Oct 2 19:08:29.291957 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:08:29.291996 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:29.292013 kernel: BIOS-provided physical RAM map: Oct 2 19:08:29.292026 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:08:29.292037 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:08:29.292048 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:08:29.292066 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:08:29.292077 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:08:29.292087 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:08:29.292099 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:08:29.292111 kernel: NX (Execute Disable) protection: active Oct 2 19:08:29.292121 kernel: SMBIOS 2.7 present. Oct 2 19:08:29.292133 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:08:29.292145 kernel: Hypervisor detected: KVM Oct 2 19:08:29.292163 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:08:29.292176 kernel: kvm-clock: cpu 0, msr 55f8a001, primary cpu clock Oct 2 19:08:29.292189 kernel: kvm-clock: using sched offset of 6983388505 cycles Oct 2 19:08:29.292203 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:08:29.292216 kernel: tsc: Detected 2499.996 MHz processor Oct 2 19:08:29.292229 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:08:29.292245 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:08:29.292258 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:08:29.292289 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:08:29.292300 kernel: Using GB pages for direct mapping Oct 2 19:08:29.292313 kernel: ACPI: Early table checksum verification disabled Oct 2 19:08:29.292325 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:08:29.292338 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:08:29.292351 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:08:29.292363 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:08:29.292380 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:08:29.292392 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:08:29.292405 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:08:29.292418 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:08:29.292432 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:08:29.292445 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:08:29.292458 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:08:29.292471 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:08:29.292487 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:08:29.292740 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:08:29.292759 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:08:29.292780 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:08:29.292795 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:08:29.292908 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:08:29.292923 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:08:29.292941 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:08:29.292954 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:08:29.292966 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:08:29.292980 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:08:29.292994 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:08:29.293007 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:08:29.293021 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:08:29.293035 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:08:29.293052 kernel: Zone ranges: Oct 2 19:08:29.293066 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:08:29.293080 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:08:29.293095 kernel: Normal empty Oct 2 19:08:29.293109 kernel: Movable zone start for each node Oct 2 19:08:29.293122 kernel: Early memory node ranges Oct 2 19:08:29.293136 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:08:29.293150 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:08:29.293164 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:08:29.293181 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:08:29.293195 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:08:29.293209 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:08:29.293223 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:08:29.293237 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:08:29.293251 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:08:29.293292 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:08:29.293306 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:08:29.293320 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:08:29.293338 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:08:29.293352 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:08:29.293366 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:08:29.293380 kernel: TSC deadline timer available Oct 2 19:08:29.293394 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:08:29.293408 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:08:29.293423 kernel: Booting paravirtualized kernel on KVM Oct 2 19:08:29.293437 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:08:29.293450 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:08:29.293467 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:08:29.293481 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:08:29.293495 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:08:29.293508 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:08:29.293523 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:08:29.293537 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:08:29.293551 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:08:29.293565 kernel: Policy zone: DMA32 Oct 2 19:08:29.293579 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:29.293597 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:08:29.293610 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:08:29.293624 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:08:29.293638 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:08:29.293652 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:08:29.293666 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:08:29.293680 kernel: Kernel/User page tables isolation: enabled Oct 2 19:08:29.293694 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:08:29.293710 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:08:29.293725 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:08:29.293740 kernel: rcu: RCU event tracing is enabled. Oct 2 19:08:29.293754 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:08:29.293769 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:08:29.293784 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:08:29.293864 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:08:29.293881 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:08:29.293896 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:08:29.293913 kernel: random: crng init done Oct 2 19:08:29.293927 kernel: Console: colour VGA+ 80x25 Oct 2 19:08:29.293941 kernel: printk: console [ttyS0] enabled Oct 2 19:08:29.293956 kernel: ACPI: Core revision 20210730 Oct 2 19:08:29.293970 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:08:29.293984 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:08:29.293998 kernel: x2apic enabled Oct 2 19:08:29.294012 kernel: Switched APIC routing to physical x2apic. Oct 2 19:08:29.294027 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:08:29.294041 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Oct 2 19:08:29.294057 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:08:29.294071 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:08:29.294086 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:08:29.294110 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:08:29.294127 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:08:29.294141 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:08:29.294156 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:08:29.294171 kernel: RETBleed: Vulnerable Oct 2 19:08:29.294185 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:08:29.294200 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:08:29.294214 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:08:29.294229 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:08:29.294243 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:08:29.294260 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:08:29.294290 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:08:29.294302 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:08:29.294315 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:08:29.294329 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:08:29.294343 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:08:29.294360 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:08:29.294374 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:08:29.294388 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:08:29.294402 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:08:29.294416 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:08:29.294430 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:08:29.294445 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:08:29.294458 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:08:29.294472 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:08:29.294559 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:08:29.294573 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:08:29.294591 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:08:29.294605 kernel: LSM: Security Framework initializing Oct 2 19:08:29.294619 kernel: SELinux: Initializing. Oct 2 19:08:29.294634 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:08:29.294648 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:08:29.294662 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:08:29.294741 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:08:29.294756 kernel: signal: max sigframe size: 3632 Oct 2 19:08:29.294770 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:08:29.294785 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:08:29.294833 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:08:29.294854 kernel: x86: Booting SMP configuration: Oct 2 19:08:29.294868 kernel: .... node #0, CPUs: #1 Oct 2 19:08:29.294883 kernel: kvm-clock: cpu 1, msr 55f8a041, secondary cpu clock Oct 2 19:08:29.294898 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:08:29.294913 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:08:29.294929 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:08:29.294943 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:08:29.294957 kernel: smpboot: Max logical packages: 1 Oct 2 19:08:29.294975 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Oct 2 19:08:29.294988 kernel: devtmpfs: initialized Oct 2 19:08:29.295001 kernel: x86/mm: Memory block size: 128MB Oct 2 19:08:29.295015 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:08:29.295030 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:08:29.295044 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:08:29.295059 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:08:29.295073 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:08:29.295088 kernel: audit: type=2000 audit(1696273707.436:1): state=initialized audit_enabled=0 res=1 Oct 2 19:08:29.295105 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:08:29.295119 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:08:29.295134 kernel: cpuidle: using governor menu Oct 2 19:08:29.295148 kernel: ACPI: bus type PCI registered Oct 2 19:08:29.295163 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:08:29.295178 kernel: dca service started, version 1.12.1 Oct 2 19:08:29.295192 kernel: PCI: Using configuration type 1 for base access Oct 2 19:08:29.295207 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:08:29.295222 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:08:29.295239 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:08:29.295253 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:08:29.295291 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:08:29.295303 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:08:29.295315 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:08:29.295327 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:08:29.295338 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:08:29.295350 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:08:29.295362 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:08:29.295377 kernel: ACPI: Interpreter enabled Oct 2 19:08:29.295389 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:08:29.295400 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:08:29.295415 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:08:29.295428 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:08:29.295442 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:08:29.295661 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:08:29.295888 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:08:29.295916 kernel: acpiphp: Slot [3] registered Oct 2 19:08:29.295932 kernel: acpiphp: Slot [4] registered Oct 2 19:08:29.295947 kernel: acpiphp: Slot [5] registered Oct 2 19:08:29.295962 kernel: acpiphp: Slot [6] registered Oct 2 19:08:29.295974 kernel: acpiphp: Slot [7] registered Oct 2 19:08:29.296500 kernel: acpiphp: Slot [8] registered Oct 2 19:08:29.296535 kernel: acpiphp: Slot [9] registered Oct 2 19:08:29.296550 kernel: acpiphp: Slot [10] registered Oct 2 19:08:29.296565 kernel: acpiphp: Slot [11] registered Oct 2 19:08:29.296585 kernel: acpiphp: Slot [12] registered Oct 2 19:08:29.296600 kernel: acpiphp: Slot [13] registered Oct 2 19:08:29.296614 kernel: acpiphp: Slot [14] registered Oct 2 19:08:29.296627 kernel: acpiphp: Slot [15] registered Oct 2 19:08:29.296639 kernel: acpiphp: Slot [16] registered Oct 2 19:08:29.296652 kernel: acpiphp: Slot [17] registered Oct 2 19:08:29.296666 kernel: acpiphp: Slot [18] registered Oct 2 19:08:29.296849 kernel: acpiphp: Slot [19] registered Oct 2 19:08:29.296865 kernel: acpiphp: Slot [20] registered Oct 2 19:08:29.296879 kernel: acpiphp: Slot [21] registered Oct 2 19:08:29.296899 kernel: acpiphp: Slot [22] registered Oct 2 19:08:29.296913 kernel: acpiphp: Slot [23] registered Oct 2 19:08:29.296928 kernel: acpiphp: Slot [24] registered Oct 2 19:08:29.296943 kernel: acpiphp: Slot [25] registered Oct 2 19:08:29.296958 kernel: acpiphp: Slot [26] registered Oct 2 19:08:29.296972 kernel: acpiphp: Slot [27] registered Oct 2 19:08:29.296988 kernel: acpiphp: Slot [28] registered Oct 2 19:08:29.297003 kernel: acpiphp: Slot [29] registered Oct 2 19:08:29.297017 kernel: acpiphp: Slot [30] registered Oct 2 19:08:29.297034 kernel: acpiphp: Slot [31] registered Oct 2 19:08:29.297127 kernel: PCI host bridge to bus 0000:00 Oct 2 19:08:29.297304 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:08:29.297426 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:08:29.297540 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:08:29.297650 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:08:29.297763 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:08:29.298016 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:08:29.298168 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:08:29.298322 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:08:29.298451 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:08:29.298580 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:08:29.298777 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:08:29.298989 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:08:29.299122 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:08:29.299338 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:08:29.299472 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:08:29.299694 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:08:29.299884 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:08:29.300020 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:08:29.300148 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:08:29.300333 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:08:29.300625 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:08:29.300761 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:08:29.301063 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:08:29.301198 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:08:29.301220 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:08:29.301241 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:08:29.301257 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:08:29.301301 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:08:29.301317 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:08:29.301332 kernel: iommu: Default domain type: Translated Oct 2 19:08:29.301347 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:08:29.301570 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:08:29.301709 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:08:29.301886 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:08:29.301913 kernel: vgaarb: loaded Oct 2 19:08:29.301928 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:08:29.301944 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:08:29.301959 kernel: PTP clock support registered Oct 2 19:08:29.301974 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:08:29.301989 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:08:29.302004 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:08:29.302019 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:08:29.302032 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:08:29.302051 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:08:29.302068 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:08:29.302083 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:08:29.302099 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:08:29.302114 kernel: pnp: PnP ACPI init Oct 2 19:08:29.302129 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:08:29.302144 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:08:29.302159 kernel: NET: Registered PF_INET protocol family Oct 2 19:08:29.302174 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:08:29.302193 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:08:29.302208 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:08:29.302223 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:08:29.302237 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:08:29.302252 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:08:29.302279 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:08:29.302294 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:08:29.302309 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:08:29.302328 kernel: NET: Registered PF_XDP protocol family Oct 2 19:08:29.302452 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:08:29.302568 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:08:29.302737 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:08:29.302904 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:08:29.303040 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:08:29.303260 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:08:29.303306 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:08:29.303327 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:08:29.303344 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:08:29.303359 kernel: clocksource: Switched to clocksource tsc Oct 2 19:08:29.303374 kernel: Initialise system trusted keyrings Oct 2 19:08:29.303388 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:08:29.303403 kernel: Key type asymmetric registered Oct 2 19:08:29.303418 kernel: Asymmetric key parser 'x509' registered Oct 2 19:08:29.303433 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:08:29.303448 kernel: io scheduler mq-deadline registered Oct 2 19:08:29.303468 kernel: io scheduler kyber registered Oct 2 19:08:29.303483 kernel: io scheduler bfq registered Oct 2 19:08:29.303498 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:08:29.303514 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:08:29.303529 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:08:29.303545 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:08:29.303561 kernel: i8042: Warning: Keylock active Oct 2 19:08:29.303576 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:08:29.303591 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:08:29.303906 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:08:29.304036 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:08:29.304159 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:08:28 UTC (1696273708) Oct 2 19:08:29.305322 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:08:29.305349 kernel: intel_pstate: CPU model not supported Oct 2 19:08:29.305367 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:08:29.305382 kernel: Segment Routing with IPv6 Oct 2 19:08:29.305403 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:08:29.305419 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:08:29.305434 kernel: Key type dns_resolver registered Oct 2 19:08:29.305450 kernel: IPI shorthand broadcast: enabled Oct 2 19:08:29.305465 kernel: sched_clock: Marking stable (599800080, 298718559)->(1118714618, -220195979) Oct 2 19:08:29.305480 kernel: registered taskstats version 1 Oct 2 19:08:29.305496 kernel: Loading compiled-in X.509 certificates Oct 2 19:08:29.305511 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:08:29.305598 kernel: Key type .fscrypt registered Oct 2 19:08:29.305615 kernel: Key type fscrypt-provisioning registered Oct 2 19:08:29.305634 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:08:29.305650 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:08:29.305665 kernel: ima: No architecture policies found Oct 2 19:08:29.305680 