf5,Namespace:kube-system,Attempt:0,}"
Oct  2 19:09:19.789059 kubelet[2095]: E1002 19:09:19.788877    2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:19.804243 kubelet[2095]: E1002 19:09:19.804187    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:19.909691 kubelet[2095]: E1002 19:09:19.909646    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:09:19.964412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1083519903.mount: Deactivated successfully.
Oct  2 19:09:19.971077 env[1631]: time="2023-10-02T19:09:19.971013013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.975163 env[1631]: time="2023-10-02T19:09:19.975121456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.976887 env[1631]: time="2023-10-02T19:09:19.976845118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.979474 env[1631]: time="2023-10-02T19:09:19.979431931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.980371 env[1631]: time="2023-10-02T19:09:19.980337307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.981403 env[1631]: time="2023-10-02T19:09:19.981373651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.984133 env[1631]: time="2023-10-02T19:09:19.984100809Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:19.987352 env[1631]: time="2023-10-02T19:09:19.987314089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:20.028312 env[1631]: time="2023-10-02T19:09:20.028072070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:09:20.028312 env[1631]: time="2023-10-02T19:09:20.028121883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:09:20.028312 env[1631]: time="2023-10-02T19:09:20.028139077Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:09:20.030568 env[1631]: time="2023-10-02T19:09:20.030486585Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925 pid=2197 runtime=io.containerd.runc.v2
Oct  2 19:09:20.030753 env[1631]: time="2023-10-02T19:09:20.030553567Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:09:20.030851 env[1631]: time="2023-10-02T19:09:20.030745029Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:09:20.031048 env[1631]: time="2023-10-02T19:09:20.030996655Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:09:20.031437 env[1631]: time="2023-10-02T19:09:20.031279550Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf pid=2209 runtime=io.containerd.runc.v2
Oct  2 19:09:20.065631 systemd[1]: Started cri-containerd-ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925.scope.
Oct  2 19:09:20.081485 systemd[1]: Started cri-containerd-cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf.scope.
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.112514 kernel: audit: type=1400 audit(1696273760.097:645): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.112726 kernel: audit: type=1400 audit(1696273760.097:646): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.130056 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 19:09:20.130167 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64
Oct  2 19:09:20.130243 kernel: audit: type=1400 audit(1696273760.097:647): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.130271 kernel: audit: type=1400 audit(1696273760.097:648): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.130307 kernel: audit: backlog limit exceeded
Oct  2 19:09:20.130333 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 19:09:20.130358 kernel: audit: type=1400 audit(1696273760.097:649): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.130384 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.097000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.098000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.098000 audit: BPF prog-id=73 op=LOAD
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.105000 audit: BPF prog-id=74 op=LOAD
Oct  2 19:09:20.105000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167210 items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit: BPF prog-id=75 op=LOAD
Oct  2 19:09:20.111000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000167258 items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661
Oct  2 19:09:20.111000 audit: BPF prog-id=75 op=UNLOAD
Oct  2 19:09:20.111000 audit: BPF prog-id=74 op=UNLOAD
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { perfmon } for  pid=2224 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit[2224]: AVC avc:  denied  { bpf } for  pid=2224 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.111000 audit: BPF prog-id=76 op=LOAD
Oct  2 19:09:20.111000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000167668 items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164396137616263646132323138663863396661663064373064376661
Oct  2 19:09:20.113000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.113000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.113000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.113000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.113000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.113000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.117000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.138000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.138000 audit: BPF prog-id=77 op=LOAD
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit: BPF prog-id=78 op=LOAD
Oct  2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad620 items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit: BPF prog-id=79 op=LOAD
Oct  2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001ad668 items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138
Oct  2 19:09:20.139000 audit: BPF prog-id=79 op=UNLOAD
Oct  2 19:09:20.139000 audit: BPF prog-id=78 op=UNLOAD
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { perfmon } for  pid=2225 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit[2225]: AVC avc:  denied  { bpf } for  pid=2225 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:20.139000 audit: BPF prog-id=80 op=LOAD
Oct  2 19:09:20.139000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001ada78 items=0 ppid=2209 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303866313434363934386431303864313332323831366236396138
Oct  2 19:09:20.177161 env[1631]: time="2023-10-02T19:09:20.175524740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q6mqp,Uid:b3c6fc13-5b0a-4c72-a1dd-b7d2475b5f77,Namespace:calico-system,Attempt:0,} returns sandbox id \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\""
Oct  2 19:09:20.178386 env[1631]: time="2023-10-02T19:09:20.178345164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\""
Oct  2 19:09:20.180182 env[1631]: time="2023-10-02T19:09:20.180144557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dpwx9,Uid:583dc39d-ddf8-425b-8f72-0e08fe8debf5,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925\""
Oct  2 19:09:20.804971 kubelet[2095]: E1002 19:09:20.804932    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:21.347663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2614264977.mount: Deactivated successfully.
Oct  2 19:09:21.805499 kubelet[2095]: E1002 19:09:21.805451    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:22.314303 env[1631]: time="2023-10-02T19:09:22.314248941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:22.317331 env[1631]: time="2023-10-02T19:09:22.317290001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:22.320715 env[1631]: time="2023-10-02T19:09:22.320677626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:22.324192 env[1631]: time="2023-10-02T19:09:22.324153513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:22.325362 env[1631]: time="2023-10-02T19:09:22.325323083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\""
Oct  2 19:09:22.327517 env[1631]: time="2023-10-02T19:09:22.327485516Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\""
Oct  2 19:09:22.328774 env[1631]: time="2023-10-02T19:09:22.328737267Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Oct  2 19:09:22.350814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2786147232.mount: Deactivated successfully.
Oct  2 19:09:22.359006 env[1631]: time="2023-10-02T19:09:22.358850620Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a\""
Oct  2 19:09:22.361314 env[1631]: time="2023-10-02T19:09:22.361271216Z" level=info msg="StartContainer for \"36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a\""
Oct  2 19:09:22.401737 systemd[1]: Started cri-containerd-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a.scope.
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit: BPF prog-id=81 op=LOAD
Oct  2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003223f0 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit: BPF prog-id=82 op=LOAD
Oct  2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000322438 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137
Oct  2 19:09:22.423000 audit: BPF prog-id=82 op=UNLOAD
Oct  2 19:09:22.423000 audit: BPF prog-id=81 op=UNLOAD
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { perfmon } for  pid=2281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit[2281]: AVC avc:  denied  { bpf } for  pid=2281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:22.423000 audit: BPF prog-id=83 op=LOAD
Oct  2 19:09:22.423000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003224c8 items=0 ppid=2209 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:22.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336643930313265636461303336366663626432356365333434336137
Oct  2 19:09:22.454023 env[1631]: time="2023-10-02T19:09:22.453972942Z" level=info msg="StartContainer for \"36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a\" returns successfully"
Oct  2 19:09:22.463332 systemd[1]: cri-containerd-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a.scope: Deactivated successfully.
Oct  2 19:09:22.464000 audit: BPF prog-id=83 op=UNLOAD
Oct  2 19:09:22.580436 env[1631]: time="2023-10-02T19:09:22.580309773Z" level=info msg="shim disconnected" id=36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a
Oct  2 19:09:22.580436 env[1631]: time="2023-10-02T19:09:22.580355134Z" level=warning msg="cleaning up after shim disconnected" id=36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a namespace=k8s.io
Oct  2 19:09:22.580436 env[1631]: time="2023-10-02T19:09:22.580367763Z" level=info msg="cleaning up dead shim"
Oct  2 19:09:22.592647 env[1631]: time="2023-10-02T19:09:22.592600938Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2320 runtime=io.containerd.runc.v2\n"
Oct  2 19:09:22.806697 kubelet[2095]: E1002 19:09:22.806659    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:23.347266 systemd[1]: run-containerd-runc-k8s.io-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a-runc.eRVVpx.mount: Deactivated successfully.
Oct  2 19:09:23.347492 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-36d9012ecda0366fcbd25ce3443a74ae920fa4b95369a48ffc2770ee73b98d7a-rootfs.mount: Deactivated successfully.
Oct  2 19:09:23.427058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1078834401.mount: Deactivated successfully.
Oct  2 19:09:23.807838 kubelet[2095]: E1002 19:09:23.807107    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:23.973676 env[1631]: time="2023-10-02T19:09:23.973624066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:23.976461 env[1631]: time="2023-10-02T19:09:23.976350292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:23.982372 env[1631]: time="2023-10-02T19:09:23.982327728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:23.986577 env[1631]: time="2023-10-02T19:09:23.986531986Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:23.987451 env[1631]: time="2023-10-02T19:09:23.987376938Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2\""
Oct  2 19:09:23.988760 env[1631]: time="2023-10-02T19:09:23.988737118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\""
Oct  2 19:09:23.990648 env[1631]: time="2023-10-02T19:09:23.990609401Z" level=info msg="CreateContainer within sandbox \"ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Oct  2 19:09:24.007775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount870995717.mount: Deactivated successfully.
Oct  2 19:09:24.055311 env[1631]: time="2023-10-02T19:09:24.055256540Z" level=info msg="CreateContainer within sandbox \"ad9a7abcda2218f8c9faf0d70d7fad82dcf8ec10cf15200a2b5026964ded7925\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df\""
Oct  2 19:09:24.056177 env[1631]: time="2023-10-02T19:09:24.056128766Z" level=info msg="StartContainer for \"1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df\""
Oct  2 19:09:24.091248 systemd[1]: Started cri-containerd-1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df.scope.