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:08:29.305695 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:08:29.305711 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:08:29.305726 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:08:29.305741 kernel: Run /init as init process Oct 2 19:08:29.305759 kernel: with arguments: Oct 2 19:08:29.305774 kernel: /init Oct 2 19:08:29.305835 kernel: with environment: Oct 2 19:08:29.305853 kernel: HOME=/ Oct 2 19:08:29.305869 kernel: TERM=linux Oct 2 19:08:29.305883 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:08:29.305902 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:08:29.305921 systemd[1]: Detected virtualization amazon. Oct 2 19:08:29.305942 systemd[1]: Detected architecture x86-64. Oct 2 19:08:29.305957 systemd[1]: Running in initrd. Oct 2 19:08:29.305972 systemd[1]: No hostname configured, using default hostname. Oct 2 19:08:29.305988 systemd[1]: Hostname set to . Oct 2 19:08:29.306023 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:08:29.306039 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:08:29.306058 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:08:29.306074 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:08:29.306090 systemd[1]: Reached target cryptsetup.target. Oct 2 19:08:29.306107 systemd[1]: Reached target paths.target. Oct 2 19:08:29.306123 systemd[1]: Reached target slices.target. Oct 2 19:08:29.306138 systemd[1]: Reached target swap.target. Oct 2 19:08:29.306155 systemd[1]: Reached target timers.target. Oct 2 19:08:29.306175 systemd[1]: Listening on iscsid.socket. Oct 2 19:08:29.306192 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:08:29.306208 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:08:29.306225 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:08:29.306242 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:08:29.306258 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:08:29.308415 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:08:29.308435 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:08:29.308452 systemd[1]: Reached target sockets.target. Oct 2 19:08:29.308474 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:08:29.308569 systemd[1]: Finished network-cleanup.service. Oct 2 19:08:29.308586 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:08:29.308602 systemd[1]: Starting systemd-journald.service... Oct 2 19:08:29.308618 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:08:29.308635 systemd[1]: Starting systemd-resolved.service... Oct 2 19:08:29.308652 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:08:29.308681 systemd-journald[185]: Journal started Oct 2 19:08:29.308770 systemd-journald[185]: Runtime Journal (/run/log/journal/ec281acbe342f9fd6f838882ef013a7e) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:08:29.329299 systemd[1]: Started systemd-journald.service. Oct 2 19:08:29.354765 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:08:29.606225 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:08:29.606260 kernel: Bridge firewalling registered Oct 2 19:08:29.606349 kernel: SCSI subsystem initialized Oct 2 19:08:29.606363 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:08:29.606375 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:08:29.606391 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:08:29.606405 kernel: audit: type=1130 audit(1696273709.593:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.606417 kernel: audit: type=1130 audit(1696273709.603:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.354785 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:08:29.354830 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:08:29.357327 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:08:29.359715 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:08:29.662865 kernel: audit: type=1130 audit(1696273709.640:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.662893 kernel: audit: type=1130 audit(1696273709.643:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.415102 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:08:29.670989 kernel: audit: type=1130 audit(1696273709.661:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.461689 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:08:29.680256 kernel: audit: type=1130 audit(1696273709.669:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.595447 systemd[1]: Started systemd-resolved.service. Oct 2 19:08:29.605683 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:08:29.641775 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:08:29.644577 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:08:29.663394 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:08:29.671170 systemd[1]: Reached target nss-lookup.target. Oct 2 19:08:29.692985 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:08:29.696716 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:08:29.697882 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:08:29.717290 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:08:29.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.728289 kernel: audit: type=1130 audit(1696273709.716:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.731701 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:08:29.733355 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:08:29.746026 kernel: audit: type=1130 audit(1696273709.731:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.745799 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:08:29.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.756903 kernel: audit: type=1130 audit(1696273709.734:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:29.764646 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:08:29.768572 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:29.864294 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:08:29.882332 kernel: iscsi: registered transport (tcp) Oct 2 19:08:29.913179 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:08:29.913253 kernel: QLogic iSCSI HBA Driver Oct 2 19:08:30.014520 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:08:30.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.024211 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:08:30.112352 kernel: raid6: avx512x4 gen() 2794 MB/s Oct 2 19:08:30.130324 kernel: raid6: avx512x4 xor() 3862 MB/s Oct 2 19:08:30.149316 kernel: raid6: avx512x2 gen() 8992 MB/s Oct 2 19:08:30.167317 kernel: raid6: avx512x2 xor() 10050 MB/s Oct 2 19:08:30.185316 kernel: raid6: avx512x1 gen() 10429 MB/s Oct 2 19:08:30.205315 kernel: raid6: avx512x1 xor() 13866 MB/s Oct 2 19:08:30.222321 kernel: raid6: avx2x4 gen() 10335 MB/s Oct 2 19:08:30.240327 kernel: raid6: avx2x4 xor() 5340 MB/s Oct 2 19:08:30.258319 kernel: raid6: avx2x2 gen() 6246 MB/s Oct 2 19:08:30.275320 kernel: raid6: avx2x2 xor() 13889 MB/s Oct 2 19:08:30.292318 kernel: raid6: avx2x1 gen() 11416 MB/s Oct 2 19:08:30.309317 kernel: raid6: avx2x1 xor() 14154 MB/s Oct 2 19:08:30.327309 kernel: raid6: sse2x4 gen() 8292 MB/s Oct 2 19:08:30.345320 kernel: raid6: sse2x4 xor() 4230 MB/s Oct 2 19:08:30.364319 kernel: raid6: sse2x2 gen() 8403 MB/s Oct 2 19:08:30.381314 kernel: raid6: sse2x2 xor() 5297 MB/s Oct 2 19:08:30.398319 kernel: raid6: sse2x1 gen() 8673 MB/s Oct 2 19:08:30.417107 kernel: raid6: sse2x1 xor() 4228 MB/s Oct 2 19:08:30.417184 kernel: raid6: using algorithm avx2x1 gen() 11416 MB/s Oct 2 19:08:30.417202 kernel: raid6: .... xor() 14154 MB/s, rmw enabled Oct 2 19:08:30.418333 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:08:30.434298 kernel: xor: automatically using best checksumming function avx Oct 2 19:08:30.547396 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:08:30.559866 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:08:30.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.560000 audit: BPF prog-id=7 op=LOAD Oct 2 19:08:30.560000 audit: BPF prog-id=8 op=LOAD Oct 2 19:08:30.562239 systemd[1]: Starting systemd-udevd.service... Oct 2 19:08:30.589538 systemd-udevd[383]: Using default interface naming scheme 'v252'. Oct 2 19:08:30.596711 systemd[1]: Started systemd-udevd.service. Oct 2 19:08:30.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.599229 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:08:30.621021 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Oct 2 19:08:30.654096 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:08:30.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.657483 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:08:30.730820 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:08:30.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:30.804621 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:08:30.804879 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:08:30.810995 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:08:30.820334 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:87:eb:dd:b3:6b Oct 2 19:08:30.838409 (udev-worker)[443]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:30.867307 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:08:30.900313 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:08:30.900383 kernel: AES CTR mode by8 optimization enabled Oct 2 19:08:30.911245 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:08:30.911591 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:08:30.918283 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:08:30.921388 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:08:30.921444 kernel: GPT:9289727 != 16777215 Oct 2 19:08:30.921462 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:08:30.921480 kernel: GPT:9289727 != 16777215 Oct 2 19:08:30.921497 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:08:30.921513 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:31.012304 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (434) Oct 2 19:08:31.037606 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:08:31.071190 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:08:31.112872 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:08:31.134104 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:08:31.134360 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:08:31.135550 systemd[1]: Starting disk-uuid.service... Oct 2 19:08:31.154187 disk-uuid[584]: Primary Header is updated. Oct 2 19:08:31.154187 disk-uuid[584]: Secondary Entries is updated. Oct 2 19:08:31.154187 disk-uuid[584]: Secondary Header is updated. Oct 2 19:08:31.159903 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:31.166284 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:31.171292 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:32.184252 disk-uuid[585]: The operation has completed successfully. Oct 2 19:08:32.189389 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:08:32.374440 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:08:32.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.374563 systemd[1]: Finished disk-uuid.service. Oct 2 19:08:32.381529 systemd[1]: Starting verity-setup.service... Oct 2 19:08:32.415369 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:08:32.497338 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:08:32.501601 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:08:32.505483 systemd[1]: Finished verity-setup.service. Oct 2 19:08:32.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.604732 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:08:32.604655 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:08:32.606072 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:08:32.607097 systemd[1]: Starting ignition-setup.service... Oct 2 19:08:32.618660 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:08:32.632750 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:32.632819 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:08:32.632838 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:08:32.659330 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:08:32.673094 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:08:32.695637 systemd[1]: Finished ignition-setup.service. Oct 2 19:08:32.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.698051 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:08:32.717289 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:08:32.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.718000 audit: BPF prog-id=9 op=LOAD Oct 2 19:08:32.720040 systemd[1]: Starting systemd-networkd.service... Oct 2 19:08:32.748533 systemd-networkd[1097]: lo: Link UP Oct 2 19:08:32.748544 systemd-networkd[1097]: lo: Gained carrier Oct 2 19:08:32.751256 systemd-networkd[1097]: Enumeration completed Oct 2 19:08:32.751588 systemd-networkd[1097]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:08:32.751851 systemd[1]: Started systemd-networkd.service. Oct 2 19:08:32.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.758434 systemd[1]: Reached target network.target. Oct 2 19:08:32.760789 systemd[1]: Starting iscsiuio.service... Oct 2 19:08:32.764806 systemd-networkd[1097]: eth0: Link UP Oct 2 19:08:32.766604 systemd-networkd[1097]: eth0: Gained carrier Oct 2 19:08:32.769512 systemd[1]: Started iscsiuio.service. Oct 2 19:08:32.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.772571 systemd[1]: Starting iscsid.service... Oct 2 19:08:32.777913 iscsid[1102]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:08:32.777913 iscsid[1102]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:08:32.777913 iscsid[1102]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:08:32.777913 iscsid[1102]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:08:32.777913 iscsid[1102]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:08:32.777913 iscsid[1102]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:08:32.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.779792 systemd[1]: Started iscsid.service. Oct 2 19:08:32.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:32.782429 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:08:32.800587 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:08:32.801405 systemd-networkd[1097]: eth0: DHCPv4 address 172.31.17.7/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:08:32.802076 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:08:32.802476 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:08:32.802690 systemd[1]: Reached target remote-fs.target. Oct 2 19:08:32.808115 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:08:32.827879 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:08:32.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.465749 ignition[1085]: Ignition 2.14.0 Oct 2 19:08:33.465765 ignition[1085]: Stage: fetch-offline Oct 2 19:08:33.465899 ignition[1085]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:33.465954 ignition[1085]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:33.495076 ignition[1085]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:33.495676 ignition[1085]: Ignition finished successfully Oct 2 19:08:33.506563 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:08:33.518867 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:08:33.518901 kernel: audit: type=1130 audit(1696273713.509:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.512500 systemd[1]: Starting ignition-fetch.service... Oct 2 19:08:33.526892 ignition[1121]: Ignition 2.14.0 Oct 2 19:08:33.526906 ignition[1121]: Stage: fetch Oct 2 19:08:33.527107 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:33.527138 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:33.541280 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:33.543466 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:33.585213 ignition[1121]: INFO : PUT result: OK Oct 2 19:08:33.589415 ignition[1121]: DEBUG : parsed url from cmdline: "" Oct 2 19:08:33.589415 ignition[1121]: INFO : no config URL provided Oct 2 19:08:33.589415 ignition[1121]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:08:33.589415 ignition[1121]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:08:33.595352 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:33.595352 ignition[1121]: INFO : PUT result: OK Oct 2 19:08:33.595352 ignition[1121]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:08:33.600153 ignition[1121]: INFO : GET result: OK Oct 2 19:08:33.600153 ignition[1121]: DEBUG : parsing config with SHA512: 642a7dfafb96800977cb23a49a0c780e31c4f27794abb22f97707df4970542457b225060cc1a42f6b3b094d33eb11723ddf9bc330ecb22a5a91c47c53aceab39 Oct 2 19:08:33.629016 unknown[1121]: fetched base config from "system" Oct 2 19:08:33.629031 unknown[1121]: fetched base config from "system" Oct 2 19:08:33.629039 unknown[1121]: fetched user config from "aws" Oct 2 19:08:33.632864 ignition[1121]: fetch: fetch complete Oct 2 19:08:33.632875 ignition[1121]: fetch: fetch passed Oct 2 19:08:33.634189 ignition[1121]: Ignition finished successfully Oct 2 19:08:33.643518 systemd[1]: Finished ignition-fetch.service. Oct 2 19:08:33.660729 kernel: audit: type=1130 audit(1696273713.642:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.647712 systemd[1]: Starting ignition-kargs.service... Oct 2 19:08:33.676896 ignition[1127]: Ignition 2.14.0 Oct 2 19:08:33.676909 ignition[1127]: Stage: kargs Oct 2 19:08:33.677112 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:33.677146 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:33.685799 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:33.687294 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:33.689055 ignition[1127]: INFO : PUT result: OK Oct 2 19:08:33.692365 ignition[1127]: kargs: kargs passed Oct 2 19:08:33.692433 ignition[1127]: Ignition finished successfully Oct 2 19:08:33.695153 systemd[1]: Finished ignition-kargs.service. Oct 2 19:08:33.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.698003 systemd[1]: Starting ignition-disks.service... Oct 2 19:08:33.705687 kernel: audit: type=1130 audit(1696273713.695:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.707851 ignition[1133]: Ignition 2.14.0 Oct 2 19:08:33.707863 ignition[1133]: Stage: disks Oct 2 19:08:33.708061 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:33.708092 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:33.718229 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:33.719721 ignition[1133]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:33.721229 ignition[1133]: INFO : PUT result: OK Oct 2 19:08:33.724826 ignition[1133]: disks: disks passed Oct 2 19:08:33.724895 ignition[1133]: Ignition finished successfully Oct 2 19:08:33.727391 systemd[1]: Finished ignition-disks.service. Oct 2 19:08:33.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.727654 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:08:33.737099 kernel: audit: type=1130 audit(1696273713.726:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.737217 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:08:33.739750 systemd[1]: Reached target local-fs.target. Oct 2 19:08:33.741953 systemd[1]: Reached target sysinit.target. Oct 2 19:08:33.744148 systemd[1]: Reached target basic.target. Oct 2 19:08:33.747808 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:08:33.781622 systemd-fsck[1141]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:08:33.785348 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:08:33.795617 kernel: audit: type=1130 audit(1696273713.785:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:33.788427 systemd[1]: Mounting sysroot.mount... Oct 2 19:08:33.808283 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:08:33.810095 systemd[1]: Mounted sysroot.mount. Oct 2 19:08:33.811954 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:08:33.819212 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:08:33.823760 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:08:33.823828 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:08:33.823864 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:08:33.829697 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:08:33.851736 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:08:33.856256 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:08:33.875466 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1158) Oct 2 19:08:33.882378 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:33.882524 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:08:33.882546 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:08:33.882565 initrd-setup-root[1163]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:08:33.901605 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:08:33.909988 initrd-setup-root[1189]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:08:33.918645 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:08:33.929424 initrd-setup-root[1197]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:08:33.936046 initrd-setup-root[1205]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:08:34.171248 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:08:34.187120 kernel: audit: type=1130 audit(1696273714.170:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.172674 systemd[1]: Starting ignition-mount.service... Oct 2 19:08:34.187112 systemd[1]: Starting sysroot-boot.service... Oct 2 19:08:34.216624 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:08:34.216757 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:08:34.258219 ignition[1224]: INFO : Ignition 2.14.0 Oct 2 19:08:34.258219 ignition[1224]: INFO : Stage: mount Oct 2 19:08:34.261514 ignition[1224]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:34.261514 ignition[1224]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:34.270516 systemd[1]: Finished sysroot-boot.service. Oct 2 19:08:34.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.278214 ignition[1224]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:34.278214 ignition[1224]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:34.281330 kernel: audit: type=1130 audit(1696273714.269:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.281429 ignition[1224]: INFO : PUT result: OK Oct 2 19:08:34.285912 ignition[1224]: INFO : mount: mount passed Oct 2 19:08:34.287465 ignition[1224]: INFO : Ignition finished successfully Oct 2 19:08:34.292703 systemd[1]: Finished ignition-mount.service. Oct 2 19:08:34.308897 kernel: audit: type=1130 audit(1696273714.294:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.296702 systemd[1]: Starting ignition-files.service... Oct 2 19:08:34.313925 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:08:34.336287 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1233) Oct 2 19:08:34.342984 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:34.343056 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:08:34.343075 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:08:34.354290 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:08:34.364248 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:08:34.384580 ignition[1252]: INFO : Ignition 2.14.0 Oct 2 19:08:34.384580 ignition[1252]: INFO : Stage: files Oct 2 19:08:34.387424 ignition[1252]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:34.387424 ignition[1252]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:34.400818 ignition[1252]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:34.402917 ignition[1252]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:34.405341 ignition[1252]: INFO : PUT result: OK Oct 2 19:08:34.411340 ignition[1252]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:08:34.417606 ignition[1252]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:08:34.417606 ignition[1252]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:08:34.429086 ignition[1252]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:08:34.435233 ignition[1252]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:08:34.439606 unknown[1252]: wrote ssh authorized keys file for user: core Oct 2 19:08:34.444604 ignition[1252]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:08:34.458018 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:08:34.462633 ignition[1252]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:08:34.618083 ignition[1252]: INFO : GET result: OK Oct 2 19:08:34.642401 systemd-networkd[1097]: eth0: Gained IPv6LL Oct 2 19:08:34.896180 ignition[1252]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:08:34.899530 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:08:34.899530 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:08:34.899530 ignition[1252]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:08:34.983898 ignition[1252]: INFO : GET result: OK Oct 2 19:08:35.232864 ignition[1252]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:08:35.235975 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:08:35.235975 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:08:35.235975 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:35.246831 ignition[1252]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem101761820" Oct 2 19:08:35.246831 ignition[1252]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem101761820": device or resource busy Oct 2 19:08:35.246831 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem101761820", trying btrfs: device or resource busy Oct 2 19:08:35.246831 ignition[1252]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem101761820" Oct 2 19:08:35.257407 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1254) Oct 2 19:08:35.254791 systemd[1]: mnt-oem101761820.mount: Deactivated successfully. Oct 2 19:08:35.258958 ignition[1252]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem101761820" Oct 2 19:08:35.258958 ignition[1252]: INFO : op(3): [started] unmounting "/mnt/oem101761820" Oct 2 19:08:35.258958 ignition[1252]: INFO : op(3): [finished] unmounting "/mnt/oem101761820" Oct 2 19:08:35.258958 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:08:35.258958 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:08:35.258958 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:08:35.343393 ignition[1252]: INFO : GET result: OK Oct 2 19:08:36.225213 ignition[1252]: DEBUG : file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:08:36.228588 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:08:36.228588 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:08:36.228588 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:08:36.291128 ignition[1252]: INFO : GET result: OK Oct 2 19:08:38.760813 ignition[1252]: DEBUG : file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:08:38.772758 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:08:38.772758 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:08:38.772758 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:08:38.772758 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:08:38.772758 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:08:38.772758 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:08:38.772758 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:38.826848 ignition[1252]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2661770004" Oct 2 19:08:38.837676 ignition[1252]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2661770004": device or resource busy Oct 2 19:08:38.837676 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2661770004", trying btrfs: device or resource busy Oct 2 19:08:38.837676 ignition[1252]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2661770004" Oct 2 19:08:38.837676 ignition[1252]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2661770004" Oct 2 19:08:38.837676 ignition[1252]: INFO : op(6): [started] unmounting "/mnt/oem2661770004" Oct 2 19:08:38.863509 ignition[1252]: INFO : op(6): [finished] unmounting "/mnt/oem2661770004" Oct 2 19:08:38.863509 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:08:38.863509 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:08:38.863509 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:38.893140 ignition[1252]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2969245366" Oct 2 19:08:38.893140 ignition[1252]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2969245366": device or resource busy Oct 2 19:08:38.893140 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2969245366", trying btrfs: device or resource busy Oct 2 19:08:38.893140 ignition[1252]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2969245366" Oct 2 19:08:38.933669 ignition[1252]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2969245366" Oct 2 19:08:38.937322 ignition[1252]: INFO : op(9): [started] unmounting "/mnt/oem2969245366" Oct 2 19:08:38.947432 ignition[1252]: INFO : op(9): [finished] unmounting "/mnt/oem2969245366" Oct 2 19:08:38.947432 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:08:38.947432 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:08:38.947432 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:38.943299 systemd[1]: mnt-oem2969245366.mount: Deactivated successfully. Oct 2 19:08:38.975121 ignition[1252]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4241170915" Oct 2 19:08:38.980648 ignition[1252]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4241170915": device or resource busy Oct 2 19:08:38.984561 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4241170915", trying btrfs: device or resource busy Oct 2 19:08:38.984561 ignition[1252]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4241170915" Oct 2 19:08:38.991962 ignition[1252]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4241170915" Oct 2 19:08:38.991962 ignition[1252]: INFO : op(c): [started] unmounting "/mnt/oem4241170915" Oct 2 19:08:38.991962 ignition[1252]: INFO : op(c): [finished] unmounting "/mnt/oem4241170915" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(d): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(d): op(e): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(d): op(e): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(d): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(f): [started] processing unit "nvidia.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(f): [finished] processing unit "nvidia.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:08:38.991962 ignition[1252]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(16): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 19:08:39.083835 ignition[1252]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:08:39.111052 ignition[1252]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:08:39.114356 ignition[1252]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:08:39.114356 ignition[1252]: INFO : files: files passed Oct 2 19:08:39.125357 kernel: audit: type=1130 audit(1696273719.116:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.125451 ignition[1252]: INFO : Ignition finished successfully Oct 2 19:08:39.116377 systemd[1]: Finished ignition-files.service. Oct 2 19:08:39.129923 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:08:39.132396 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:08:39.133548 systemd[1]: Starting ignition-quench.service... Oct 2 19:08:39.140245 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:08:39.141351 systemd[1]: Finished ignition-quench.service. Oct 2 19:08:39.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.153539 initrd-setup-root-after-ignition[1277]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:08:39.155639 kernel: audit: type=1130 audit(1696273719.142:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.155671 kernel: audit: type=1131 audit(1696273719.142:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.155045 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:08:39.165217 kernel: audit: type=1130 audit(1696273719.157:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.165309 systemd[1]: Reached target ignition-complete.target. Oct 2 19:08:39.169346 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:08:39.207765 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:08:39.209426 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:08:39.211968 systemd[1]: Reached target initrd-fs.target. Oct 2 19:08:39.222508 kernel: audit: type=1130 audit(1696273719.210:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.222535 kernel: audit: type=1131 audit(1696273719.210:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.222419 systemd[1]: Reached target initrd.target. Oct 2 19:08:39.225250 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:08:39.228145 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:08:39.257689 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:08:39.262183 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:08:39.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.278083 kernel: audit: type=1130 audit(1696273719.257:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.285099 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:08:39.285719 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:08:39.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.286227 systemd[1]: Stopped target timers.target. Oct 2 19:08:39.329948 kernel: audit: type=1131 audit(1696273719.284:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.329977 kernel: audit: type=1131 audit(1696273719.284:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.330063 ignition[1290]: INFO : Ignition 2.14.0 Oct 2 19:08:39.330063 ignition[1290]: INFO : Stage: umount Oct 2 19:08:39.330063 ignition[1290]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:39.330063 ignition[1290]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:08:39.349288 kernel: audit: type=1131 audit(1696273719.289:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.286392 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:08:39.286536 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:08:39.286945 systemd[1]: Stopped target initrd.target. Oct 2 19:08:39.287096 systemd[1]: Stopped target basic.target. Oct 2 19:08:39.287288 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:08:39.287702 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:08:39.366782 ignition[1290]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:08:39.366782 ignition[1290]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:08:39.287868 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:08:39.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.288048 systemd[1]: Stopped target remote-fs.target. Oct 2 19:08:39.374507 ignition[1290]: INFO : PUT result: OK Oct 2 19:08:39.288216 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:08:39.288632 systemd[1]: Stopped target sysinit.target. Oct 2 19:08:39.288848 systemd[1]: Stopped target local-fs.target. Oct 2 19:08:39.288978 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:08:39.289160 systemd[1]: Stopped target swap.target. Oct 2 19:08:39.289461 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:08:39.289606 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:08:39.290255 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:08:39.290774 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:08:39.290870 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:08:39.297905 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:08:39.298157 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:08:39.396055 ignition[1290]: INFO : umount: umount passed Oct 2 19:08:39.396055 ignition[1290]: INFO : Ignition finished successfully Oct 2 19:08:39.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.298517 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:08:39.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.298701 systemd[1]: Stopped ignition-files.service. Oct 2 19:08:39.300316 systemd[1]: Stopping ignition-mount.service... Oct 2 19:08:39.300678 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:08:39.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.300855 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:08:39.304016 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:08:39.304338 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:08:39.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.304505 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:08:39.458000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:08:39.304729 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:08:39.304834 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:08:39.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.307601 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:08:39.307691 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:08:39.353280 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:08:39.365732 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:08:39.365818 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:08:39.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.397161 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:08:39.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.397251 systemd[1]: Stopped ignition-mount.service. Oct 2 19:08:39.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.398875 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:08:39.398928 systemd[1]: Stopped ignition-disks.service. Oct 2 19:08:39.401232 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:08:39.401325 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:08:39.404442 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:08:39.404496 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:08:39.407238 systemd[1]: Stopped target network.target. Oct 2 19:08:39.407321 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:08:39.407372 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:08:39.408357 systemd[1]: Stopped target paths.target. Oct 2 19:08:39.408560 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:08:39.419352 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:08:39.420905 systemd[1]: Stopped target slices.target. Oct 2 19:08:39.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.422576 systemd[1]: Stopped target sockets.target. Oct 2 19:08:39.424997 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:08:39.425123 systemd[1]: Closed iscsid.socket. Oct 2 19:08:39.433444 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:08:39.433488 systemd[1]: Closed iscsiuio.socket. Oct 2 19:08:39.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.433939 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:08:39.433995 systemd[1]: Stopped ignition-setup.service. Oct 2 19:08:39.434196 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:08:39.434236 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:08:39.443088 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:08:39.445583 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:08:39.454899 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:08:39.455026 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:08:39.459717 systemd-networkd[1097]: eth0: DHCPv6 lease lost Oct 2 19:08:39.537000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:08:39.461056 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:08:39.461218 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:08:39.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.463626 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:08:39.463662 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:08:39.467447 systemd[1]: Stopping network-cleanup.service... Oct 2 19:08:39.472081 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:08:39.472202 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:08:39.474785 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:08:39.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.474856 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:08:39.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:39.477290 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:08:39.477358 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:08:39.479818 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:08:39.505742 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:08:39.505965 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:08:39.508733 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:08:39.508798 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:08:39.514459 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:08:39.514515 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:08:39.516372 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:08:39.516482 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:08:39.517632 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:08:39.517690 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:08:39.518830 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:08:39.518885 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:08:39.530018 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:08:39.544787 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:08:39.550137 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:08:39.556297 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:08:39.558845 systemd[1]: Stopped network-cleanup.service. Oct 2 19:08:39.564256 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:08:39.564368 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:08:39.572801 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:08:39.582142 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:08:39.637590 systemd[1]: Switching root. Oct 2 19:08:39.676702 systemd-journald[185]: Journal stopped Oct 2 19:08:46.823693 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Oct 2 19:08:46.823800 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:08:46.823843 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:08:46.823866 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:08:46.823888 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:08:46.823914 kernel: SELinux: policy capability open_perms=1 Oct 2 19:08:46.823936 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:08:46.823969 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:08:46.823992 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:08:46.824013 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:08:46.824034 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:08:46.824063 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:08:46.824090 systemd[1]: Successfully loaded SELinux policy in 140.940ms. Oct 2 19:08:46.824117 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 36.273ms. Oct 2 19:08:46.824142 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:08:46.824165 systemd[1]: Detected virtualization amazon. Oct 2 19:08:46.824188 systemd[1]: Detected architecture x86-64. Oct 2 19:08:46.824212 systemd[1]: Detected first boot. Oct 2 19:08:46.824235 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:08:46.824259 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:08:46.826543 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:46.826568 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:46.826590 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:46.826610 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:08:46.826629 kernel: audit: type=1334 audit(1696273726.378:84): prog-id=12 op=LOAD Oct 2 19:08:46.826646 kernel: audit: type=1334 audit(1696273726.379:85): prog-id=3 op=UNLOAD Oct 2 19:08:46.826666 kernel: audit: type=1334 audit(1696273726.382:86): prog-id=13 op=LOAD Oct 2 19:08:46.826683 kernel: audit: type=1334 audit(1696273726.383:87): prog-id=14 op=LOAD Oct 2 19:08:46.826700 kernel: audit: type=1334 audit(1696273726.383:88): prog-id=4 op=UNLOAD Oct 2 19:08:46.826716 kernel: audit: type=1334 audit(1696273726.383:89): prog-id=5 op=UNLOAD Oct 2 19:08:46.826733 kernel: audit: type=1334 audit(1696273726.389:90): prog-id=15 op=LOAD Oct 2 19:08:46.826757 kernel: audit: type=1334 audit(1696273726.389:91): prog-id=12 op=UNLOAD Oct 2 19:08:46.826774 kernel: audit: type=1334 audit(1696273726.394:92): prog-id=16 op=LOAD Oct 2 19:08:46.826792 kernel: audit: type=1334 audit(1696273726.395:93): prog-id=17 op=LOAD Oct 2 19:08:46.826810 