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.113000 audit: BPF prog-id=84 op=LOAD
Oct  2 19:09:24.113000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000281100 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit: BPF prog-id=85 op=LOAD
Oct  2 19:09:24.114000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000281148 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537
Oct  2 19:09:24.114000 audit: BPF prog-id=85 op=UNLOAD
Oct  2 19:09:24.114000 audit: BPF prog-id=84 op=UNLOAD
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { perfmon } for  pid=2347 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit[2347]: AVC avc:  denied  { bpf } for  pid=2347 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:24.114000 audit: BPF prog-id=86 op=LOAD
Oct  2 19:09:24.114000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002811d8 items=0 ppid=2197 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130303534333363613035336361333335373562646164663265616537
Oct  2 19:09:24.146802 env[1631]: time="2023-10-02T19:09:24.146750162Z" level=info msg="StartContainer for \"1005433ca053ca33575bdadf2eae757f9e467009e8cae444fd98364363cdb5df\" returns successfully"
Oct  2 19:09:24.207947 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP)
Oct  2 19:09:24.208123 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes)
Oct  2 19:09:24.208173 kernel: IPVS: ipvs loaded.
Oct  2 19:09:24.220056 kernel: IPVS: [rr] scheduler registered.
Oct  2 19:09:24.238299 kernel: IPVS: [wrr] scheduler registered.
Oct  2 19:09:24.247063 kernel: IPVS: [sh] scheduler registered.
Oct  2 19:09:24.294000 audit[2403]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.294000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeef69bb70 a2=0 a3=7ffeef69bb5c items=0 ppid=2357 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 19:09:24.298000 audit[2404]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.298000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbbdb3170 a2=0 a3=7ffdbbdb315c items=0 ppid=2357 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 19:09:24.300000 audit[2405]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.300000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe50fa6d20 a2=0 a3=7ffe50fa6d0c items=0 ppid=2357 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 19:09:24.301000 audit[2406]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.301000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe335228d0 a2=0 a3=7ffe335228bc items=0 ppid=2357 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 19:09:24.302000 audit[2407]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.302000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe010535a0 a2=0 a3=7ffe0105358c items=0 ppid=2357 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 19:09:24.303000 audit[2408]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.303000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd78947100 a2=0 a3=7ffd789470ec items=0 ppid=2357 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 19:09:24.345748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount33466474.mount: Deactivated successfully.
Oct  2 19:09:24.395000 audit[2409]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.395000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce4278be0 a2=0 a3=7ffce4278bcc items=0 ppid=2357 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 19:09:24.399000 audit[2411]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.399000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff23aaf2d0 a2=0 a3=7fff23aaf2bc items=0 ppid=2357 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Oct  2 19:09:24.404000 audit[2414]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.404000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0ec9e9f0 a2=0 a3=7ffe0ec9e9dc items=0 ppid=2357 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Oct  2 19:09:24.405000 audit[2415]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.405000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90d6a860 a2=0 a3=7ffd90d6a84c items=0 ppid=2357 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 19:09:24.408000 audit[2417]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.408000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcdc87eb80 a2=0 a3=7ffcdc87eb6c items=0 ppid=2357 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 19:09:24.411000 audit[2418]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.411000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb25ba260 a2=0 a3=7fffb25ba24c items=0 ppid=2357 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 19:09:24.416000 audit[2420]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.416000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdb33ad50 a2=0 a3=7fffdb33ad3c items=0 ppid=2357 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 19:09:24.424000 audit[2423]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.424000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd427cef50 a2=0 a3=7ffd427cef3c items=0 ppid=2357 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Oct  2 19:09:24.425000 audit[2424]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.425000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2bcf1a70 a2=0 a3=7ffc2bcf1a5c items=0 ppid=2357 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 19:09:24.430000 audit[2426]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.430000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb5292d00 a2=0 a3=7ffdb5292cec items=0 ppid=2357 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 19:09:24.431000 audit[2427]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.431000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2bd748c0 a2=0 a3=7ffc2bd748ac items=0 ppid=2357 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 19:09:24.435000 audit[2429]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.435000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe19aa12c0 a2=0 a3=7ffe19aa12ac items=0 ppid=2357 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:09:24.443000 audit[2432]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.443000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc2d6d1e0 a2=0 a3=7ffdc2d6d1cc items=0 ppid=2357 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:09:24.447000 audit[2435]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.447000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec52ae920 a2=0 a3=7ffec52ae90c items=0 ppid=2357 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 19:09:24.449000 audit[2436]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.449000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdfc3b5e00 a2=0 a3=7ffdfc3b5dec items=0 ppid=2357 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 19:09:24.453000 audit[2438]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.453000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd3856b620 a2=0 a3=7ffd3856b60c items=0 ppid=2357 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:09:24.458000 audit[2441]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:09:24.458000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff41fa9fe0 a2=0 a3=7fff41fa9fcc items=0 ppid=2357 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:09:24.465000 audit[2445]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:24.465000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe1de6f510 a2=0 a3=7ffe1de6f4fc items=0 ppid=2357 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:24.481000 audit[2445]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:24.481000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe1de6f510 a2=0 a3=7ffe1de6f4fc items=0 ppid=2357 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:24.501000 audit[2451]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.501000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5518a9f0 a2=0 a3=7ffe5518a9dc items=0 ppid=2357 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 19:09:24.504000 audit[2453]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.504000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb4ed4d60 a2=0 a3=7ffcb4ed4d4c items=0 ppid=2357 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Oct  2 19:09:24.509000 audit[2456]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.509000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd04a653a0 a2=0 a3=7ffd04a6538c items=0 ppid=2357 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Oct  2 19:09:24.511000 audit[2457]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.511000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb353e0a0 a2=0 a3=7ffdb353e08c items=0 ppid=2357 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 19:09:24.514000 audit[2459]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.514000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffefe6380 a2=0 a3=7ffffefe636c items=0 ppid=2357 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 19:09:24.515000 audit[2460]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.515000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb946e820 a2=0 a3=7ffdb946e80c items=0 ppid=2357 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 19:09:24.519000 audit[2462]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.519000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc9b341b80 a2=0 a3=7ffc9b341b6c items=0 ppid=2357 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Oct  2 19:09:24.523000 audit[2465]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.523000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd92d22350 a2=0 a3=7ffd92d2233c items=0 ppid=2357 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 19:09:24.525000 audit[2466]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.525000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce9285520 a2=0 a3=7ffce928550c items=0 ppid=2357 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 19:09:24.528000 audit[2468]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.528000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd87fb4a00 a2=0 a3=7ffd87fb49ec items=0 ppid=2357 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 19:09:24.530000 audit[2469]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.530000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1a4f1080 a2=0 a3=7ffe1a4f106c items=0 ppid=2357 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 19:09:24.532000 audit[2471]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.532000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc6d90db0 a2=0 a3=7ffdc6d90d9c items=0 ppid=2357 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:09:24.537000 audit[2474]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.537000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff43f878f0 a2=0 a3=7fff43f878dc items=0 ppid=2357 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 19:09:24.541000 audit[2477]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.541000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc85f4f430 a2=0 a3=7ffc85f4f41c items=0 ppid=2357 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Oct  2 19:09:24.543000 audit[2478]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.543000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe97706bb0 a2=0 a3=7ffe97706b9c items=0 ppid=2357 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 19:09:24.546000 audit[2480]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.546000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcabab1110 a2=0 a3=7ffcabab10fc items=0 ppid=2357 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:09:24.551000 audit[2483]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:09:24.551000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe1d48d930 a2=0 a3=7ffe1d48d91c items=0 ppid=2357 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:09:24.558000 audit[2487]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 19:09:24.558000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffadbf2200 a2=0 a3=7fffadbf21ec items=0 ppid=2357 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.558000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:24.559000 audit[2487]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 19:09:24.559000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=1860 a0=3 a1=7fffadbf2200 a2=0 a3=7fffadbf21ec items=0 ppid=2357 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:24.559000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:24.807312 kubelet[2095]: E1002 19:09:24.807271    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:24.910709 kubelet[2095]: E1002 19:09:24.910677    2095 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"
Oct  2 19:09:25.095006 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1559952260.mount: Deactivated successfully.
Oct  2 19:09:25.807452 kubelet[2095]: E1002 19:09:25.807396    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:26.808395 kubelet[2095]: E1002 19:09:26.808329    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:27.809995 kubelet[2095]: E1002 19:09:27.809923    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:28.810141 kubelet[2095]: E1002 19:09:28.810067    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:28.900595 env[1631]: time="2023-10-02T19:09:28.900539682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:28.903542 env[1631]: time="2023-10-02T19:09:28.903500254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:28.905769 env[1631]: time="2023-10-02T19:09:28.905735406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:28.907795 env[1631]: time="2023-10-02T19:09:28.907761410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:28.908586 env[1631]: time="2023-10-02T19:09:28.908551403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\""
Oct  2 19:09:28.912178 env[1631]: time="2023-10-02T19:09:28.912143323Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Oct  2 19:09:28.926740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount146056397.mount: Deactivated successfully.
Oct  2 19:09:28.933877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2475138748.mount: Deactivated successfully.