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:08:46.826832 systemd[1]: Stopped iscsiuio.service. Oct 2 19:08:46.826857 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:08:46.826875 systemd[1]: Stopped iscsid.service. Oct 2 19:08:46.826893 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:08:46.826912 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:08:46.826931 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:08:46.826950 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:08:46.826971 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:08:46.826991 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:08:46.827011 systemd[1]: Created slice system-getty.slice. Oct 2 19:08:46.827036 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:08:46.827056 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:08:46.827074 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:08:46.827093 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:08:46.827111 systemd[1]: Created slice user.slice. Oct 2 19:08:46.827128 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:08:46.827151 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:08:46.827169 systemd[1]: Set up automount boot.automount. Oct 2 19:08:46.827188 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:08:46.827206 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:08:46.827224 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:08:46.827241 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:08:46.827259 systemd[1]: Reached target integritysetup.target. Oct 2 19:08:46.827639 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:08:46.827660 systemd[1]: Reached target remote-fs.target. Oct 2 19:08:46.830451 systemd[1]: Reached target slices.target. Oct 2 19:08:46.830476 systemd[1]: Reached target swap.target. Oct 2 19:08:46.830494 systemd[1]: Reached target torcx.target. Oct 2 19:08:46.830513 systemd[1]: Reached target veritysetup.target. Oct 2 19:08:46.830531 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:08:46.830550 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:08:46.830569 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:08:46.830588 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:08:46.830607 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:08:46.830626 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:08:46.830648 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:08:46.830666 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:08:46.830692 systemd[1]: Mounting media.mount... Oct 2 19:08:46.830711 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:08:46.830730 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:08:46.830749 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:08:46.830767 systemd[1]: Mounting tmp.mount... Oct 2 19:08:46.830785 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:08:46.830805 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:08:46.830833 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:08:46.830854 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:08:46.830873 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:08:46.830891 systemd[1]: Starting modprobe@drm.service... Oct 2 19:08:46.830911 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:08:46.830938 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:08:46.830959 systemd[1]: Starting modprobe@loop.service... Oct 2 19:08:46.830980 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:08:46.830999 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:08:46.831017 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:08:46.831036 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:08:46.831054 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:08:46.831073 systemd[1]: Stopped systemd-journald.service. Oct 2 19:08:46.831094 systemd[1]: Starting systemd-journald.service... Oct 2 19:08:46.831113 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:08:46.831132 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:08:46.831151 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:08:46.831176 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:08:46.831195 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:08:46.831214 systemd[1]: Stopped verity-setup.service. Oct 2 19:08:46.831233 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:08:46.831251 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:08:46.831316 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:08:46.831340 kernel: loop: module loaded Oct 2 19:08:46.831360 systemd[1]: Mounted media.mount. Oct 2 19:08:46.831379 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:08:46.831404 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:08:46.831424 kernel: fuse: init (API version 7.34) Oct 2 19:08:46.831442 systemd[1]: Mounted tmp.mount. Oct 2 19:08:46.831460 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:08:46.831479 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:08:46.831500 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:08:46.831620 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:08:46.832101 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:08:46.832127 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:08:46.832146 systemd[1]: Finished modprobe@drm.service. Oct 2 19:08:46.832165 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:08:46.835806 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:08:46.835832 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:08:46.835854 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:08:46.835873 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:08:46.835945 systemd[1]: Finished modprobe@loop.service. Oct 2 19:08:46.835973 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:08:46.835993 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:08:46.836027 systemd-journald[1396]: Journal started Oct 2 19:08:46.836106 systemd-journald[1396]: Runtime Journal (/run/log/journal/ec281acbe342f9fd6f838882ef013a7e) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:08:40.553000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:08:40.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:40.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:40.852000 audit: BPF prog-id=10 op=LOAD Oct 2 19:08:40.852000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:08:40.852000 audit: BPF prog-id=11 op=LOAD Oct 2 19:08:40.852000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:08:46.378000 audit: BPF prog-id=12 op=LOAD Oct 2 19:08:46.379000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:08:46.382000 audit: BPF prog-id=13 op=LOAD Oct 2 19:08:46.383000 audit: BPF prog-id=14 op=LOAD Oct 2 19:08:46.383000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:08:46.383000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:08:46.389000 audit: BPF prog-id=15 op=LOAD Oct 2 19:08:46.389000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:08:46.394000 audit: BPF prog-id=16 op=LOAD Oct 2 19:08:46.395000 audit: BPF prog-id=17 op=LOAD Oct 2 19:08:46.395000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:08:46.395000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:08:46.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.404000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:08:46.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.839320 systemd[1]: Started systemd-journald.service. Oct 2 19:08:46.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.686000 audit: BPF prog-id=18 op=LOAD Oct 2 19:08:46.686000 audit: BPF prog-id=19 op=LOAD Oct 2 19:08:46.686000 audit: BPF prog-id=20 op=LOAD Oct 2 19:08:46.686000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:08:46.686000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:08:46.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.816000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:08:46.816000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd379c0d20 a2=4000 a3=7ffd379c0dbc items=0 ppid=1 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:46.816000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:08:46.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.378234 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:08:41.206679 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:46.397627 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:08:41.207495 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:08:46.840506 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:08:41.207517 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:08:46.842966 systemd[1]: Reached target network-pre.target. Oct 2 19:08:41.207589 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:08:46.846173 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:08:41.207601 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:08:46.852048 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:08:41.207636 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:08:46.855599 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:08:41.207650 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:08:41.207926 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:08:41.207965 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:08:41.207978 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:08:46.860498 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:08:41.208995 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:08:46.863642 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:08:41.209032 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:08:46.903015 systemd-journald[1396]: Time spent on flushing to /var/log/journal/ec281acbe342f9fd6f838882ef013a7e is 163.523ms for 1177 entries. Oct 2 19:08:46.903015 systemd-journald[1396]: System Journal (/var/log/journal/ec281acbe342f9fd6f838882ef013a7e) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:08:47.091515 systemd-journald[1396]: Received client request to flush runtime journal. Oct 2 19:08:46.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:47.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:47.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.865646 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:08:41.209059 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:08:46.867443 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:08:41.209076 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:08:47.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:46.868987 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:08:41.209094 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:08:46.871376 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:08:41.209109 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:08:46.877906 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:08:45.444089 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:45Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:46.880589 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:08:45.444394 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:45Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:46.910594 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:08:45.444508 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:45Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:46.912351 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:08:45.444693 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:45Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:46.921219 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:08:45.444741 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:45Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:08:47.003477 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:08:45.444800 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2023-10-02T19:08:45Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:08:47.007228 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:08:47.058562 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:08:47.061874 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:08:47.092839 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:08:47.111566 udevadm[1439]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:08:47.242560 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:08:47.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:48.007167 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:08:48.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:48.015000 audit: BPF prog-id=21 op=LOAD Oct 2 19:08:48.015000 audit: BPF prog-id=22 op=LOAD Oct 2 19:08:48.015000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:08:48.015000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:08:48.018559 systemd[1]: Starting systemd-udevd.service... Oct 2 19:08:48.038834 systemd-udevd[1441]: Using default interface naming scheme 'v252'. Oct 2 19:08:48.141618 systemd[1]: Started systemd-udevd.service. Oct 2 19:08:48.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:48.142000 audit: BPF prog-id=23 op=LOAD Oct 2 19:08:48.145181 systemd[1]: Starting systemd-networkd.service... Oct 2 19:08:48.178000 audit: BPF prog-id=24 op=LOAD Oct 2 19:08:48.178000 audit: BPF prog-id=25 op=LOAD Oct 2 19:08:48.178000 audit: BPF prog-id=26 op=LOAD Oct 2 19:08:48.180999 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:08:48.291472 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:08:48.317067 (udev-worker)[1444]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:48.332367 systemd[1]: Started systemd-userdbd.service. Oct 2 19:08:48.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:48.455287 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:08:48.462587 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:08:48.486290 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:08:48.492318 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:08:48.499080 systemd-networkd[1447]: lo: Link UP Oct 2 19:08:48.499093 systemd-networkd[1447]: lo: Gained carrier Oct 2 19:08:48.500798 systemd-networkd[1447]: Enumeration completed Oct 2 19:08:48.500944 systemd-networkd[1447]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:08:48.458000 audit[1453]: AVC avc: denied { confidentiality } for pid=1453 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:08:48.501057 systemd[1]: Started systemd-networkd.service. Oct 2 19:08:48.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:48.504390 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:08:48.458000 audit[1453]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c83fe7ec70 a1=32194 a2=7f691499ebc5 a3=5 items=106 ppid=1441 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.458000 audit: CWD cwd="/" Oct 2 19:08:48.458000 audit: PATH item=0 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=1 name=(null) inode=14622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=2 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=3 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=4 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=5 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=6 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=7 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=8 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=9 name=(null) inode=14626 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=10 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=11 name=(null) inode=14627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=12 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=13 name=(null) inode=14628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=14 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=15 name=(null) inode=14629 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=16 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.512516 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:08:48.512965 systemd-networkd[1447]: eth0: Link UP Oct 2 19:08:48.513472 systemd-networkd[1447]: eth0: Gained carrier Oct 2 19:08:48.458000 audit: PATH item=17 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=18 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=19 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=20 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=21 name=(null) inode=14632 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=22 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=23 name=(null) inode=14633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=24 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=25 name=(null) inode=14634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=26 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=27 name=(null) inode=14635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=28 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=29 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=30 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=31 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=32 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=33 name=(null) inode=14638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=34 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=35 name=(null) inode=14639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=36 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=37 name=(null) inode=14640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=38 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=39 name=(null) inode=14641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=40 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=41 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=42 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=43 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=44 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=45 name=(null) inode=14644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=46 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=47 name=(null) inode=14645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=48 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=49 name=(null) inode=14646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=50 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=51 name=(null) inode=14647 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=52 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=53 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=54 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=55 name=(null) inode=14649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=56 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=57 name=(null) inode=14650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=58 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=59 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=60 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=61 name=(null) inode=14652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=62 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=63 name=(null) inode=14653 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=64 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=65 name=(null) inode=14654 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=66 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=67 name=(null) inode=14655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=68 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=69 name=(null) inode=14656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=70 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=71 name=(null) inode=14657 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=72 name=(null) inode=14657 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=73 name=(null) inode=14658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=74 name=(null) inode=14657 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=75 name=(null) inode=14659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=76 name=(null) inode=14657 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=77 name=(null) inode=14660 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=78 name=(null) inode=14657 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=79 name=(null) inode=14661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=80 name=(null) inode=14657 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=81 name=(null) inode=14662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=82 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=83 name=(null) inode=14663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=84 name=(null) inode=14663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=85 name=(null) inode=14664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=86 name=(null) inode=14663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=87 name=(null) inode=14665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=88 name=(null) inode=14663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=89 name=(null) inode=14666 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=90 name=(null) inode=14663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=91 name=(null) inode=14667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=92 name=(null) inode=14663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=93 name=(null) inode=14668 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=94 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=95 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=96 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=97 name=(null) inode=14670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=98 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=99 name=(null) inode=14671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=100 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=101 name=(null) inode=14672 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=102 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=103 name=(null) inode=14673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=104 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PATH item=105 name=(null) inode=14674 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:48.458000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:08:48.524464 systemd-networkd[1447]: eth0: DHCPv4 address 172.31.17.7/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:08:48.529333 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:08:48.560512 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:08:48.587689 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:08:48.631438 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1455) Oct 2 19:08:48.756966 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:08:48.876283 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:08:48.