Oct  2 19:09:28.942511 env[1631]: time="2023-10-02T19:09:28.942461114Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8\""
Oct  2 19:09:28.943233 env[1631]: time="2023-10-02T19:09:28.943198177Z" level=info msg="StartContainer for \"efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8\""
Oct  2 19:09:28.969156 systemd[1]: Started cri-containerd-efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8.scope.
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.994731 kernel: kauditd_printk_skb: 327 callbacks suppressed
Oct  2 19:09:28.994894 kernel: audit: type=1400 audit(1696273768.992:736): avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:29.007248 kernel: audit: type=1300 audit(1696273768.992:736): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:29.007393 kernel: audit: type=1327 audit(1696273768.992:736): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361
Oct  2 19:09:28.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361
Oct  2 19:09:29.018133 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.028683 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.028897 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.040592 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.040713 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.046150 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.052694 kernel: audit: type=1400 audit(1696273768.992:737): avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.992000 audit: BPF prog-id=87 op=LOAD
Oct  2 19:09:28.992000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000309070 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:28.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:28.998000 audit: BPF prog-id=88 op=LOAD
Oct  2 19:09:28.998000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003090b8 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:28.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361
Oct  2 19:09:29.012000 audit: BPF prog-id=88 op=UNLOAD
Oct  2 19:09:29.012000 audit: BPF prog-id=87 op=UNLOAD
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { perfmon } for  pid=2497 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit[2497]: AVC avc:  denied  { bpf } for  pid=2497 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:29.012000 audit: BPF prog-id=89 op=LOAD
Oct  2 19:09:29.012000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000309148 items=0 ppid=2209 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:29.055556 env[1631]: time="2023-10-02T19:09:29.055513017Z" level=info msg="StartContainer for \"efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8\" returns successfully"
Oct  2 19:09:29.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613536343434363839393931643639616335396634373164316361
Oct  2 19:09:29.810377 kubelet[2095]: E1002 19:09:29.810338    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:29.858017 env[1631]: time="2023-10-02T19:09:29.857949801Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 19:09:29.861360 systemd[1]: cri-containerd-efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8.scope: Deactivated successfully.
Oct  2 19:09:29.864000 audit: BPF prog-id=89 op=UNLOAD
Oct  2 19:09:29.924566 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8-rootfs.mount: Deactivated successfully.
Oct  2 19:09:30.473525 env[1631]: time="2023-10-02T19:09:30.473468245Z" level=info msg="shim disconnected" id=efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8
Oct  2 19:09:30.475590 env[1631]: time="2023-10-02T19:09:30.475131208Z" level=warning msg="cleaning up after shim disconnected" id=efa56444689991d69ac59f471d1ca058de6cb0ef4c5f473fcda6b66e822cb9d8 namespace=k8s.io
Oct  2 19:09:30.475590 env[1631]: time="2023-10-02T19:09:30.475160882Z" level=info msg="cleaning up dead shim"
Oct  2 19:09:30.489254 env[1631]: time="2023-10-02T19:09:30.489205586Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2546 runtime=io.containerd.runc.v2\n"
Oct  2 19:09:30.811577 kubelet[2095]: E1002 19:09:30.811447    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:31.217062 env[1631]: time="2023-10-02T19:09:31.216913525Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\""
Oct  2 19:09:31.811660 kubelet[2095]: E1002 19:09:31.811605    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:32.157127 update_engine[1626]: I1002 19:09:32.157090  1626 update_attempter.cc:505] Updating boot flags...
Oct  2 19:09:32.811905 kubelet[2095]: E1002 19:09:32.811756    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:33.309935 kubelet[2095]: I1002 19:09:33.309896    2095 topology_manager.go:205] "Topology Admit Handler"
Oct  2 19:09:33.317260 systemd[1]: Created slice kubepods-besteffort-pode1de0828_193f_4683_ba3e_878e95d625b9.slice.
Oct  2 19:09:33.350969 kubelet[2095]: I1002 19:09:33.350931    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-etccalico\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.350969 kubelet[2095]: I1002 19:09:33.350988    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-kubelet-dir\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351018    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-socket-dir\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351058    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-registration-dir\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351087    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rh7mx\" (UniqueName: \"kubernetes.io/projected/e1de0828-193f-4683-ba3e-878e95d625b9-kube-api-access-rh7mx\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.351226 kubelet[2095]: I1002 19:09:33.351118    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e1de0828-193f-4683-ba3e-878e95d625b9-varrun\") pod \"csi-node-driver-dvc2s\" (UID: \"e1de0828-193f-4683-ba3e-878e95d625b9\") " pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.623844 env[1631]: time="2023-10-02T19:09:33.623797503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:0,}"
Oct  2 19:09:33.781120 env[1631]: time="2023-10-02T19:09:33.781052304Z" level=error msg="Failed to destroy network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:33.794811 env[1631]: time="2023-10-02T19:09:33.788865873Z" level=error msg="encountered an error cleaning up failed sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:33.794811 env[1631]: time="2023-10-02T19:09:33.788951320Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:33.794962 kubelet[2095]: E1002 19:09:33.793484    2095 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:33.794962 kubelet[2095]: E1002 19:09:33.793584    2095 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.794962 kubelet[2095]: E1002 19:09:33.793821    2095 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dvc2s"
Oct  2 19:09:33.788357 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430-shm.mount: Deactivated successfully.
Oct  2 19:09:33.795569 kubelet[2095]: E1002 19:09:33.793976    2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9
Oct  2 19:09:33.812187 kubelet[2095]: E1002 19:09:33.812076    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:34.227384 kubelet[2095]: I1002 19:09:34.226140    2095 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:34.227907 env[1631]: time="2023-10-02T19:09:34.227868897Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\""
Oct  2 19:09:34.299595 env[1631]: time="2023-10-02T19:09:34.299523892Z" level=error msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" failed" error="failed to destroy network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300166    2095 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300244    2095 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430}
Oct  2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300314    2095 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1de0828-193f-4683-ba3e-878e95d625b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:09:34.300475 kubelet[2095]: E1002 19:09:34.300412    2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1de0828-193f-4683-ba3e-878e95d625b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9
Oct  2 19:09:34.813162 kubelet[2095]: E1002 19:09:34.813100    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:35.813835 kubelet[2095]: E1002 19:09:35.813794    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:36.508383 kubelet[2095]: I1002 19:09:36.507102    2095 topology_manager.go:205] "Topology Admit Handler"
Oct  2 19:09:36.514733 systemd[1]: Created slice kubepods-besteffort-pod0200515e_beda_471c_bad0_c5545f30329b.slice.
Oct  2 19:09:36.574178 kubelet[2095]: I1002 19:09:36.574143    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gjdfd\" (UniqueName: \"kubernetes.io/projected/0200515e-beda-471c-bad0-c5545f30329b-kube-api-access-gjdfd\") pod \"nginx-deployment-5bbcdd876f-2q846\" (UID: \"0200515e-beda-471c-bad0-c5545f30329b\") " pod="default/nginx-deployment-5bbcdd876f-2q846"
Oct  2 19:09:36.815179 kubelet[2095]: E1002 19:09:36.814682    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:36.820542 env[1631]: time="2023-10-02T19:09:36.820500130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:0,}"
Oct  2 19:09:37.084444 env[1631]: time="2023-10-02T19:09:37.084221180Z" level=error msg="Failed to destroy network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:37.088929 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8-shm.mount: Deactivated successfully.
Oct  2 19:09:37.090270 env[1631]: time="2023-10-02T19:09:37.090204536Z" level=error msg="encountered an error cleaning up failed sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:37.090411 env[1631]: time="2023-10-02T19:09:37.090297919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:37.090558 kubelet[2095]: E1002 19:09:37.090534    2095 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:37.090642 kubelet[2095]: E1002 19:09:37.090599    2095 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-5bbcdd876f-2q846"
Oct  2 19:09:37.090642 kubelet[2095]: E1002 19:09:37.090635    2095 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-5bbcdd876f-2q846"
Oct  2 19:09:37.090742 kubelet[2095]: E1002 19:09:37.090705    2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-5bbcdd876f-2q846_default(0200515e-beda-471c-bad0-c5545f30329b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-5bbcdd876f-2q846_default(0200515e-beda-471c-bad0-c5545f30329b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-5bbcdd876f-2q846" podUID=0200515e-beda-471c-bad0-c5545f30329b
Oct  2 19:09:37.232689 kubelet[2095]: I1002 19:09:37.232660    2095 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:09:37.233436 env[1631]: time="2023-10-02T19:09:37.233393003Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\""
Oct  2 19:09:37.315435 env[1631]: time="2023-10-02T19:09:37.315362771Z" level=error msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" failed" error="failed to destroy network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:09:37.315646 kubelet[2095]: E1002 19:09:37.315624    2095 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:09:37.315725 kubelet[2095]: E1002 19:09:37.315676    2095 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8}
Oct  2 19:09:37.315774 kubelet[2095]: E1002 19:09:37.315730    2095 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0200515e-beda-471c-bad0-c5545f30329b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:09:37.315774 kubelet[2095]: E1002 19:09:37.315771    2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0200515e-beda-471c-bad0-c5545f30329b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-5bbcdd876f-2q846" podUID=0200515e-beda-471c-bad0-c5545f30329b
Oct  2 19:09:37.493304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2646541039.mount: Deactivated successfully.
Oct  2 19:09:37.563496 env[1631]: time="2023-10-02T19:09:37.563446551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:37.566457 env[1631]: time="2023-10-02T19:09:37.566412800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:37.569767 env[1631]: time="2023-10-02T19:09:37.569728884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:37.571475 env[1631]: time="2023-10-02T19:09:37.571442586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:09:37.571838 env[1631]: time="2023-10-02T19:09:37.571808452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\""
Oct  2 19:09:37.574338 env[1631]: time="2023-10-02T19:09:37.574305107Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Oct  2 19:09:37.596444 env[1631]: time="2023-10-02T19:09:37.596390754Z" level=info msg="CreateContainer within sandbox \"cb08f1446948d108d1322816b69a868a0e356e16d0236aaa94da4770c51354bf\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d\""
Oct  2 19:09:37.597539 env[1631]: time="2023-10-02T19:09:37.597500024Z" level=info msg="StartContainer for \"2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d\""
Oct  2 19:09:37.635179 systemd[1]: Started cri-containerd-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d.scope.
Oct  2 19:09:37.667502 kernel: kauditd_printk_skb: 34 callbacks suppressed
Oct  2 19:09:37.667657 kernel: audit: type=1400 audit(1696273777.660:743): avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.674576 kernel: audit: type=1300 audit(1696273777.660:743): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:37.660000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:37.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165
Oct  2 19:09:37.685302 kernel: audit: type=1327 audit(1696273777.660:743): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165
Oct  2 19:09:37.685429 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.685467 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.696481 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.696590 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.703639 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.708684 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.714367 kernel: audit: type=1400 audit(1696273777.660:744): avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.660000 audit: BPF prog-id=90 op=LOAD
Oct  2 19:09:37.660000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002a85b0 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:37.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit: BPF prog-id=91 op=LOAD
Oct  2 19:09:37.666000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002a85f8 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165
Oct  2 19:09:37.666000 audit: BPF prog-id=91 op=UNLOAD
Oct  2 19:09:37.666000 audit: BPF prog-id=90 op=UNLOAD
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { perfmon } for  pid=2947 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit[2947]: AVC avc:  denied  { bpf } for  pid=2947 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:37.666000 audit: BPF prog-id=92 op=LOAD
Oct  2 19:09:37.666000 audit[2947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002a8688 items=0 ppid=2209 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353161613462373661306263323138303661333864386632643165
Oct  2 19:09:37.720809 env[1631]: time="2023-10-02T19:09:37.720764690Z" level=info msg="StartContainer for \"2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d\" returns successfully"
Oct  2 19:09:37.815648 kubelet[2095]: E1002 19:09:37.815513    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:37.822073 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Oct  2 19:09:37.822222 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Oct  2 19:09:38.304074 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.wWBYdH.mount: Deactivated successfully.
Oct  2 19:09:38.816604 kubelet[2095]: E1002 19:09:38.816562    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:39.218000 audit[3068]: AVC avc:  denied  { write } for  pid=3068 comm="tee" name="fd" dev="proc" ino=20345 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.221000 audit[3065]: AVC avc:  denied  { write } for  pid=3065 comm="tee" name="fd" dev="proc" ino=19418 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.221000 audit[3065]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff19d3c988 a2=241 a3=1b6 items=1 ppid=3037 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.221000 audit: CWD cwd="/etc/service/enabled/felix/log"
Oct  2 19:09:39.221000 audit: PATH item=0 name="/dev/fd/63" inode=19411 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.233000 audit[3075]: AVC avc:  denied  { write } for  pid=3075 comm="tee" name="fd" dev="proc" ino=20353 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.218000 audit[3068]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcafa04979 a2=241 a3=1b6 items=1 ppid=3036 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.218000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Oct  2 19:09:39.218000 audit: PATH item=0 name="/dev/fd/63" inode=20334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.218000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.236000 audit[3073]: AVC avc:  denied  { write } for  pid=3073 comm="tee" name="fd" dev="proc" ino=19424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.233000 audit[3075]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb8be498a a2=241 a3=1b6 items=1 ppid=3040 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.233000 audit: CWD cwd="/etc/service/enabled/cni/log"
Oct  2 19:09:39.233000 audit: PATH item=0 name="/dev/fd/63" inode=20340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.233000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.236000 audit[3073]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2dbe8989 a2=241 a3=1b6 items=1 ppid=3048 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.236000 audit: CWD cwd="/etc/service/enabled/bird/log"
Oct  2 19:09:39.236000 audit: PATH item=0 name="/dev/fd/63" inode=20337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.236000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.247000 audit[3085]: AVC avc:  denied  { write } for  pid=3085 comm="tee" name="fd" dev="proc" ino=19431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.247000 audit[3085]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe535fd988 a2=241 a3=1b6 items=1 ppid=3043 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.247000 audit: CWD cwd="/etc/service/enabled/confd/log"
Oct  2 19:09:39.247000 audit: PATH item=0 name="/dev/fd/63" inode=20350 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.247000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.254000 audit[3078]: AVC avc:  denied  { write } for  pid=3078 comm="tee" name="fd" dev="proc" ino=19438 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.254000 audit[3078]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6328d978 a2=241 a3=1b6 items=1 ppid=3050 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.254000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Oct  2 19:09:39.254000 audit: PATH item=0 name="/dev/fd/63" inode=19419 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.254000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.258000 audit[3087]: AVC avc:  denied  { write } for  pid=3087 comm="tee" name="fd" dev="proc" ino=19445 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:09:39.258000 audit[3087]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef2cb9988 a2=241 a3=1b6 items=1 ppid=3042 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.258000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Oct  2 19:09:39.258000 audit: PATH item=0 name="/dev/fd/63" inode=19421 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:09:39.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:09:39.282523 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.qv9Kxe.mount: Deactivated successfully.
Oct  2 19:09:39.785100 kernel: Initializing XFRM netlink socket
Oct  2 19:09:39.788725 kubelet[2095]: E1002 19:09:39.788475    2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:39.817225 kubelet[2095]: E1002 19:09:39.817167    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit: BPF prog-id=93 op=LOAD
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff090fbd00 a2=70 a3=7f378d51b000 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.965000 audit: BPF prog-id=93 op=UNLOAD
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit: BPF prog-id=94 op=LOAD
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff090fbd00 a2=70 a3=6e items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.965000 audit: BPF prog-id=94 op=UNLOAD
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff090fbcb0 a2=70 a3=7fff090fbd00 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit: BPF prog-id=95 op=LOAD
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff090fbc90 a2=70 a3=7fff090fbd00 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.965000 audit: BPF prog-id=95 op=UNLOAD
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff090fbd70 a2=70 a3=0 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff090fbd60 a2=70 a3=0 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.965000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.965000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff090fbda0 a2=70 a3=0 items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { perfmon } for  pid=3221 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit[3221]: AVC avc:  denied  { bpf } for  pid=3221 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.966000 audit: BPF prog-id=96 op=LOAD
Oct  2 19:09:39.966000 audit[3221]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff090fbcc0 a2=70 a3=ffffffff items=0 ppid=3039 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.966000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:09:39.964420 (udev-worker)[2979]: Network interface NamePolicy= disabled on kernel command line.
Oct  2 19:09:39.965652 (udev-worker)[3220]: Network interface NamePolicy= disabled on kernel command line.
Oct  2 19:09:39.975000 audit[3225]: AVC avc:  denied  { bpf } for  pid=3225 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.975000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcffa80170 a2=70 a3=fffffff81000 items=0 ppid=3039 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 19:09:39.975000 audit[3225]: AVC avc:  denied  { bpf } for  pid=3225 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:39.975000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcffa80040 a2=70 a3=3 items=0 ppid=3039 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:39.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 19:09:39.983000 audit: BPF prog-id=96 op=UNLOAD
Oct  2 19:09:40.101000 audit[3246]: NETFILTER_CFG table=raw:79 family=2 entries=19 op=nft_register_chain pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:40.101000 audit[3246]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd44b8ac10 a2=0 a3=7ffd44b8abfc items=0 ppid=3039 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:40.101000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:40.103000 audit[3247]: NETFILTER_CFG table=mangle:80 family=2 entries=19 op=nft_register_chain pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:40.103000 audit[3247]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc6bba8710 a2=0 a3=5587cbeb9000 items=0 ppid=3039 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:40.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:40.110000 audit[3248]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:40.110000 audit[3248]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd17d0a3d0 a2=0 a3=55bc0295e000 items=0 ppid=3039 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:40.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:40.114000 audit[3249]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=3249 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:40.114000 audit[3249]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffdfe802320 a2=0 a3=56324ffa7000 items=0 ppid=3039 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:40.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:40.271903 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.jgZNWM.mount: Deactivated successfully.
Oct  2 19:09:40.804154 systemd-networkd[1452]: vxlan.calico: Link UP
Oct  2 19:09:40.824572 kubelet[2095]: E1002 19:09:40.817495    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:40.804165 systemd-networkd[1452]: vxlan.calico: Gained carrier
Oct  2 19:09:41.818379 kubelet[2095]: E1002 19:09:41.818339    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:42.604276 systemd-networkd[1452]: vxlan.calico: Gained IPv6LL
Oct  2 19:09:42.819472 kubelet[2095]: E1002 19:09:42.819427    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:43.819893 kubelet[2095]: E1002 19:09:43.819856    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:44.820964 kubelet[2095]: E1002 19:09:44.820911    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:45.821847 kubelet[2095]: E1002 19:09:45.821797    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:46.822358 kubelet[2095]: E1002 19:09:46.822304    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:47.823153 kubelet[2095]: E1002 19:09:47.823100    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:48.824052 kubelet[2095]: E1002 19:09:48.823999    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:49.471523 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.pW4Ujx.mount: Deactivated successfully.