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:48.879446 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:08:48.958612 lvm[1555]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:08:49.001007 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:08:49.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.002483 systemd[1]: Reached target cryptsetup.target. Oct 2 19:08:49.005441 systemd[1]: Starting lvm2-activation.service... Oct 2 19:08:49.011351 lvm[1556]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:08:49.039206 systemd[1]: Finished lvm2-activation.service. Oct 2 19:08:49.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.040600 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:08:49.041728 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:08:49.041873 systemd[1]: Reached target local-fs.target. Oct 2 19:08:49.043093 systemd[1]: Reached target machines.target. Oct 2 19:08:49.045493 systemd[1]: Starting ldconfig.service... Oct 2 19:08:49.047153 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:08:49.047219 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:49.048713 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:08:49.051777 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:08:49.055854 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:08:49.057297 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:08:49.057426 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:08:49.058780 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:08:49.084822 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:08:49.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.088926 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1558 (bootctl) Oct 2 19:08:49.090916 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:08:49.122163 systemd-tmpfiles[1561]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:08:49.173533 systemd-tmpfiles[1561]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:08:49.216248 systemd-tmpfiles[1561]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:08:49.299796 systemd-fsck[1566]: fsck.fat 4.2 (2021-01-31) Oct 2 19:08:49.299796 systemd-fsck[1566]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:08:49.302321 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:08:49.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.305721 systemd[1]: Mounting boot.mount... Oct 2 19:08:49.328147 systemd[1]: Mounted boot.mount. Oct 2 19:08:49.354150 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:08:49.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.457932 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:08:49.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.462675 systemd[1]: Starting audit-rules.service... Oct 2 19:08:49.485000 audit: BPF prog-id=27 op=LOAD Oct 2 19:08:49.470848 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:08:49.477186 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:08:49.489714 systemd[1]: Starting systemd-resolved.service... Oct 2 19:08:49.494000 audit: BPF prog-id=28 op=LOAD Oct 2 19:08:49.501857 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:08:49.506439 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:08:49.524000 audit[1586]: SYSTEM_BOOT pid=1586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.552221 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:08:49.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.557093 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:08:49.558988 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:08:49.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.622139 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:08:49.646825 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:08:49.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:49.648209 systemd[1]: Reached target time-set.target. Oct 2 19:08:49.662605 systemd-resolved[1583]: Positive Trust Anchors: Oct 2 19:08:49.662621 systemd-resolved[1583]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:08:49.662663 systemd-resolved[1583]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:08:49.667000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:08:49.667000 audit[1601]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdd933b440 a2=420 a3=0 items=0 ppid=1580 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:49.667000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:08:49.668686 augenrules[1601]: No rules Oct 2 19:08:49.669521 systemd[1]: Finished audit-rules.service. Oct 2 19:08:49.709163 systemd-resolved[1583]: Defaulting to hostname 'linux'. Oct 2 19:08:49.719244 systemd[1]: Started systemd-resolved.service. Oct 2 19:08:49.724474 systemd[1]: Reached target network.target. Oct 2 19:08:49.732758 systemd[1]: Reached target nss-lookup.target. Oct 2 19:08:49.813850 systemd-timesyncd[1585]: Contacted time server 65.100.46.166:123 (0.flatcar.pool.ntp.org). Oct 2 19:08:49.813937 systemd-timesyncd[1585]: Initial clock synchronization to Mon 2023-10-02 19:08:49.788055 UTC. Oct 2 19:08:50.378563 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:08:50.383279 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:08:50.514406 systemd-networkd[1447]: eth0: Gained IPv6LL Oct 2 19:08:50.516572 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:08:50.518018 systemd[1]: Reached target network-online.target. Oct 2 19:08:50.600412 ldconfig[1557]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:08:50.615649 systemd[1]: Finished ldconfig.service. Oct 2 19:08:50.618035 systemd[1]: Starting systemd-update-done.service... Oct 2 19:08:50.629317 systemd[1]: Finished systemd-update-done.service. Oct 2 19:08:50.630596 systemd[1]: Reached target sysinit.target. Oct 2 19:08:50.631724 systemd[1]: Started motdgen.path. Oct 2 19:08:50.632638 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:08:50.635540 systemd[1]: Started logrotate.timer. Oct 2 19:08:50.636941 systemd[1]: Started mdadm.timer. Oct 2 19:08:50.637876 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:08:50.638999 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:08:50.639027 systemd[1]: Reached target paths.target. Oct 2 19:08:50.640021 systemd[1]: Reached target timers.target. Oct 2 19:08:50.641495 systemd[1]: Listening on dbus.socket. Oct 2 19:08:50.643599 systemd[1]: Starting docker.socket... Oct 2 19:08:50.647725 systemd[1]: Listening on sshd.socket. Oct 2 19:08:50.649462 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:50.650312 systemd[1]: Listening on docker.socket. Oct 2 19:08:50.651553 systemd[1]: Reached target sockets.target. Oct 2 19:08:50.653353 systemd[1]: Reached target basic.target. Oct 2 19:08:50.654824 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:08:50.654855 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:08:50.656046 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:08:50.659827 systemd[1]: Starting containerd.service... Oct 2 19:08:50.664501 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:08:50.667741 systemd[1]: Starting dbus.service... Oct 2 19:08:50.670237 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:08:50.712528 systemd[1]: Starting extend-filesystems.service... Oct 2 19:08:50.716493 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:08:50.727520 systemd[1]: Starting motdgen.service... Oct 2 19:08:50.730767 systemd[1]: Started nvidia.service. Oct 2 19:08:50.737474 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:08:50.740199 systemd[1]: Starting prepare-critools.service... Oct 2 19:08:50.744463 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:08:50.747581 systemd[1]: Starting sshd-keygen.service... Oct 2 19:08:50.753344 jq[1615]: false Oct 2 19:08:50.754786 systemd[1]: Starting systemd-logind.service... Oct 2 19:08:50.762506 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:50.762592 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:08:50.763250 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:08:50.764323 systemd[1]: Starting update-engine.service... Oct 2 19:08:50.770119 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:08:50.775830 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:08:50.776124 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:08:50.867133 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:08:50.867357 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:08:50.868096 jq[1629]: true Oct 2 19:08:50.899176 tar[1631]: ./ Oct 2 19:08:50.899176 tar[1631]: ./loopback Oct 2 19:08:50.982613 jq[1639]: true Oct 2 19:08:51.062038 extend-filesystems[1616]: Found nvme0n1 Oct 2 19:08:51.066490 extend-filesystems[1616]: Found nvme0n1p1 Oct 2 19:08:51.068138 extend-filesystems[1616]: Found nvme0n1p2 Oct 2 19:08:51.068138 extend-filesystems[1616]: Found nvme0n1p3 Oct 2 19:08:51.068138 extend-filesystems[1616]: Found usr Oct 2 19:08:51.068138 extend-filesystems[1616]: Found nvme0n1p4 Oct 2 19:08:51.068138 extend-filesystems[1616]: Found nvme0n1p6 Oct 2 19:08:51.068138 extend-filesystems[1616]: Found nvme0n1p7 Oct 2 19:08:51.068138 extend-filesystems[1616]: Found nvme0n1p9 Oct 2 19:08:51.088356 extend-filesystems[1616]: Checking size of /dev/nvme0n1p9 Oct 2 19:08:51.085571 systemd[1]: Started dbus.service. Oct 2 19:08:51.085369 dbus-daemon[1614]: [system] SELinux support is enabled Oct 2 19:08:51.093878 tar[1633]: crictl Oct 2 19:08:51.089973 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:08:51.090008 systemd[1]: Reached target system-config.target. Oct 2 19:08:51.091576 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:08:51.091600 systemd[1]: Reached target user-config.target. Oct 2 19:08:51.099805 dbus-daemon[1614]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1447 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:08:51.100625 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:08:51.100834 systemd[1]: Finished motdgen.service. Oct 2 19:08:51.103928 dbus-daemon[1614]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:08:51.109185 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:08:51.136464 amazon-ssm-agent[1611]: 2023/10/02 19:08:51 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:08:51.151335 extend-filesystems[1616]: Resized partition /dev/nvme0n1p9 Oct 2 19:08:51.187017 amazon-ssm-agent[1611]: Initializing new seelog logger Oct 2 19:08:51.187017 amazon-ssm-agent[1611]: New Seelog Logger Creation Complete Oct 2 19:08:51.187017 amazon-ssm-agent[1611]: 2023/10/02 19:08:51 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:08:51.187017 amazon-ssm-agent[1611]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:08:51.187017 amazon-ssm-agent[1611]: 2023/10/02 19:08:51 processing appconfig overrides Oct 2 19:08:51.187546 extend-filesystems[1670]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:08:51.213294 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:08:51.245512 update_engine[1626]: I1002 19:08:51.243402 1626 main.cc:92] Flatcar Update Engine starting Oct 2 19:08:51.267768 systemd[1]: Started update-engine.service. Oct 2 19:08:51.276095 systemd[1]: Started locksmithd.service. Oct 2 19:08:51.290220 update_engine[1626]: I1002 19:08:51.280647 1626 update_check_scheduler.cc:74] Next update check in 8m53s Oct 2 19:08:51.321508 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:08:51.354631 extend-filesystems[1670]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:08:51.354631 extend-filesystems[1670]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:08:51.354631 extend-filesystems[1670]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:08:51.377026 extend-filesystems[1616]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:08:51.380188 bash[1683]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:08:51.357108 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:08:51.380804 env[1634]: time="2023-10-02T19:08:51.369480370Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:08:51.357354 systemd[1]: Finished extend-filesystems.service. Oct 2 19:08:51.371163 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:08:51.483397 tar[1631]: ./bandwidth Oct 2 19:08:51.532964 systemd-logind[1625]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:08:51.544386 systemd-logind[1625]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:08:51.544656 systemd-logind[1625]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:08:51.547944 systemd-logind[1625]: New seat seat0. Oct 2 19:08:51.557786 systemd[1]: Started systemd-logind.service. Oct 2 19:08:51.585035 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:08:51.664868 env[1634]: time="2023-10-02T19:08:51.664817611Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:08:51.682536 env[1634]: time="2023-10-02T19:08:51.682490464Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:51.684757 env[1634]: time="2023-10-02T19:08:51.684705931Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:51.685441 env[1634]: time="2023-10-02T19:08:51.685409135Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:51.691351 env[1634]: time="2023-10-02T19:08:51.691305379Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:51.691496 env[1634]: time="2023-10-02T19:08:51.691479287Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:51.692210 env[1634]: time="2023-10-02T19:08:51.691561205Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:08:51.692554 env[1634]: time="2023-10-02T19:08:51.692348278Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:51.692779 env[1634]: time="2023-10-02T19:08:51.692759758Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:51.695506 env[1634]: time="2023-10-02T19:08:51.695472024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:51.697311 env[1634]: time="2023-10-02T19:08:51.697130672Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:51.698008 env[1634]: time="2023-10-02T19:08:51.697979793Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:08:51.698493 env[1634]: time="2023-10-02T19:08:51.698467346Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:08:51.700158 env[1634]: time="2023-10-02T19:08:51.700130053Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:08:51.712645 env[1634]: time="2023-10-02T19:08:51.712589005Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:08:51.712841 env[1634]: time="2023-10-02T19:08:51.712816079Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:08:51.712949 env[1634]: time="2023-10-02T19:08:51.712934375Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:08:51.713084 env[1634]: time="2023-10-02T19:08:51.713060212Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713280 env[1634]: time="2023-10-02T19:08:51.713244967Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713375 env[1634]: time="2023-10-02T19:08:51.713359560Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713474 env[1634]: time="2023-10-02T19:08:51.713459659Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713564 env[1634]: time="2023-10-02T19:08:51.713548987Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713654 env[1634]: time="2023-10-02T19:08:51.713640817Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713751 env[1634]: time="2023-10-02T19:08:51.713737087Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713825 env[1634]: time="2023-10-02T19:08:51.713811784Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.713909 env[1634]: time="2023-10-02T19:08:51.713895819Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:08:51.714126 env[1634]: time="2023-10-02T19:08:51.714110669Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:08:51.714308 env[1634]: time="2023-10-02T19:08:51.714290728Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:08:51.714844 env[1634]: time="2023-10-02T19:08:51.714824507Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:08:51.714961 env[1634]: time="2023-10-02T19:08:51.714946096Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715038 env[1634]: time="2023-10-02T19:08:51.715024113Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:08:51.715155 env[1634]: time="2023-10-02T19:08:51.715141751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715314 env[1634]: time="2023-10-02T19:08:51.715299410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715392 env[1634]: time="2023-10-02T19:08:51.715379438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715454 env[1634]: time="2023-10-02T19:08:51.715442133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715518 env[1634]: time="2023-10-02T19:08:51.715505600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715599 env[1634]: time="2023-10-02T19:08:51.715585558Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715664 env[1634]: time="2023-10-02T19:08:51.715651427Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715730 env[1634]: time="2023-10-02T19:08:51.715717932Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.715815 env[1634]: time="2023-10-02T19:08:51.715801130Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:08:51.716050 env[1634]: time="2023-10-02T19:08:51.716033103Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.716133 env[1634]: time="2023-10-02T19:08:51.716120162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.716208 env[1634]: time="2023-10-02T19:08:51.716194799Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.716300 env[1634]: time="2023-10-02T19:08:51.716284896Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:08:51.716383 env[1634]: time="2023-10-02T19:08:51.716362868Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:08:51.716455 env[1634]: time="2023-10-02T19:08:51.716441403Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:08:51.716553 env[1634]: time="2023-10-02T19:08:51.716536438Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:08:51.716674 env[1634]: time="2023-10-02T19:08:51.716658268Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:08:51.717092 env[1634]: time="2023-10-02T19:08:51.717017701Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:08:51.722015 env[1634]: time="2023-10-02T19:08:51.717320966Z" level=info msg="Connect containerd service" Oct 2 19:08:51.722015 env[1634]: time="2023-10-02T19:08:51.717373848Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:08:51.722015 env[1634]: time="2023-10-02T19:08:51.718196158Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:08:51.722015 env[1634]: time="2023-10-02T19:08:51.718547593Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:08:51.722015 env[1634]: time="2023-10-02T19:08:51.718600997Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:08:51.722015 env[1634]: time="2023-10-02T19:08:51.718870589Z" level=info msg="containerd successfully booted in 0.404180s" Oct 2 19:08:51.718746 systemd[1]: Started containerd.service. Oct 2 19:08:51.727601 env[1634]: time="2023-10-02T19:08:51.727532022Z" level=info msg="Start subscribing containerd event" Oct 2 19:08:51.727755 env[1634]: time="2023-10-02T19:08:51.727619555Z" level=info msg="Start recovering state" Oct 2 19:08:51.727755 env[1634]: time="2023-10-02T19:08:51.727698868Z" level=info msg="Start event monitor" Oct 2 19:08:51.727755 env[1634]: time="2023-10-02T19:08:51.727721408Z" level=info msg="Start snapshots syncer" Oct 2 19:08:51.727755 env[1634]: time="2023-10-02T19:08:51.727736532Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:08:51.727755 env[1634]: time="2023-10-02T19:08:51.727745701Z" level=info msg="Start streaming server" Oct 2 19:08:51.776035 dbus-daemon[1614]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:08:51.776526 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:08:51.779870 dbus-daemon[1614]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1665 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:08:51.783627 systemd[1]: Starting polkit.service... Oct 2 19:08:51.808302 tar[1631]: ./ptp Oct 2 19:08:51.810734 polkitd[1738]: Started polkitd version 121 Oct 2 19:08:51.837810 polkitd[1738]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:08:51.838056 polkitd[1738]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:08:51.852388 polkitd[1738]: Finished loading, compiling and executing 2 rules Oct 2 19:08:51.853449 dbus-daemon[1614]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:08:51.853640 systemd[1]: Started polkit.service. Oct 2 19:08:51.856310 polkitd[1738]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:08:51.896621 systemd-hostnamed[1665]: Hostname set to (transient) Oct 2 19:08:51.896745 systemd-resolved[1583]: System hostname changed to 'ip-172-31-17-7'. Oct 2 19:08:52.016324 tar[1631]: ./vlan Oct 2 19:08:52.076873 amazon-ssm-agent[1611]: 2023-10-02 19:08:52 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-084a3cb872114df67 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-084a3cb872114df67 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:08:52.076873 amazon-ssm-agent[1611]: status code: 400, request id: bfa5fb2a-1581-43eb-a43f-597f98f22336 Oct 2 19:08:52.076873 amazon-ssm-agent[1611]: 2023-10-02 19:08:52 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:08:52.170782 coreos-metadata[1613]: Oct 02 19:08:52.170 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:08:52.176247 coreos-metadata[1613]: Oct 02 19:08:52.176 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:08:52.177416 coreos-metadata[1613]: Oct 02 19:08:52.177 INFO Fetch successful Oct 2 19:08:52.177575 coreos-metadata[1613]: Oct 02 19:08:52.177 