Oct  2 19:09:49.825313 kubelet[2095]: E1002 19:09:49.825081    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:50.129795 env[1631]: time="2023-10-02T19:09:50.129504579Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\""
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.211 [INFO][3333] k8s.go 576: Cleaning up netns ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.212 [INFO][3333] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="/var/run/netns/cni-bccf905b-9780-18b6-6f8d-397ff7412ad3"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="/var/run/netns/cni-bccf905b-9780-18b6-6f8d-397ff7412ad3"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns="/var/run/netns/cni-bccf905b-9780-18b6-6f8d-397ff7412ad3"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] k8s.go 583: Releasing IP address(es) ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.214 [INFO][3333] utils.go 196: Calico CNI releasing IP address ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.243 [INFO][3339] ipam_plugin.go 416: Releasing address using handleID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.255014 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:09:50.255014 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.250 [WARNING][3339] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.250 [INFO][3339] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.255014 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:09:50.255014 env[1631]: 2023-10-02 19:09:50.253 [INFO][3333] k8s.go 589: Teardown processing complete. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:50.256991 systemd[1]: run-netns-cni\x2dbccf905b\x2d9780\x2d18b6\x2d6f8d\x2d397ff7412ad3.mount: Deactivated successfully.
Oct  2 19:09:50.258112 env[1631]: time="2023-10-02T19:09:50.257917167Z" level=info msg="TearDown network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" successfully"
Oct  2 19:09:50.258112 env[1631]: time="2023-10-02T19:09:50.257959945Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" returns successfully"
Oct  2 19:09:50.258890 env[1631]: time="2023-10-02T19:09:50.258858229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:1,}"
Oct  2 19:09:50.433055 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:09:50.433287 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic815af077cb: link becomes ready
Oct  2 19:09:50.445041 systemd-networkd[1452]: calic815af077cb: Link UP
Oct  2 19:09:50.445052 systemd-networkd[1452]: calic815af077cb: Gained carrier
Oct  2 19:09:50.447219 (udev-worker)[3363]: Network interface NamePolicy= disabled on kernel command line.
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.334 [INFO][3346] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.246-k8s-csi--node--driver--dvc2s-eth0 csi-node-driver- calico-system  e1de0828-193f-4683-ba3e-878e95d625b9 940 0 2023-10-02 19:09:33 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] []  []} {k8s  172.31.31.246  csi-node-driver-dvc2s eth0 default [] []   [kns.calico-system ksa.calico-system.default] calic815af077cb  [] []}} ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.335 [INFO][3346] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.371 [INFO][3357] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" HandleID="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.389 [INFO][3357] ipam_plugin.go 269: Auto assigning IP ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" HandleID="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db10), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.31.246", "pod":"csi-node-driver-dvc2s", "timestamp":"2023-10-02 19:09:50.371308045 +0000 UTC"}, Hostname:"172.31.31.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:09:50.466627 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:09:50.466627 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.389 [INFO][3357] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.246'
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.391 [INFO][3357] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.398 [INFO][3357] ipam.go 372: Looking up existing affinities for host host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.404 [INFO][3357] ipam.go 489: Trying affinity for 192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.407 [INFO][3357] ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.410 [INFO][3357] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.411 [INFO][3357] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.414 [INFO][3357] ipam.go 1682: Creating new handle: k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.420 [INFO][3357] ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.425 [INFO][3357] ipam.go 1216: Successfully claimed IPs: [192.168.127.65/26] block=192.168.127.64/26 handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.426 [INFO][3357] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.65/26] handle="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" host="172.31.31.246"
Oct  2 19:09:50.466627 env[1631]: time="2023-10-02T19:09:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:09:50.466627 env[1631]: 2023-10-02 19:09:50.426 [INFO][3357] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.127.65/26] IPv6=[] ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" HandleID="k8s-pod-network.3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.429 [INFO][3346] k8s.go 383: Populated endpoint ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.430 [INFO][3346] k8s.go 384: Calico CNI using IPs: [192.168.127.65/32] ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.430 [INFO][3346] dataplane_linux.go 68: Setting the host side veth name to calic815af077cb ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.435 [INFO][3346] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.448 [INFO][3346] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"a6:34:5b:a4:fa:80", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:50.468237 env[1631]: 2023-10-02 19:09:50.457 [INFO][3346] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a" Namespace="calico-system" Pod="csi-node-driver-dvc2s" WorkloadEndpoint="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:50.500974 env[1631]: time="2023-10-02T19:09:50.500895175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:09:50.501307 env[1631]: time="2023-10-02T19:09:50.501274892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:09:50.501456 env[1631]: time="2023-10-02T19:09:50.501424868Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:09:50.501923 env[1631]: time="2023-10-02T19:09:50.501870193Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a pid=3387 runtime=io.containerd.runc.v2
Oct  2 19:09:50.519000 audit[3388]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:50.522635 kernel: kauditd_printk_skb: 151 callbacks suppressed
Oct  2 19:09:50.522728 kernel: audit: type=1325 audit(1696273790.519:774): table=filter:83 family=2 entries=36 op=nft_register_chain pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:50.519000 audit[3388]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe91d35c90 a2=0 a3=7ffe91d35c7c items=0 ppid=3039 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.543702 kernel: audit: type=1300 audit(1696273790.519:774): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe91d35c90 a2=0 a3=7ffe91d35c7c items=0 ppid=3039 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.542585 systemd[1]: Started cri-containerd-3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a.scope.
Oct  2 19:09:50.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:50.551210 kernel: audit: type=1327 audit(1696273790.519:774): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565699 kernel: audit: type=1400 audit(1696273790.555:775): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565783 kernel: audit: type=1400 audit(1696273790.555:776): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.576114 kernel: audit: type=1400 audit(1696273790.555:777): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.576218 kernel: audit: type=1400 audit(1696273790.555:778): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.580884 kernel: audit: type=1400 audit(1696273790.555:779): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.580984 kernel: audit: type=1400 audit(1696273790.555:780): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.589774 kernel: audit: type=1400 audit(1696273790.555:781): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.555000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.560000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.560000 audit: BPF prog-id=97 op=LOAD
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit: BPF prog-id=98 op=LOAD
Oct  2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218340 items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit: BPF prog-id=99 op=LOAD
Oct  2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218388 items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738
Oct  2 19:09:50.565000 audit: BPF prog-id=99 op=UNLOAD
Oct  2 19:09:50.565000 audit: BPF prog-id=98 op=UNLOAD
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { perfmon } for  pid=3397 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit[3397]: AVC avc:  denied  { bpf } for  pid=3397 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:50.565000 audit: BPF prog-id=100 op=LOAD
Oct  2 19:09:50.565000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218798 items=0 ppid=3387 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:50.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361353532373939313237353633353163386562656335633134653738
Oct  2 19:09:50.604812 env[1631]: time="2023-10-02T19:09:50.604759195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dvc2s,Uid:e1de0828-193f-4683-ba3e-878e95d625b9,Namespace:calico-system,Attempt:1,} returns sandbox id \"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a\""
Oct  2 19:09:50.606391 env[1631]: time="2023-10-02T19:09:50.606358592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:09:50.779689 env[1631]: time="2023-10-02T19:09:50.779478856Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:09:50.780724 env[1631]: time="2023-10-02T19:09:50.780664733Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:09:50.781602 kubelet[2095]: E1002 19:09:50.781077    2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:09:50.781602 kubelet[2095]: E1002 19:09:50.781127    2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:09:50.781805 kubelet[2095]: E1002 19:09:50.781245    2095 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:09:50.783284 env[1631]: time="2023-10-02T19:09:50.783251536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:09:50.825920 kubelet[2095]: E1002 19:09:50.825878    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:50.955416 env[1631]: time="2023-10-02T19:09:50.955354185Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:09:50.956587 env[1631]: time="2023-10-02T19:09:50.956536938Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:09:50.956815 kubelet[2095]: E1002 19:09:50.956777    2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:09:50.956906 kubelet[2095]: E1002 19:09:50.956822    2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:09:50.956968 kubelet[2095]: E1002 19:09:50.956930    2095 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:09:50.957116 kubelet[2095]: E1002 19:09:50.957003    2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9
Oct  2 19:09:51.272056 kubelet[2095]: E1002 19:09:51.272016    2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9
Oct  2 19:09:51.827011 kubelet[2095]: E1002 19:09:51.826959    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:52.129693 env[1631]: time="2023-10-02T19:09:52.129266906Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\""
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.195 [INFO][3438] k8s.go 576: Cleaning up netns ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.195 [INFO][3438] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="/var/run/netns/cni-2bbdeaf0-552f-b07a-7a09-bf9ab97bb4be"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.196 [INFO][3438] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="/var/run/netns/cni-2bbdeaf0-552f-b07a-7a09-bf9ab97bb4be"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.196 [INFO][3438] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns="/var/run/netns/cni-2bbdeaf0-552f-b07a-7a09-bf9ab97bb4be"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.197 [INFO][3438] k8s.go 583: Releasing IP address(es) ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.197 [INFO][3438] utils.go 196: Calico CNI releasing IP address ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.225 [INFO][3444] ipam_plugin.go 416: Releasing address using handleID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.245625 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:09:52.245625 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.240 [WARNING][3444] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.240 [INFO][3444] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.245625 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:09:52.245625 env[1631]: 2023-10-02 19:09:52.244 [INFO][3438] k8s.go 589: Teardown processing complete. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:09:52.247741 systemd[1]: run-netns-cni\x2d2bbdeaf0\x2d552f\x2db07a\x2d7a09\x2dbf9ab97bb4be.mount: Deactivated successfully.
Oct  2 19:09:52.248923 env[1631]: time="2023-10-02T19:09:52.248805904Z" level=info msg="TearDown network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" successfully"
Oct  2 19:09:52.248923 env[1631]: time="2023-10-02T19:09:52.248851433Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" returns successfully"
Oct  2 19:09:52.249599 env[1631]: time="2023-10-02T19:09:52.249568284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:1,}"
Oct  2 19:09:52.269546 systemd-networkd[1452]: calic815af077cb: Gained IPv6LL
Oct  2 19:09:52.283142 kubelet[2095]: E1002 19:09:52.283090    2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9
Oct  2 19:09:52.481542 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:09:52.481687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali75013a7843e: link becomes ready
Oct  2 19:09:52.489058 systemd-networkd[1452]: cali75013a7843e: Link UP
Oct  2 19:09:52.489069 systemd-networkd[1452]: cali75013a7843e: Gained carrier
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.363 [INFO][3450] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0 nginx-deployment-5bbcdd876f- default  0200515e-beda-471c-bad0-c5545f30329b 964 0 2023-10-02 19:09:36 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:5bbcdd876f projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] []  []} {k8s  172.31.31.246  nginx-deployment-5bbcdd876f-2q846 eth0 default [] []   [kns.default ksa.default.default] cali75013a7843e  [] []}} ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.363 [INFO][3450] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.396 [INFO][3462] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" HandleID="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.421 [INFO][3462] ipam_plugin.go 269: Auto assigning IP ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" HandleID="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dde0), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.246", "pod":"nginx-deployment-5bbcdd876f-2q846", "timestamp":"2023-10-02 19:09:52.396632643 +0000 UTC"}, Hostname:"172.31.31.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:09:52.501783 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:09:52.501783 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.422 [INFO][3462] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.246'
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.426 [INFO][3462] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.433 [INFO][3462] ipam.go 372: Looking up existing affinities for host host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.439 [INFO][3462] ipam.go 489: Trying affinity for 192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.441 [INFO][3462] ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.443 [INFO][3462] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.444 [INFO][3462] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.446 [INFO][3462] ipam.go 1682: Creating new handle: k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.451 [INFO][3462] ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.475 [INFO][3462] ipam.go 1216: Successfully claimed IPs: [192.168.127.66/26] block=192.168.127.64/26 handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.475 [INFO][3462] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.66/26] handle="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" host="172.31.31.246"
Oct  2 19:09:52.501783 env[1631]: time="2023-10-02T19:09:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:09:52.501783 env[1631]: 2023-10-02 19:09:52.475 [INFO][3462] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.127.66/26] IPv6=[] ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" HandleID="k8s-pod-network.e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.477 [INFO][3450] k8s.go 383: Populated endpoint ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.477 [INFO][3450] k8s.go 384: Calico CNI using IPs: [192.168.127.66/32] ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.477 [INFO][3450] dataplane_linux.go 68: Setting the host side veth name to cali75013a7843e ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.481 [INFO][3450] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.489 [INFO][3450] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"12:2f:3a:eb:43:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:52.502426 env[1631]: 2023-10-02 19:09:52.499 [INFO][3450] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128" Namespace="default" Pod="nginx-deployment-5bbcdd876f-2q846" WorkloadEndpoint="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:09:52.526000 audit[3489]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=3489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:52.526000 audit[3489]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffc6cae5c10 a2=0 a3=7ffc6cae5bfc items=0 ppid=3039 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:52.529952 env[1631]: time="2023-10-02T19:09:52.529868601Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:09:52.529952 env[1631]: time="2023-10-02T19:09:52.529922190Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:09:52.530275 env[1631]: time="2023-10-02T19:09:52.529937950Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:09:52.530741 env[1631]: time="2023-10-02T19:09:52.530671959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128 pid=3493 runtime=io.containerd.runc.v2
Oct  2 19:09:52.564518 systemd[1]: Started cri-containerd-e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128.scope.
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.591000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.592000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.592000 audit: BPF prog-id=101 op=LOAD
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit: BPF prog-id=102 op=LOAD
Oct  2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c000195c70 items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit: BPF prog-id=103 op=LOAD
Oct  2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c000195cb8 items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131
Oct  2 19:09:52.595000 audit: BPF prog-id=103 op=UNLOAD
Oct  2 19:09:52.595000 audit: BPF prog-id=102 op=UNLOAD
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { perfmon } for  pid=3503 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit[3503]: AVC avc:  denied  { bpf } for  pid=3503 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:52.595000 audit: BPF prog-id=104 op=LOAD
Oct  2 19:09:52.595000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c0004080c8 items=0 ppid=3493 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538613934323236626661313139303161326636376333333662393131
Oct  2 19:09:52.645313 env[1631]: time="2023-10-02T19:09:52.645269661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-2q846,Uid:0200515e-beda-471c-bad0-c5545f30329b,Namespace:default,Attempt:1,} returns sandbox id \"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128\""
Oct  2 19:09:52.647401 env[1631]: time="2023-10-02T19:09:52.647358776Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Oct  2 19:09:52.827578 kubelet[2095]: E1002 19:09:52.827416    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:52.853000 audit[3552]: NETFILTER_CFG table=filter:85 family=2 entries=7 op=nft_register_rule pid=3552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:52.853000 audit[3552]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe3b71e970 a2=0 a3=7ffe3b71e95c items=0 ppid=2357 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:52.858000 audit[3552]: NETFILTER_CFG table=nat:86 family=2 entries=78 op=nft_register_rule pid=3552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:52.858000 audit[3552]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe3b71e970 a2=0 a3=7ffe3b71e95c items=0 ppid=2357 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:52.928000 audit[3580]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:52.928000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdb14c8790 a2=0 a3=7ffdb14c877c items=0 ppid=2357 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:52.929000 audit[3580]: NETFILTER_CFG table=nat:88 family=2 entries=78 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:52.929000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdb14c8790 a2=0 a3=7ffdb14c877c items=0 ppid=2357 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:52.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:53.000707 kubelet[2095]: I1002 19:09:53.000668    2095 topology_manager.go:205] "Topology Admit Handler"
Oct  2 19:09:53.006121 systemd[1]: Created slice kubepods-besteffort-podc993a8e3_0888_4b16_ac95_795d1c5ddcf1.slice.