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:08:52.178750 coreos-metadata[1613]: Oct 02 19:08:52.178 INFO Fetch successful Oct 2 19:08:52.181214 unknown[1613]: wrote ssh authorized keys file for user: core Oct 2 19:08:52.203540 tar[1631]: ./host-device Oct 2 19:08:52.218596 update-ssh-keys[1787]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:08:52.218948 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:08:52.325052 tar[1631]: ./tuning Oct 2 19:08:52.411148 tar[1631]: ./vrf Oct 2 19:08:52.506102 tar[1631]: ./sbr Oct 2 19:08:52.597778 tar[1631]: ./tap Oct 2 19:08:52.646029 systemd[1]: Finished prepare-critools.service. Oct 2 19:08:52.675400 tar[1631]: ./dhcp Oct 2 19:08:52.794347 tar[1631]: ./static Oct 2 19:08:52.829154 tar[1631]: ./firewall Oct 2 19:08:52.886572 tar[1631]: ./macvlan Oct 2 19:08:52.934246 tar[1631]: ./dummy Oct 2 19:08:52.981551 tar[1631]: ./bridge Oct 2 19:08:53.045349 tar[1631]: ./ipvlan Oct 2 19:08:53.093387 tar[1631]: ./portmap Oct 2 19:08:53.144785 tar[1631]: ./host-local Oct 2 19:08:53.208697 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:08:53.333052 locksmithd[1686]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:08:53.510988 sshd_keygen[1653]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:08:53.569716 systemd[1]: Finished sshd-keygen.service. Oct 2 19:08:53.581073 systemd[1]: Starting issuegen.service... Oct 2 19:08:53.594146 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:08:53.594385 systemd[1]: Finished issuegen.service. Oct 2 19:08:53.599273 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:08:53.618664 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:08:53.631570 systemd[1]: Started getty@tty1.service. Oct 2 19:08:53.642749 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:08:53.644189 systemd[1]: Reached target getty.target. Oct 2 19:08:53.645356 systemd[1]: Reached target multi-user.target. Oct 2 19:08:53.648067 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:08:53.657536 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:08:53.657706 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:08:53.659115 systemd[1]: Startup finished in 952ms (kernel) + 11.507s (initrd) + 13.284s (userspace) = 25.744s. Oct 2 19:08:58.796505 systemd[1]: Created slice system-sshd.slice. Oct 2 19:08:58.798188 systemd[1]: Started sshd@0-172.31.17.7:22-139.178.89.65:34412.service. Oct 2 19:08:59.015639 sshd[1822]: Accepted publickey for core from 139.178.89.65 port 34412 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:59.018090 sshd[1822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:59.032933 systemd[1]: Created slice user-500.slice. Oct 2 19:08:59.035029 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:08:59.039320 systemd-logind[1625]: New session 1 of user core. Oct 2 19:08:59.047005 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:08:59.050118 systemd[1]: Starting user@500.service... Oct 2 19:08:59.054888 (systemd)[1825]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:59.270587 systemd[1825]: Queued start job for default target default.target. Oct 2 19:08:59.273068 systemd[1825]: Reached target paths.target. Oct 2 19:08:59.273102 systemd[1825]: Reached target sockets.target. Oct 2 19:08:59.273121 systemd[1825]: Reached target timers.target. Oct 2 19:08:59.273137 systemd[1825]: Reached target basic.target. Oct 2 19:08:59.273286 systemd[1]: Started user@500.service. Oct 2 19:08:59.276210 systemd[1]: Started session-1.scope. Oct 2 19:08:59.276772 systemd[1825]: Reached target default.target. Oct 2 19:08:59.276981 systemd[1825]: Startup finished in 210ms. Oct 2 19:08:59.448412 systemd[1]: Started sshd@1-172.31.17.7:22-139.178.89.65:34424.service. Oct 2 19:08:59.653525 sshd[1834]: Accepted publickey for core from 139.178.89.65 port 34424 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:08:59.661259 sshd[1834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:59.696711 systemd-logind[1625]: New session 2 of user core. Oct 2 19:08:59.696777 systemd[1]: Started session-2.scope. Oct 2 19:08:59.865185 sshd[1834]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:59.876153 systemd[1]: sshd@1-172.31.17.7:22-139.178.89.65:34424.service: Deactivated successfully. Oct 2 19:08:59.877155 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:08:59.881573 systemd-logind[1625]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:08:59.885497 systemd-logind[1625]: Removed session 2. Oct 2 19:08:59.899732 systemd[1]: Started sshd@2-172.31.17.7:22-139.178.89.65:34438.service. Oct 2 19:09:00.106717 sshd[1841]: Accepted publickey for core from 139.178.89.65 port 34438 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:00.108476 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:00.119839 systemd[1]: Started session-3.scope. Oct 2 19:09:00.120390 systemd-logind[1625]: New session 3 of user core. Oct 2 19:09:00.247239 sshd[1841]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:00.251807 systemd[1]: sshd@2-172.31.17.7:22-139.178.89.65:34438.service: Deactivated successfully. Oct 2 19:09:00.253677 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:09:00.254919 systemd-logind[1625]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:09:00.258314 systemd-logind[1625]: Removed session 3. Oct 2 19:09:00.274461 systemd[1]: Started sshd@3-172.31.17.7:22-139.178.89.65:34446.service. Oct 2 19:09:00.435120 sshd[1847]: Accepted publickey for core from 139.178.89.65 port 34446 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:00.437987 sshd[1847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:00.444520 systemd[1]: Started session-4.scope. Oct 2 19:09:00.445093 systemd-logind[1625]: New session 4 of user core. Oct 2 19:09:00.584234 sshd[1847]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:00.594446 systemd[1]: sshd@3-172.31.17.7:22-139.178.89.65:34446.service: Deactivated successfully. Oct 2 19:09:00.595889 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:09:00.605922 systemd-logind[1625]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:09:00.619346 systemd[1]: Started sshd@4-172.31.17.7:22-139.178.89.65:34460.service. Oct 2 19:09:00.625480 systemd-logind[1625]: Removed session 4. Oct 2 19:09:00.799950 sshd[1853]: Accepted publickey for core from 139.178.89.65 port 34460 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:00.802550 sshd[1853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:00.818985 systemd-logind[1625]: New session 5 of user core. Oct 2 19:09:00.827837 systemd[1]: Started session-5.scope. Oct 2 19:09:00.990217 sudo[1856]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:09:00.990734 sudo[1856]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:09:01.000506 dbus-daemon[1614]: \xd0\xddo\u0007YU: received setenforce notice (enforcing=586237280) Oct 2 19:09:01.003139 sudo[1856]: pam_unix(sudo:session): session closed for user root Oct 2 19:09:01.028200 sshd[1853]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:01.032917 systemd[1]: sshd@4-172.31.17.7:22-139.178.89.65:34460.service: Deactivated successfully. Oct 2 19:09:01.034416 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:09:01.035641 systemd-logind[1625]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:09:01.036821 systemd-logind[1625]: Removed session 5. Oct 2 19:09:01.058064 systemd[1]: Started sshd@5-172.31.17.7:22-139.178.89.65:34462.service. Oct 2 19:09:01.235871 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 34462 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:01.240234 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:01.249973 systemd-logind[1625]: New session 6 of user core. Oct 2 19:09:01.250561 systemd[1]: Started session-6.scope. Oct 2 19:09:01.381418 sudo[1864]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:09:01.381731 sudo[1864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:09:01.394020 sudo[1864]: pam_unix(sudo:session): session closed for user root Oct 2 19:09:01.416027 sudo[1863]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:09:01.416476 sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:09:01.460635 systemd[1]: Stopping audit-rules.service... Oct 2 19:09:01.471000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:09:01.473092 auditctl[1867]: No rules Oct 2 19:09:01.481507 kernel: kauditd_printk_skb: 183 callbacks suppressed Oct 2 19:09:01.481601 kernel: audit: type=1305 audit(1696273741.471:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:09:01.473889 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:09:01.479561 systemd[1]: Stopped audit-rules.service. Oct 2 19:09:01.471000 audit[1867]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4c18ee80 a2=420 a3=0 items=0 ppid=1 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.490574 systemd[1]: Starting audit-rules.service... Oct 2 19:09:01.535842 kernel: audit: type=1300 audit(1696273741.471:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4c18ee80 a2=420 a3=0 items=0 ppid=1 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.471000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:09:01.553475 kernel: audit: type=1327 audit(1696273741.471:164): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:09:01.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.600908 kernel: audit: type=1131 audit(1696273741.478:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.671064 augenrules[1884]: No rules Oct 2 19:09:01.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.671836 systemd[1]: Finished audit-rules.service. Oct 2 19:09:01.677428 sudo[1863]: pam_unix(sudo:session): session closed for user root Oct 2 19:09:01.709305 kernel: audit: type=1130 audit(1696273741.670:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.709443 kernel: audit: type=1106 audit(1696273741.676:167): pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.676000 audit[1863]: USER_END pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.676000 audit[1863]: CRED_DISP pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.730460 sshd[1860]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:01.728000 audit[1860]: USER_END pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:01.735518 systemd[1]: sshd@5-172.31.17.7:22-139.178.89.65:34462.service: Deactivated successfully. Oct 2 19:09:01.736501 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:09:01.738036 systemd-logind[1625]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:09:01.739542 systemd-logind[1625]: Removed session 6. Oct 2 19:09:01.753240 kernel: audit: type=1104 audit(1696273741.676:168): pid=1863 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.753362 kernel: audit: type=1106 audit(1696273741.728:169): pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:01.772317 kernel: audit: type=1104 audit(1696273741.728:170): pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:01.772483 kernel: audit: type=1131 audit(1696273741.735:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.17.7:22-139.178.89.65:34462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.728000 audit[1860]: CRED_DISP pid=1860 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:01.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.17.7:22-139.178.89.65:34462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.798054 systemd[1]: Started sshd@6-172.31.17.7:22-139.178.89.65:34478.service. Oct 2 19:09:01.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.17.7:22-139.178.89.65:34478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:01.991000 audit[1890]: USER_ACCT pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:01.993420 sshd[1890]: Accepted publickey for core from 139.178.89.65 port 34478 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:01.993000 audit[1890]: CRED_ACQ pid=1890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:01.993000 audit[1890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7ff3c1c0 a2=3 a3=0 items=0 ppid=1 pid=1890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:01.994364 sshd[1890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:02.024030 systemd-logind[1625]: New session 7 of user core. Oct 2 19:09:02.024630 systemd[1]: Started session-7.scope. Oct 2 19:09:02.052000 audit[1890]: USER_START pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:02.060000 audit[1892]: CRED_ACQ pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:02.170000 audit[1893]: USER_ACCT pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:02.171219 sudo[1893]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:09:02.171000 audit[1893]: CRED_REFR pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:02.171564 sudo[1893]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:09:02.183000 audit[1893]: USER_START pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:02.899418 systemd[1]: Reloading. Oct 2 19:09:03.151850 /usr/lib/systemd/system-generators/torcx-generator[1923]: time="2023-10-02T19:09:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:09:03.151890 /usr/lib/systemd/system-generators/torcx-generator[1923]: time="2023-10-02T19:09:03Z" level=info msg="torcx already run" Oct 2 19:09:03.360394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:09:03.360418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:09:03.400990 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit: BPF prog-id=37 op=LOAD Oct 2 19:09:03.514000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit: BPF prog-id=38 op=LOAD Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.514000 audit: BPF prog-id=39 op=LOAD Oct 2 19:09:03.514000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:09:03.514000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit: BPF prog-id=40 op=LOAD Oct 2 19:09:03.516000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.517000 audit: BPF prog-id=41 op=LOAD Oct 2 19:09:03.517000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:09:03.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit: BPF prog-id=42 op=LOAD Oct 2 19:09:03.521000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit: BPF prog-id=43 op=LOAD Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.521000 audit: BPF prog-id=44 op=LOAD Oct 2 19:09:03.521000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:09:03.521000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.522000 audit: BPF prog-id=45 op=LOAD Oct 2 19:09:03.522000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.524000 audit: BPF prog-id=46 op=LOAD Oct 2 19:09:03.524000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit: BPF prog-id=47 op=LOAD Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.525000 audit: BPF prog-id=48 op=LOAD Oct 2 19:09:03.525000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:09:03.525000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.527000 audit: BPF prog-id=49 op=LOAD Oct 2 19:09:03.527000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit: BPF prog-id=50 op=LOAD Oct 2 19:09:03.528000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit: BPF prog-id=51 op=LOAD Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit: BPF prog-id=52 op=LOAD Oct 2 19:09:03.528000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:09:03.528000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit: BPF prog-id=53 op=LOAD Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:03.529000 audit: BPF prog-id=54 op=LOAD Oct 2 19:09:03.529000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:09:03.529000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:09:03.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:03.541590 systemd[1]: Started kubelet.service. Oct 2 19:09:03.561014 systemd[1]: Starting coreos-metadata.service... Oct 2 19:09:03.634429 kubelet[1974]: E1002 19:09:03.634371 1974 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:09:03.637314 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:09:03.637629 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:09:03.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:09:03.691578 coreos-metadata[1981]: Oct 02 19:09:03.691 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:09:03.692432 coreos-metadata[1981]: Oct 02 19:09:03.692 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Oct 2 19:09:03.693044 coreos-metadata[1981]: Oct 02 19:09:03.692 INFO Fetch successful Oct 2 19:09:03.693131 coreos-metadata[1981]: Oct 02 19:09:03.693 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Oct 2 19:09:03.693625 coreos-metadata[1981]: Oct 02 19:09:03.693 INFO Fetch successful Oct 2 19:09:03.693778 coreos-metadata[1981]: Oct 02 19:09:03.693 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Oct 2 19:09:03.694294 coreos-metadata[1981]: Oct 02 19:09:03.694 INFO Fetch successful Oct 2 19:09:03.694366 coreos-metadata[1981]: Oct 02 19:09:03.694 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Oct 2 19:09:03.694847 coreos-metadata[1981]: Oct 02 19:09:03.694 INFO Fetch successful Oct 2 19:09:03.694918 coreos-metadata[1981]: Oct 02 19:09:03.694 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Oct 2 19:09:03.695430 coreos-metadata[1981]: Oct 02 19:09:03.695 INFO Fetch successful Oct 2 19:09:03.695507 coreos-metadata[1981]: Oct 02 19:09:03.695 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Oct 2 19:09:03.696675 coreos-metadata[1981]: Oct 02 19:09:03.696 INFO Fetch successful Oct 2 19:09:03.696675 coreos-metadata[1981]: Oct 02 19:09:03.696 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Oct 2 19:09:03.697191 coreos-metadata[1981]: Oct 02 19:09:03.697 INFO Fetch successful Oct 2 19:09:03.697278 coreos-metadata[1981]: Oct 02 19:09:03.697 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Oct 2 19:09:03.697669 coreos-metadata[1981]: Oct 02 19:09:03.697 INFO Fetch successful Oct 2 19:09:03.707481 systemd[1]: Finished coreos-metadata.service. Oct 2 19:09:03.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.566347 systemd[1]: Stopped kubelet.service. Oct 2 19:09:04.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.587401 systemd[1]: Reloading. Oct 2 19:09:04.680958 /usr/lib/systemd/system-generators/torcx-generator[2040]: time="2023-10-02T19:09:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:09:04.681498 /usr/lib/systemd/system-generators/torcx-generator[2040]: time="2023-10-02T19:09:04Z" level=info msg="torcx already run" Oct 2 19:09:04.813800 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:09:04.813827 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:09:04.867638 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.014000 audit: BPF prog-id=55 op=LOAD Oct 2 19:09:05.014000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit: BPF prog-id=56 op=LOAD Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.015000 audit: BPF prog-id=57 op=LOAD Oct 2 19:09:05.015000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:09:05.015000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.017000 audit: BPF prog-id=58 op=LOAD Oct 2 19:09:05.017000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.018000 audit: BPF prog-id=59 op=LOAD Oct 2 19:09:05.018000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:09:05.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.026000 audit: BPF prog-id=60 op=LOAD Oct 2 19:09:05.026000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.027000 audit: BPF prog-id=61 op=LOAD Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.028000 audit: BPF prog-id=62 op=LOAD Oct 2 19:09:05.028000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:09:05.028000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.030000 audit: BPF prog-id=63 op=LOAD Oct 2 19:09:05.030000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit: BPF prog-id=64 op=LOAD Oct 2 19:09:05.034000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit: BPF prog-id=65 op=LOAD Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.034000 audit: BPF prog-id=66 op=LOAD Oct 2 19:09:05.034000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:09:05.035000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.040000 audit: BPF prog-id=67 op=LOAD Oct 2 19:09:05.040000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:09:05.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit: BPF prog-id=68 op=LOAD Oct 2 19:09:05.041000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit: BPF prog-id=69 op=LOAD Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit: BPF prog-id=70 op=LOAD Oct 2 19:09:05.041000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:09:05.041000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit: BPF prog-id=71 op=LOAD Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.042000 audit: BPF prog-id=72 op=LOAD Oct 2 19:09:05.042000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:09:05.042000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:09:05.066214 systemd[1]: Started kubelet.service. Oct 2 19:09:05.