Oct  2 19:09:53.180892 kubelet[2095]: I1002 19:09:53.180849    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c993a8e3-0888-4b16-ac95-795d1c5ddcf1-calico-apiserver-certs\") pod \"calico-apiserver-75b9cbccd6-qsd92\" (UID: \"c993a8e3-0888-4b16-ac95-795d1c5ddcf1\") " pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92"
Oct  2 19:09:53.181077 kubelet[2095]: I1002 19:09:53.180914    2095 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mb7z6\" (UniqueName: \"kubernetes.io/projected/c993a8e3-0888-4b16-ac95-795d1c5ddcf1-kube-api-access-mb7z6\") pod \"calico-apiserver-75b9cbccd6-qsd92\" (UID: \"c993a8e3-0888-4b16-ac95-795d1c5ddcf1\") " pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92"
Oct  2 19:09:53.310997 env[1631]: time="2023-10-02T19:09:53.310949274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b9cbccd6-qsd92,Uid:c993a8e3-0888-4b16-ac95-795d1c5ddcf1,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 19:09:53.548682 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:09:53.549215 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibce2ae800fa: link becomes ready
Oct  2 19:09:53.561019 systemd-networkd[1452]: calibce2ae800fa: Link UP
Oct  2 19:09:53.561043 systemd-networkd[1452]: calibce2ae800fa: Gained carrier
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.415 [INFO][3584] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0 calico-apiserver-75b9cbccd6- calico-apiserver  c993a8e3-0888-4b16-ac95-795d1c5ddcf1 1014 0 2023-10-02 19:09:52 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75b9cbccd6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  172.31.31.246  calico-apiserver-75b9cbccd6-qsd92 eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibce2ae800fa  [] []}} ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.415 [INFO][3584] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.463 [INFO][3595] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" HandleID="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Workload="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.478 [INFO][3595] ipam_plugin.go 269: Auto assigning IP ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" HandleID="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Workload="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010d110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.31.246", "pod":"calico-apiserver-75b9cbccd6-qsd92", "timestamp":"2023-10-02 19:09:53.463532954 +0000 UTC"}, Hostname:"172.31.31.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:09:53.595839 env[1631]: time="2023-10-02T19:09:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:09:53.595839 env[1631]: time="2023-10-02T19:09:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.478 [INFO][3595] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.246'
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.485 [INFO][3595] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.494 [INFO][3595] ipam.go 372: Looking up existing affinities for host host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.502 [INFO][3595] ipam.go 489: Trying affinity for 192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.505 [INFO][3595] ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.507 [INFO][3595] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.507 [INFO][3595] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.510 [INFO][3595] ipam.go 1682: Creating new handle: k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.515 [INFO][3595] ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.536 [INFO][3595] ipam.go 1216: Successfully claimed IPs: [192.168.127.67/26] block=192.168.127.64/26 handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.536 [INFO][3595] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.67/26] handle="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" host="172.31.31.246"
Oct  2 19:09:53.595839 env[1631]: time="2023-10-02T19:09:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:09:53.595839 env[1631]: 2023-10-02 19:09:53.537 [INFO][3595] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.127.67/26] IPv6=[] ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" HandleID="k8s-pod-network.c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Workload="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.540 [INFO][3584] k8s.go 383: Populated endpoint ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0", GenerateName:"calico-apiserver-75b9cbccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"c993a8e3-0888-4b16-ac95-795d1c5ddcf1", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 52, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b9cbccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"", Pod:"calico-apiserver-75b9cbccd6-qsd92", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibce2ae800fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.540 [INFO][3584] k8s.go 384: Calico CNI using IPs: [192.168.127.67/32] ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.541 [INFO][3584] dataplane_linux.go 68: Setting the host side veth name to calibce2ae800fa ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.553 [INFO][3584] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.562 [INFO][3584] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0", GenerateName:"calico-apiserver-75b9cbccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"c993a8e3-0888-4b16-ac95-795d1c5ddcf1", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 52, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b9cbccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd", Pod:"calico-apiserver-75b9cbccd6-qsd92", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibce2ae800fa", MAC:"72:ca:98:42:5a:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:53.596920 env[1631]: 2023-10-02 19:09:53.572 [INFO][3584] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-qsd92" WorkloadEndpoint="172.31.31.246-k8s-calico--apiserver--75b9cbccd6--qsd92-eth0"
Oct  2 19:09:53.620664 env[1631]: time="2023-10-02T19:09:53.620570690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:09:53.620899 env[1631]: time="2023-10-02T19:09:53.620869470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:09:53.621316 env[1631]: time="2023-10-02T19:09:53.621010913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:09:53.621817 env[1631]: time="2023-10-02T19:09:53.621781250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd pid=3630 runtime=io.containerd.runc.v2
Oct  2 19:09:53.628000 audit[3641]: NETFILTER_CFG table=filter:89 family=2 entries=51 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:09:53.628000 audit[3641]: SYSCALL arch=c000003e syscall=46 success=yes exit=26916 a0=3 a1=7ffe3b3101e0 a2=0 a3=7ffe3b3101cc items=0 ppid=3039 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:53.628000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:09:53.646698 systemd[1]: Started cri-containerd-c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd.scope.
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.666000 audit: BPF prog-id=105 op=LOAD
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.668000 audit: BPF prog-id=106 op=LOAD
Oct  2 19:09:53.668000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024390 items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.669000 audit: BPF prog-id=107 op=LOAD
Oct  2 19:09:53.669000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243d8 items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:53.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465
Oct  2 19:09:53.670000 audit: BPF prog-id=107 op=UNLOAD
Oct  2 19:09:53.670000 audit: BPF prog-id=106 op=UNLOAD
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { perfmon } for  pid=3642 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit[3642]: AVC avc:  denied  { bpf } for  pid=3642 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:09:53.671000 audit: BPF prog-id=108 op=LOAD
Oct  2 19:09:53.671000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247e8 items=0 ppid=3630 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:53.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338376233333530646466363465326331616639376238653761393465
Oct  2 19:09:53.705725 env[1631]: time="2023-10-02T19:09:53.705681666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b9cbccd6-qsd92,Uid:c993a8e3-0888-4b16-ac95-795d1c5ddcf1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c87b3350ddf64e2c1af97b8e7a94ee685cd890b0f2a0210b8e14fb443f3eb4cd\""
Oct  2 19:09:53.827816 kubelet[2095]: E1002 19:09:53.827628    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:53.939088 systemd-networkd[1452]: cali75013a7843e: Gained IPv6LL
Oct  2 19:09:54.765683 systemd-networkd[1452]: calibce2ae800fa: Gained IPv6LL
Oct  2 19:09:54.828800 kubelet[2095]: E1002 19:09:54.828704    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:55.331000 audit[3695]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:55.331000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd74ed9ab0 a2=0 a3=7ffd74ed9a9c items=0 ppid=2357 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:55.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:55.334000 audit[3695]: NETFILTER_CFG table=nat:91 family=2 entries=78 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:09:55.334000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd74ed9ab0 a2=0 a3=7ffd74ed9a9c items=0 ppid=2357 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:09:55.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:09:55.829643 kubelet[2095]: E1002 19:09:55.829479    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:56.241687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1282469184.mount: Deactivated successfully.
Oct  2 19:09:56.830586 kubelet[2095]: E1002 19:09:56.830546    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:57.830714 kubelet[2095]: E1002 19:09:57.830661    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:58.831508 kubelet[2095]: E1002 19:09:58.831461    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:59.474219 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.4HDlz6.mount: Deactivated successfully.
Oct  2 19:09:59.788688 kubelet[2095]: E1002 19:09:59.788583    2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:59.831782 kubelet[2095]: E1002 19:09:59.831742    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:09:59.832429 env[1631]: time="2023-10-02T19:09:59.832009571Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\""
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.889 [WARNING][3742] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] k8s.go 576: Cleaning up netns ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns=""
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] k8s.go 583: Releasing IP address(es) ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.890 [INFO][3742] utils.go 196: Calico CNI releasing IP address ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.927 [INFO][3748] ipam_plugin.go 416: Releasing address using handleID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:59.942708 env[1631]: time="2023-10-02T19:09:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:09:59.942708 env[1631]: time="2023-10-02T19:09:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.937 [WARNING][3748] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.937 [INFO][3748] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:09:59.942708 env[1631]: time="2023-10-02T19:09:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:09:59.942708 env[1631]: 2023-10-02 19:09:59.941 [INFO][3742] k8s.go 589: Teardown processing complete. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.942744288Z" level=info msg="TearDown network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" successfully"
Oct  2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.942782004Z" level=info msg="StopPodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" returns successfully"
Oct  2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.943851160Z" level=info msg="RemovePodSandbox for \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\""
Oct  2 19:09:59.944207 env[1631]: time="2023-10-02T19:09:59.943924988Z" level=info msg="Forcibly stopping sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\""
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.019 [WARNING][3767] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-csi--node--driver--dvc2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e1de0828-193f-4683-ba3e-878e95d625b9", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 33, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"3a55279912756351c8ebec5c14e78442015ad4f5d37bbd17493daf130fea600a", Pod:"csi-node-driver-dvc2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic815af077cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.019 [INFO][3767] k8s.go 576: Cleaning up netns ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.020 [INFO][3767] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" iface="eth0" netns=""
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.020 [INFO][3767] k8s.go 583: Releasing IP address(es) ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.020 [INFO][3767] utils.go 196: Calico CNI releasing IP address ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.075 [INFO][3773] ipam_plugin.go 416: Releasing address using handleID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:10:00.099342 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:10:00.099342 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.091 [WARNING][3773] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.091 [INFO][3773] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" HandleID="k8s-pod-network.5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430" Workload="172.31.31.246-k8s-csi--node--driver--dvc2s-eth0"
Oct  2 19:10:00.099342 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:10:00.099342 env[1631]: 2023-10-02 19:10:00.097 [INFO][3767] k8s.go 589: Teardown processing complete. ContainerID="5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430"
Oct  2 19:10:00.100693 env[1631]: time="2023-10-02T19:10:00.100622812Z" level=info msg="TearDown network for sandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" successfully"
Oct  2 19:10:00.106150 env[1631]: time="2023-10-02T19:10:00.106075257Z" level=info msg="RemovePodSandbox \"5094504011540f5df2e2e3821ba85dc24abc9f55ff2cee83b04d2370aa356430\" returns successfully"
Oct  2 19:10:00.106676 env[1631]: time="2023-10-02T19:10:00.106646636Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\""
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.172 [WARNING][3792] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.172 [INFO][3792] k8s.go 576: Cleaning up netns ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.173 [INFO][3792] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns=""
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.173 [INFO][3792] k8s.go 583: Releasing IP address(es) ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.173 [INFO][3792] utils.go 196: Calico CNI releasing IP address ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.213 [INFO][3799] ipam_plugin.go 416: Releasing address using handleID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:10:00.233340 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:10:00.233340 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.225 [WARNING][3799] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.225 [INFO][3799] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:10:00.233340 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:10:00.233340 env[1631]: 2023-10-02 19:10:00.231 [INFO][3792] k8s.go 589: Teardown processing complete. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.234381 env[1631]: time="2023-10-02T19:10:00.233443189Z" level=info msg="TearDown network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" successfully"
Oct  2 19:10:00.234381 env[1631]: time="2023-10-02T19:10:00.233507839Z" level=info msg="StopPodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" returns successfully"
Oct  2 19:10:00.235114 env[1631]: time="2023-10-02T19:10:00.235079847Z" level=info msg="RemovePodSandbox for \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\""
Oct  2 19:10:00.235222 env[1631]: time="2023-10-02T19:10:00.235117083Z" level=info msg="Forcibly stopping sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\""
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.296 [WARNING][3817] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"0200515e-beda-471c-bad0-c5545f30329b", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.246", ContainerID:"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128", Pod:"nginx-deployment-5bbcdd876f-2q846", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali75013a7843e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] k8s.go 576: Cleaning up netns ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" iface="eth0" netns=""
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] k8s.go 583: Releasing IP address(es) ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.297 [INFO][3817] utils.go 196: Calico CNI releasing IP address ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.327 [INFO][3823] ipam_plugin.go 416: Releasing address using handleID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:10:00.343884 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:10:00.343884 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.338 [WARNING][3823] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.338 [INFO][3823] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" HandleID="k8s-pod-network.7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8" Workload="172.31.31.246-k8s-nginx--deployment--5bbcdd876f--2q846-eth0"
Oct  2 19:10:00.343884 env[1631]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:10:00.343884 env[1631]: 2023-10-02 19:10:00.342 [INFO][3817] k8s.go 589: Teardown processing complete. ContainerID="7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8"
Oct  2 19:10:00.344810 env[1631]: time="2023-10-02T19:10:00.343974110Z" level=info msg="TearDown network for sandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" successfully"
Oct  2 19:10:00.348579 env[1631]: time="2023-10-02T19:10:00.348529671Z" level=info msg="RemovePodSandbox \"7cb06d34866149225d8222ee27ff03026f2b049e9ab21b5738e0eb608216f5b8\" returns successfully"
Oct  2 19:10:00.833203 kubelet[2095]: E1002 19:10:00.833156    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:01.833354 kubelet[2095]: E1002 19:10:01.833301    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:02.833517 kubelet[2095]: E1002 19:10:02.833446    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:03.834139 kubelet[2095]: E1002 19:10:03.834069    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:04.835251 kubelet[2095]: E1002 19:10:04.835139    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:05.836828 kubelet[2095]: E1002 19:10:05.836774    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:06.837758 kubelet[2095]: E1002 19:10:06.837707    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:07.838560 kubelet[2095]: E1002 19:10:07.838507    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:08.839710 kubelet[2095]: E1002 19:10:08.839657    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:09.840555 kubelet[2095]: E1002 19:10:09.840509    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:10.841305 kubelet[2095]: E1002 19:10:10.841246    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:11.727481 env[1631]: time="2023-10-02T19:10:11.727433597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:10:11.730148 env[1631]: time="2023-10-02T19:10:11.730107480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:10:11.732596 env[1631]: time="2023-10-02T19:10:11.732558147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:10:11.734808 env[1631]: time="2023-10-02T19:10:11.734772511Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:10:11.735546 env[1631]: time="2023-10-02T19:10:11.735509370Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\""
Oct  2 19:10:11.737889 env[1631]: time="2023-10-02T19:10:11.737861629Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 19:10:11.738991 env[1631]: time="2023-10-02T19:10:11.738912811Z" level=info msg="CreateContainer within sandbox \"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Oct  2 19:10:11.763439 env[1631]: time="2023-10-02T19:10:11.763388052Z" level=info msg="CreateContainer within sandbox \"e8a94226bfa11901a2f67c336b911bbb6119ffd285a8ef08048fd1bc60c01128\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368\""
Oct  2 19:10:11.764331 env[1631]: time="2023-10-02T19:10:11.764287133Z" level=info msg="StartContainer for \"db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368\""
Oct  2 19:10:11.797870 systemd[1]: Started cri-containerd-db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368.scope.
Oct  2 19:10:11.827048 kernel: kauditd_printk_skb: 188 callbacks suppressed
Oct  2 19:10:11.827249 kernel: audit: type=1400 audit(1696273811.819:837): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.837826 kernel: audit: type=1400 audit(1696273811.819:838): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.837966 kernel: audit: type=1400 audit(1696273811.819:839): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.819000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.820000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.842788 kubelet[2095]: E1002 19:10:11.842686    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:11.843147 kernel: audit: type=1400 audit(1696273811.820:840): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.820000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.853500 kernel: audit: type=1400 audit(1696273811.820:841): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.853614 kernel: audit: type=1400 audit(1696273811.820:842): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.820000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.820000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.858550 kernel: audit: type=1400 audit(1696273811.820:843): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.820000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.866065 kernel: audit: type=1400 audit(1696273811.820:844): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.820000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.877684 kernel: audit: type=1400 audit(1696273811.820:845): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.877809 kernel: audit: type=1400 audit(1696273811.826:846): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit: BPF prog-id=109 op=LOAD
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:11.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:11.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.826000 audit: BPF prog-id=110 op=LOAD
Oct  2 19:10:11.826000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002936e0 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:11.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit: BPF prog-id=111 op=LOAD
Oct  2 19:10:11.831000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000293728 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:11.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465
Oct  2 19:10:11.831000 audit: BPF prog-id=111 op=UNLOAD
Oct  2 19:10:11.831000 audit: BPF prog-id=110 op=UNLOAD
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { perfmon } for  pid=3866 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit[3866]: AVC avc:  denied  { bpf } for  pid=3866 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:10:11.831000 audit: BPF prog-id=112 op=LOAD
Oct  2 19:10:11.831000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000293b38 items=0 ppid=3493 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:11.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393835316164633163303934383039643765326261353337666465
Oct  2 19:10:11.886875 env[1631]: time="2023-10-02T19:10:11.886824353Z" level=info msg="StartContainer for \"db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368\" returns successfully"
Oct  2 19:10:11.938667 env[1631]: time="2023-10-02T19:10:11.938523677Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:10:11.939859 env[1631]: time="2023-10-02T19:10:11.939806714Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:10:11.940272 kubelet[2095]: E1002 19:10:11.940237    2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:10:11.940380 kubelet[2095]: E1002 19:10:11.940298    2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 19:10:11.940568 kubelet[2095]: E1002 19:10:11.940546    2095 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mb7z6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75b9cbccd6-qsd92_calico-apiserver(c993a8e3-0888-4b16-ac95-795d1c5ddcf1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:10:11.940736 kubelet[2095]: E1002 19:10:11.940614    2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92" podUID=c993a8e3-0888-4b16-ac95-795d1c5ddcf1
Oct  2 19:10:11.941205 env[1631]: time="2023-10-02T19:10:11.941181421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:10:12.135904 env[1631]: time="2023-10-02T19:10:12.135846995Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:10:12.137233 env[1631]: time="2023-10-02T19:10:12.137169875Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:10:12.137579 kubelet[2095]: E1002 19:10:12.137546    2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:10:12.137663 kubelet[2095]: E1002 19:10:12.137603    2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:10:12.137773 kubelet[2095]: E1002 19:10:12.137753    2095 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:10:12.139204 env[1631]: time="2023-10-02T19:10:12.139171866Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:10:12.312358 env[1631]: time="2023-10-02T19:10:12.312277202Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:10:12.313762 env[1631]: time="2023-10-02T19:10:12.313627287Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:10:12.314217 kubelet[2095]: E1002 19:10:12.314177    2095 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:10:12.314326 kubelet[2095]: E1002 19:10:12.314243    2095 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:10:12.314839 kubelet[2095]: E1002 19:10:12.314810    2095 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rh7mx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-dvc2s_calico-system(e1de0828-193f-4683-ba3e-878e95d625b9): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:10:12.315380 kubelet[2095]: E1002 19:10:12.314890    2095 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-dvc2s" podUID=e1de0828-193f-4683-ba3e-878e95d625b9
Oct  2 19:10:12.346741 kubelet[2095]: E1002 19:10:12.346713    2095 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-qsd92" podUID=c993a8e3-0888-4b16-ac95-795d1c5ddcf1
Oct  2 19:10:12.456000 audit[3944]: NETFILTER_CFG table=filter:92 family=2 entries=8 op=nft_register_rule pid=3944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:10:12.456000 audit[3944]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe1c0d6c70 a2=0 a3=7ffe1c0d6c5c items=0 ppid=2357 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:12.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:10:12.459000 audit[3944]: NETFILTER_CFG table=nat:93 family=2 entries=78 op=nft_register_rule pid=3944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:10:12.459000 audit[3944]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe1c0d6c70 a2=0 a3=7ffe1c0d6c5c items=0 ppid=2357 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:10:12.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:10:12.750752 systemd[1]: run-containerd-runc-k8s.io-db9851adc1c094809d7e2ba537fde92011d8978ed59bd1aabcc194463a340368-runc.Je4ukG.mount: Deactivated successfully.
Oct  2 19:10:12.843602 kubelet[2095]: E1002 19:10:12.843552    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:13.843977 kubelet[2095]: E1002 19:10:13.843939    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:14.844796 kubelet[2095]: E1002 19:10:14.844745    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:15.845153 kubelet[2095]: E1002 19:10:15.845100    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:16.846154 kubelet[2095]: E1002 19:10:16.846113    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:17.847589 kubelet[2095]: E1002 19:10:17.847530    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:18.848513 kubelet[2095]: E1002 19:10:18.848471    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:19.479404 systemd[1]: run-containerd-runc-k8s.io-2951aa4b76a0bc21806a38d8f2d1e5f8942e639d7ea6b3f6e0daf5654dee851d-runc.zrJoSH.mount: Deactivated successfully.
Oct  2 19:10:19.788568 kubelet[2095]: E1002 19:10:19.788455    2095 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:19.849090 kubelet[2095]: E1002 19:10:19.848966    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Oct  2 19:10:20.849611 kubelet[2095]: E1002 19:10:20.849560    2095 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"