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:05.147168 kubelet[2093]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:09:05.147168 kubelet[2093]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:09:05.147168 kubelet[2093]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:09:05.147168 kubelet[2093]: I1002 19:09:05.137981 2093 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:09:05.554860 kubelet[2093]: I1002 19:09:05.554029 2093 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:09:05.555388 kubelet[2093]: I1002 19:09:05.555351 2093 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:09:05.556069 kubelet[2093]: I1002 19:09:05.556038 2093 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:09:05.558655 kubelet[2093]: I1002 19:09:05.558631 2093 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:09:05.563959 kubelet[2093]: I1002 19:09:05.563933 2093 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:09:05.564373 kubelet[2093]: I1002 19:09:05.564358 2093 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:09:05.564622 kubelet[2093]: I1002 19:09:05.564603 2093 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:09:05.564766 kubelet[2093]: I1002 19:09:05.564757 2093 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:09:05.564813 kubelet[2093]: I1002 19:09:05.564808 2093 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:09:05.564977 kubelet[2093]: I1002 19:09:05.564968 2093 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:09:05.565123 kubelet[2093]: I1002 19:09:05.565112 2093 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:09:05.565201 kubelet[2093]: I1002 19:09:05.565192 2093 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:09:05.565313 kubelet[2093]: I1002 19:09:05.565304 2093 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:09:05.565405 kubelet[2093]: I1002 19:09:05.565397 2093 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:09:05.565643 kubelet[2093]: E1002 19:09:05.565596 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:05.565643 kubelet[2093]: E1002 19:09:05.565632 2093 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:05.566637 kubelet[2093]: I1002 19:09:05.566625 2093 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:09:05.567019 kubelet[2093]: W1002 19:09:05.567008 2093 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:09:05.567622 kubelet[2093]: I1002 19:09:05.567609 2093 server.go:1232] "Started kubelet" Oct 2 19:09:05.569349 kubelet[2093]: E1002 19:09:05.569332 2093 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:09:05.569435 kubelet[2093]: E1002 19:09:05.569361 2093 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:09:05.568000 audit[2093]: AVC avc: denied { mac_admin } for pid=2093 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.568000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:05.568000 audit[2093]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c5c240 a1=c0006e3db8 a2=c000c5c210 a3=25 items=0 ppid=1 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.568000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:05.570309 kubelet[2093]: I1002 19:09:05.570234 2093 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:09:05.569000 audit[2093]: AVC avc: denied { mac_admin } for pid=2093 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.569000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:05.569000 audit[2093]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000377fc0 a1=c0006e3dd0 a2=c000c5c2d0 a3=25 items=0 ppid=1 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.569000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:05.570741 kubelet[2093]: I1002 19:09:05.570727 2093 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:09:05.570963 kubelet[2093]: I1002 19:09:05.570900 2093 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:09:05.574807 kubelet[2093]: I1002 19:09:05.574780 2093 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:09:05.575720 kubelet[2093]: I1002 19:09:05.575691 2093 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:09:05.577068 kubelet[2093]: I1002 19:09:05.577046 2093 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:09:05.577322 kubelet[2093]: I1002 19:09:05.577307 2093 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:09:05.579863 kubelet[2093]: I1002 19:09:05.579756 2093 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:09:05.582682 kubelet[2093]: I1002 19:09:05.582650 2093 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:09:05.582989 kubelet[2093]: I1002 19:09:05.582930 2093 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:09:05.620663 kubelet[2093]: W1002 19:09:05.620634 2093 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:05.620850 kubelet[2093]: E1002 19:09:05.620836 2093 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:09:05.621067 kubelet[2093]: E1002 19:09:05.620963 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffbfe60a621", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 567589921, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 567589921, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.622964 kubelet[2093]: W1002 19:09:05.622941 2093 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.17.7" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:05.623125 kubelet[2093]: E1002 19:09:05.623114 2093 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.17.7" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:09:05.623377 kubelet[2093]: W1002 19:09:05.623256 2093 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:05.623600 kubelet[2093]: E1002 19:09:05.623586 2093 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:05.648293 kubelet[2093]: E1002 19:09:05.641075 2093 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.17.7\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 2 19:09:05.648293 kubelet[2093]: E1002 19:09:05.641149 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffbfe7b7afc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 569348348, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 569348348, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.658319 kubelet[2093]: I1002 19:09:05.655776 2093 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:09:05.658319 kubelet[2093]: I1002 19:09:05.655817 2093 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:09:05.658319 kubelet[2093]: I1002 19:09:05.655835 2093 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:09:05.658319 kubelet[2093]: E1002 19:09:05.657580 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f268d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.17.7 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651377805, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651377805, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.659564 kubelet[2093]: E1002 19:09:05.659338 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f4186", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.17.7 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651384710, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651384710, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.661050 kubelet[2093]: E1002 19:09:05.660863 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f5400", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.17.7 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651389440, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651389440, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.661398 kubelet[2093]: I1002 19:09:05.661384 2093 policy_none.go:49] "None policy: Start" Oct 2 19:09:05.662291 kubelet[2093]: I1002 19:09:05.662261 2093 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:09:05.662415 kubelet[2093]: I1002 19:09:05.662406 2093 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:09:05.662000 audit[2105]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.662000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc008acb00 a2=0 a3=7ffc008acaec items=0 ppid=2093 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:09:05.664000 audit[2112]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.664000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff4b4a0c50 a2=0 a3=7fff4b4a0c3c items=0 ppid=2093 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:09:05.674598 systemd[1]: Created slice kubepods.slice. Oct 2 19:09:05.680596 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:09:05.682691 kubelet[2093]: I1002 19:09:05.682564 2093 kubelet_node_status.go:70] "Attempting to register node" node="172.31.17.7" Oct 2 19:09:05.684088 kubelet[2093]: E1002 19:09:05.684063 2093 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.17.7" Oct 2 19:09:05.688041 kubelet[2093]: E1002 19:09:05.687935 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f268d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.17.7 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651377805, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 682477341, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f268d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.689923 kubelet[2093]: E1002 19:09:05.689834 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f4186", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.17.7 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651384710, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 682484248, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f4186" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.693305 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:09:05.666000 audit[2114]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.666000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc4bb5a400 a2=0 a3=7ffc4bb5a3ec items=0 ppid=2093 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:05.695061 kubelet[2093]: E1002 19:09:05.694957 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f5400", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.17.7 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651389440, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 682526807, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f5400" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.697036 kubelet[2093]: I1002 19:09:05.697017 2093 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:09:05.695000 audit[2093]: AVC avc: denied { mac_admin } for pid=2093 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.695000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:05.695000 audit[2093]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000804900 a1=c0008088a0 a2=c0008048d0 a3=25 items=0 ppid=1 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.695000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:05.697527 kubelet[2093]: I1002 19:09:05.697358 2093 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:09:05.697683 kubelet[2093]: I1002 19:09:05.697629 2093 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:09:05.699619 kubelet[2093]: E1002 19:09:05.699570 2093 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.17.7\" not found" Oct 2 19:09:05.699000 audit[2119]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.699000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6ae2de90 a2=0 a3=7ffd6ae2de7c items=0 ppid=2093 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:05.704643 kubelet[2093]: E1002 19:09:05.704388 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc066d58e2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 702639842, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 702639842, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.843409 kubelet[2093]: E1002 19:09:05.843298 2093 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.17.7\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 2 19:09:05.885439 kubelet[2093]: I1002 19:09:05.885407 2093 kubelet_node_status.go:70] "Attempting to register node" node="172.31.17.7" Oct 2 19:09:05.887884 kubelet[2093]: E1002 19:09:05.887849 2093 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.17.7" Oct 2 19:09:05.888053 kubelet[2093]: E1002 19:09:05.887843 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f268d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.17.7 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651377805, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 885345501, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f268d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.891257 kubelet[2093]: E1002 19:09:05.891171 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f4186", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.17.7 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651384710, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 885356528, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f4186" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.896882 kubelet[2093]: E1002 19:09:05.896772 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f5400", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.17.7 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651389440, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 885360745, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f5400" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:05.908000 audit[2124]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.908000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffed3d0e5f0 a2=0 a3=7ffed3d0e5dc items=0 ppid=2093 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:09:05.911077 kubelet[2093]: I1002 19:09:05.910998 2093 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:09:05.914000 audit[2125]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.914000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9f281380 a2=0 a3=7ffe9f28136c items=0 ppid=2093 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:09:05.915928 kubelet[2093]: I1002 19:09:05.915864 2093 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:09:05.915928 kubelet[2093]: I1002 19:09:05.915903 2093 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:09:05.915928 kubelet[2093]: I1002 19:09:05.915926 2093 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:09:05.916074 kubelet[2093]: E1002 19:09:05.915984 2093 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:09:05.917000 audit[2126]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.917000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffaaab1470 a2=0 a3=10e3 items=0 ppid=2093 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:09:05.921813 kubelet[2093]: W1002 19:09:05.921789 2093 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:05.922147 kubelet[2093]: E1002 19:09:05.922129 2093 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:09:05.921000 audit[2127]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.921000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd236f2de0 a2=0 a3=7ffd236f2dcc items=0 ppid=2093 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:09:05.924000 audit[2128]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.924000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff121b9f00 a2=0 a3=7fff121b9eec items=0 ppid=2093 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:09:05.924000 audit[2129]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.924000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff6d06d570 a2=0 a3=7fff6d06d55c items=0 ppid=2093 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:09:05.926000 audit[2130]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.926000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffcf02a310 a2=0 a3=7fffcf02a2fc items=0 ppid=2093 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:09:05.926000 audit[2131]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.926000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffded334110 a2=0 a3=7ffded3340fc items=0 ppid=2093 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:09:06.259534 kubelet[2093]: E1002 19:09:06.259406 2093 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.17.7\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 2 19:09:06.289933 kubelet[2093]: I1002 19:09:06.289893 2093 kubelet_node_status.go:70] "Attempting to register node" node="172.31.17.7" Oct 2 19:09:06.295622 kubelet[2093]: E1002 19:09:06.295586 2093 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.17.7" Oct 2 19:09:06.300072 kubelet[2093]: E1002 19:09:06.299965 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f268d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.17.7 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651377805, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 289829674, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f268d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:06.309829 kubelet[2093]: E1002 19:09:06.309733 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f4186", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.17.7 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651384710, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 289836121, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f4186" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:06.313800 kubelet[2093]: E1002 19:09:06.313701 2093 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7.178a5ffc035f5400", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.17.7", UID:"172.31.17.7", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.17.7 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.17.7"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 651389440, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 289840356, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.17.7"}': 'events "172.31.17.7.178a5ffc035f5400" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:09:06.454160 kubelet[2093]: W1002 19:09:06.454097 2093 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:06.454160 kubelet[2093]: E1002 19:09:06.454157 2093 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:09:06.559006 kubelet[2093]: I1002 19:09:06.558810 2093 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:09:06.566097 kubelet[2093]: E1002 19:09:06.566055 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:07.023027 kubelet[2093]: E1002 19:09:07.022913 2093 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.17.7" not found Oct 2 19:09:07.097245 kubelet[2093]: I1002 19:09:07.097219 2093 kubelet_node_status.go:70] "Attempting to register node" node="172.31.17.7" Oct 2 19:09:07.134680 kubelet[2093]: E1002 19:09:07.134639 2093 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.17.7\" not found" node="172.31.17.7" Oct 2 19:09:07.166934 kubelet[2093]: I1002 19:09:07.166839 2093 kubelet_node_status.go:73] "Successfully registered node" node="172.31.17.7" Oct 2 19:09:07.376692 kubelet[2093]: I1002 19:09:07.376223 2093 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:09:07.377042 env[1634]: time="2023-10-02T19:09:07.376641754Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:09:07.377430 kubelet[2093]: I1002 19:09:07.377411 2093 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:09:07.566316 kubelet[2093]: E1002 19:09:07.566257 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:07.566316 kubelet[2093]: I1002 19:09:07.566287 2093 apiserver.go:52] "Watching apiserver" Oct 2 19:09:07.570088 kubelet[2093]: I1002 19:09:07.570004 2093 topology_manager.go:215] "Topology Admit Handler" podUID="caae8a77-8bf9-487c-a6da-5cd6b03acaca" podNamespace="calico-system" podName="calico-node-zbp5z" Oct 2 19:09:07.570245 kubelet[2093]: I1002 19:09:07.570172 2093 topology_manager.go:215] "Topology Admit Handler" podUID="780fb1d9-45fe-4c90-a6b7-a025730e3dd4" podNamespace="kube-system" podName="kube-proxy-chv8g" Oct 2 19:09:07.584050 systemd[1]: Created slice kubepods-besteffort-pod780fb1d9_45fe_4c90_a6b7_a025730e3dd4.slice. Oct 2 19:09:07.585815 kubelet[2093]: I1002 19:09:07.585793 2093 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:09:07.595585 kubelet[2093]: I1002 19:09:07.595421 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-policysync\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.595585 kubelet[2093]: I1002 19:09:07.595476 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/caae8a77-8bf9-487c-a6da-5cd6b03acaca-node-certs\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.595585 kubelet[2093]: I1002 19:09:07.595507 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/780fb1d9-45fe-4c90-a6b7-a025730e3dd4-kube-proxy\") pod \"kube-proxy-chv8g\" (UID: \"780fb1d9-45fe-4c90-a6b7-a025730e3dd4\") " pod="kube-system/kube-proxy-chv8g" Oct 2 19:09:07.595585 kubelet[2093]: I1002 19:09:07.595548 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hct8z\" (UniqueName: \"kubernetes.io/projected/780fb1d9-45fe-4c90-a6b7-a025730e3dd4-kube-api-access-hct8z\") pod \"kube-proxy-chv8g\" (UID: \"780fb1d9-45fe-4c90-a6b7-a025730e3dd4\") " pod="kube-system/kube-proxy-chv8g" Oct 2 19:09:07.595585 kubelet[2093]: I1002 19:09:07.595576 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-lib-modules\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.595907 kubelet[2093]: I1002 19:09:07.595603 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-xtables-lock\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.595907 kubelet[2093]: I1002 19:09:07.595640 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-cni-bin-dir\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.595907 kubelet[2093]: I1002 19:09:07.595665 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/780fb1d9-45fe-4c90-a6b7-a025730e3dd4-xtables-lock\") pod \"kube-proxy-chv8g\" (UID: \"780fb1d9-45fe-4c90-a6b7-a025730e3dd4\") " pod="kube-system/kube-proxy-chv8g" Oct 2 19:09:07.595907 kubelet[2093]: I1002 19:09:07.595693 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/caae8a77-8bf9-487c-a6da-5cd6b03acaca-tigera-ca-bundle\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.595907 kubelet[2093]: I1002 19:09:07.595720 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-var-run-calico\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.596109 kubelet[2093]: I1002 19:09:07.595747 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-var-lib-calico\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.596109 kubelet[2093]: I1002 19:09:07.595789 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-cni-log-dir\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.596109 kubelet[2093]: I1002 19:09:07.595821 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t9hgj\" (UniqueName: \"kubernetes.io/projected/caae8a77-8bf9-487c-a6da-5cd6b03acaca-kube-api-access-t9hgj\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.596109 kubelet[2093]: I1002 19:09:07.595859 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/780fb1d9-45fe-4c90-a6b7-a025730e3dd4-lib-modules\") pod \"kube-proxy-chv8g\" (UID: \"780fb1d9-45fe-4c90-a6b7-a025730e3dd4\") " pod="kube-system/kube-proxy-chv8g" Oct 2 19:09:07.596109 kubelet[2093]: I1002 19:09:07.595889 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-cni-net-dir\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.598412 kubelet[2093]: I1002 19:09:07.595918 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/caae8a77-8bf9-487c-a6da-5cd6b03acaca-flexvol-driver-host\") pod \"calico-node-zbp5z\" (UID: \"caae8a77-8bf9-487c-a6da-5cd6b03acaca\") " pod="calico-system/calico-node-zbp5z" Oct 2 19:09:07.602475 systemd[1]: Created slice kubepods-besteffort-podcaae8a77_8bf9_487c_a6da_5cd6b03acaca.slice. Oct 2 19:09:07.615360 sudo[1893]: pam_unix(sudo:session): session closed for user root Oct 2 19:09:07.614000 audit[1893]: USER_END pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.617359 kernel: kauditd_printk_skb: 477 callbacks suppressed Oct 2 19:09:07.617458 kernel: audit: type=1106 audit(1696273747.614:614): pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.614000 audit[1893]: CRED_DISP pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.627445 kernel: audit: type=1104 audit(1696273747.614:615): pid=1893 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.638760 sshd[1890]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:07.639000 audit[1890]: USER_END pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.644664 systemd[1]: sshd@6-172.31.17.7:22-139.178.89.65:34478.service: Deactivated successfully. Oct 2 19:09:07.645883 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:09:07.648281 systemd-logind[1625]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:09:07.639000 audit[1890]: CRED_DISP pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.650600 systemd-logind[1625]: Removed session 7. Oct 2 19:09:07.655467 kernel: audit: type=1106 audit(1696273747.639:616): pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.655564 kernel: audit: type=1104 audit(1696273747.639:617): pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.655587 kernel: audit: type=1131 audit(1696273747.640:618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.17.7:22-139.178.89.65:34478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.17.7:22-139.178.89.65:34478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.705612 kubelet[2093]: E1002 19:09:07.705580 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.705821 kubelet[2093]: W1002 19:09:07.705804 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.705946 kubelet[2093]: E1002 19:09:07.705934 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.713787 kubelet[2093]: E1002 19:09:07.713733 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.714361 kubelet[2093]: W1002 19:09:07.714336 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.714500 kubelet[2093]: E1002 19:09:07.714488 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.714944 kubelet[2093]: E1002 19:09:07.714928 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.715404 kubelet[2093]: W1002 19:09:07.715386 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.715838 kubelet[2093]: E1002 19:09:07.715675 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.715942 kubelet[2093]: W1002 19:09:07.715930 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.716030 kubelet[2093]: E1002 19:09:07.716021 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.716234 kubelet[2093]: E1002 19:09:07.715856 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.716543 kubelet[2093]: E1002 19:09:07.716532 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.716631 kubelet[2093]: W1002 19:09:07.716621 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.716710 kubelet[2093]: E1002 19:09:07.716702 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.717111 kubelet[2093]: E1002 19:09:07.717099 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.717206 kubelet[2093]: W1002 19:09:07.717195 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.717385 kubelet[2093]: E1002 19:09:07.717373 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.764106 kubelet[2093]: E1002 19:09:07.764077 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.765112 kubelet[2093]: W1002 19:09:07.765082 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.765244 kubelet[2093]: E1002 19:09:07.765231 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.778405 kubelet[2093]: E1002 19:09:07.778375 2093 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:07.778405 kubelet[2093]: W1002 19:09:07.778397 2093 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:07.778726 kubelet[2093]: E1002 19:09:07.778423 2093 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:07.900248 env[1634]: time="2023-10-02T19:09:07.900116547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-chv8g,Uid:780fb1d9-45fe-4c90-a6b7-a025730e3dd4,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:07.912960 env[1634]: time="2023-10-02T19:09:07.912914591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zbp5z,Uid:caae8a77-8bf9-487c-a6da-5cd6b03acaca,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:08.555350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3576634970.mount: Deactivated successfully. Oct 2 19:09:08.566794 kubelet[2093]: E1002 19:09:08.566488 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:08.579414 env[1634]: time="2023-10-02T19:09:08.579358078Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.581278 env[1634]: time="2023-10-02T19:09:08.581218967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.588975 env[1634]: time="2023-10-02T19:09:08.588926269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.590605 env[1634]: time="2023-10-02T19:09:08.590564224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.592181 env[1634]: time="2023-10-02T19:09:08.592144252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.594756 env[1634]: time="2023-10-02T19:09:08.594711417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.596130 env[1634]: time="2023-10-02T19:09:08.596093655Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.599050 env[1634]: time="2023-10-02T19:09:08.599008578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.662324 env[1634]: time="2023-10-02T19:09:08.662149486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:08.662937 env[1634]: time="2023-10-02T19:09:08.662219110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:08.662937 env[1634]: time="2023-10-02T19:09:08.662316764Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:08.662937 env[1634]: time="2023-10-02T19:09:08.662357557Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:08.663694 env[1634]: time="2023-10-02T19:09:08.663493873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57 pid=2160 runtime=io.containerd.runc.v2 Oct 2 19:09:08.663794 env[1634]: time="2023-10-02T19:09:08.663488534Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:08.663919 env[1634]: time="2023-10-02T19:09:08.663880412Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:08.664186 env[1634]: time="2023-10-02T19:09:08.664139791Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/147c2775fe8d9caae97a3689c7f419ccf437886b17ff14223a5c3f0538af81ed pid=2161 runtime=io.containerd.runc.v2 Oct 2 19:09:08.697343 systemd[1]: Started cri-containerd-0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57.scope. Oct 2 19:09:08.746442 systemd[1]: Started cri-containerd-147c2775fe8d9caae97a3689c7f419ccf437886b17ff14223a5c3f0538af81ed.scope. Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.761295 kernel: audit: type=1400 audit(1696273748.752:619): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.768303 kernel: audit: type=1400 audit(1696273748.752:620): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.774380 kernel: audit: type=1400 audit(1696273748.752:621): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.774488 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.753000 audit: BPF prog-id=73 op=LOAD Oct 2 19:09:08.759000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.759000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2160 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393063393336333265386532353765373030343630376434343932 Oct 2 19:09:08.759000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.759000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2160 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393063393336333265386532353765373030343630376434343932 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.777191 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit: BPF prog-id=74 op=LOAD Oct 2 19:09:08.760000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000214570 items=0 ppid=2160 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393063393336333265386532353765373030343630376434343932 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit: BPF prog-id=75 op=LOAD Oct 2 19:09:08.760000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002145b8 items=0 ppid=2160 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393063393336333265386532353765373030343630376434343932 Oct 2 19:09:08.760000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:09:08.760000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.760000 audit: BPF prog-id=76 op=LOAD Oct 2 19:09:08.760000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002149c8 items=0 ppid=2160 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393063393336333265386532353765373030343630376434343932 Oct 2 19:09:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.776000 audit: BPF prog-id=77 op=LOAD Oct 2 19:09:08.777000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.777000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2161 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134376332373735666538643963616165393761333638396337663431 Oct 2 19:09:08.777000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.777000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2161 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134376332373735666538643963616165393761333638396337663431 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit: BPF prog-id=78 op=LOAD Oct 2 19:09:08.779000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ade90 items=0 ppid=2161 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134376332373735666538643963616165393761333638396337663431 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit: BPF prog-id=79 op=LOAD Oct 2 19:09:08.779000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001aded8 items=0 ppid=2161 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134376332373735666538643963616165393761333638396337663431 Oct 2 19:09:08.779000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:09:08.779000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.779000 audit: BPF prog-id=80 op=LOAD Oct 2 19:09:08.779000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023e2e8 items=0 ppid=2161 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134376332373735666538643963616165393761333638396337663431 Oct 2 19:09:08.800799 env[1634]: time="2023-10-02T19:09:08.800752172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zbp5z,Uid:caae8a77-8bf9-487c-a6da-5cd6b03acaca,Namespace:calico-system,Attempt:0,} returns sandbox id \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\"" Oct 2 19:09:08.811492 env[1634]: time="2023-10-02T19:09:08.811371017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-chv8g,Uid:780fb1d9-45fe-4c90-a6b7-a025730e3dd4,Namespace:kube-system,Attempt:0,} returns sandbox id \"147c2775fe8d9caae97a3689c7f419ccf437886b17ff14223a5c3f0538af81ed\"" Oct 2 19:09:08.811853 env[1634]: time="2023-10-02T19:09:08.811390632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:09:09.567475 kubelet[2093]: E1002 19:09:09.567428 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:10.069766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1780921827.mount: Deactivated successfully. Oct 2 19:09:10.569216 kubelet[2093]: E1002 19:09:10.569071 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:11.408489 env[1634]: time="2023-10-02T19:09:11.408432355Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:11.418361 env[1634]: time="2023-10-02T19:09:11.418248130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:11.439632 env[1634]: time="2023-10-02T19:09:11.439583541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:11.448076 env[1634]: time="2023-10-02T19:09:11.448027463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:11.449218 env[1634]: time="2023-10-02T19:09:11.449174175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:09:11.451044 env[1634]: time="2023-10-02T19:09:11.451005135Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:09:11.452406 env[1634]: time="2023-10-02T19:09:11.452365607Z" level=info msg="CreateContainer within sandbox \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:09:11.468498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1506689009.mount: Deactivated successfully. Oct 2 19:09:11.474947 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3713324820.mount: Deactivated successfully. Oct 2 19:09:11.486715 env[1634]: time="2023-10-02T19:09:11.486664477Z" level=info msg="CreateContainer within sandbox \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf\"" Oct 2 19:09:11.487743 env[1634]: time="2023-10-02T19:09:11.487706516Z" level=info msg="StartContainer for \"738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf\"" Oct 2 19:09:11.513618 systemd[1]: Started cri-containerd-738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf.scope. Oct 2 19:09:11.533000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.533000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:11.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386263633763353633393732303663643264383936373437643837 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit: BPF prog-id=81 op=LOAD Oct 2 19:09:11.534000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000293570 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:11.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386263633763353633393732303663643264383936373437643837 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit: BPF prog-id=82 op=LOAD Oct 2 19:09:11.534000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002935b8 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:11.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386263633763353633393732303663643264383936373437643837 Oct 2 19:09:11.534000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:09:11.534000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:11.534000 audit: BPF prog-id=83 op=LOAD Oct 2 19:09:11.534000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000293648 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:11.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386263633763353633393732303663643264383936373437643837 Oct 2 19:09:11.557949 env[1634]: time="2023-10-02T19:09:11.557746936Z" level=info msg="StartContainer for \"738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf\" returns successfully" Oct 2 19:09:11.568096 systemd[1]: cri-containerd-738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf.scope: Deactivated successfully. Oct 2 19:09:11.569944 kubelet[2093]: E1002 19:09:11.569627 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:11.571000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:09:11.722008 env[1634]: time="2023-10-02T19:09:11.721834509Z" level=info msg="shim disconnected" id=738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf Oct 2 19:09:11.722008 env[1634]: time="2023-10-02T19:09:11.721923431Z" level=warning msg="cleaning up after shim disconnected" id=738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf namespace=k8s.io Oct 2 19:09:11.722008 env[1634]: time="2023-10-02T19:09:11.721936595Z" level=info msg="cleaning up dead shim" Oct 2 19:09:11.735641 env[1634]: time="2023-10-02T19:09:11.735595268Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2275 runtime=io.containerd.runc.v2\n" Oct 2 19:09:12.480683 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-738bcc7c56397206cd2d896747d8738066817c52d85bf1791e117cfcde0d9abf-rootfs.mount: Deactivated successfully. Oct 2 19:09:12.570906 kubelet[2093]: E1002 19:09:12.570717 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:13.095193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2454955642.mount: Deactivated successfully. Oct 2 19:09:13.571726 kubelet[2093]: E1002 19:09:13.571380 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:14.139404 env[1634]: time="2023-10-02T19:09:14.139356064Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:14.142337 env[1634]: time="2023-10-02T19:09:14.142293514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:14.144578 env[1634]: time="2023-10-02T19:09:14.144543880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:14.146751 env[1634]: time="2023-10-02T19:09:14.146714149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:14.147234 env[1634]: time="2023-10-02T19:09:14.147198691Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:09:14.148572 env[1634]: time="2023-10-02T19:09:14.148461149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:09:14.149396 env[1634]: time="2023-10-02T19:09:14.149364326Z" level=info msg="CreateContainer within sandbox \"147c2775fe8d9caae97a3689c7f419ccf437886b17ff14223a5c3f0538af81ed\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:09:14.169591 env[1634]: time="2023-10-02T19:09:14.169531764Z" level=info msg="CreateContainer within sandbox \"147c2775fe8d9caae97a3689c7f419ccf437886b17ff14223a5c3f0538af81ed\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"08d59b2528c59d96445a248d2967e81968b0b5536cb4c0a44586d597edafb953\"" Oct 2 19:09:14.170373 env[1634]: time="2023-10-02T19:09:14.170329711Z" level=info msg="StartContainer for \"08d59b2528c59d96445a248d2967e81968b0b5536cb4c0a44586d597edafb953\"" Oct 2 19:09:14.203818 systemd[1]: Started cri-containerd-08d59b2528c59d96445a248d2967e81968b0b5536cb4c0a44586d597edafb953.scope. Oct 2 19:09:14.235908 kernel: kauditd_printk_skb: 155 callbacks suppressed Oct 2 19:09:14.236058 kernel: audit: type=1400 audit(1696273754.222:661): avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.236101 kernel: audit: type=1300 audit(1696273754.222:661): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2161 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.222000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.222000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2161 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643539623235323863353964393634343561323438643239363765 Oct 2 19:09:14.248121 kernel: audit: type=1327 audit(1696273754.222:661): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643539623235323863353964393634343561323438643239363765 Oct 2 19:09:14.248281 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.257456 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.269245 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.269393 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.282307 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.282445 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.287874 kernel: audit: type=1400 audit(1696273754.223:662): avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit: BPF prog-id=84 op=LOAD Oct 2 19:09:14.223000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ea490 items=0 ppid=2161 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643539623235323863353964393634343561323438643239363765 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.223000 audit: BPF prog-id=85 op=LOAD Oct 2 19:09:14.223000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ea4d8 items=0 ppid=2161 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643539623235323863353964393634343561323438643239363765 Oct 2 19:09:14.227000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:09:14.227000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:14.227000 audit: BPF prog-id=86 op=LOAD Oct 2 19:09:14.227000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea568 items=0 ppid=2161 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038643539623235323863353964393634343561323438643239363765 Oct 2 19:09:14.294447 env[1634]: time="2023-10-02T19:09:14.293064834Z" level=info msg="StartContainer for \"08d59b2528c59d96445a248d2967e81968b0b5536cb4c0a44586d597edafb953\" returns successfully" Oct 2 19:09:14.381000 audit[2347]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.381000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1faece80 a2=0 a3=7fff1faece6c items=0 ppid=2309 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:09:14.384000 audit[2348]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.384000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd565fcf80 a2=0 a3=7ffd565fcf6c items=0 ppid=2309 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:09:14.387000 audit[2349]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.387000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebd16a3b0 a2=0 a3=7ffebd16a39c items=0 ppid=2309 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:09:14.387000 audit[2351]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.387000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd60525a80 a2=0 a3=7ffd60525a6c items=0 ppid=2309 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:09:14.391000 audit[2352]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.391000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff67d57690 a2=0 a3=7fff67d5767c items=0 ppid=2309 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:09:14.392000 audit[2353]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.392000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdec1ab8f0 a2=0 a3=7ffdec1ab8dc items=0 ppid=2309 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:09:14.483000 audit[2354]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.483000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcbb4e1580 a2=0 a3=7ffcbb4e156c items=0 ppid=2309 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:09:14.489000 audit[2356]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.489000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc7a57040 a2=0 a3=7ffdc7a5702c items=0 ppid=2309 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:09:14.496000 audit[2359]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.496000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4e094e40 a2=0 a3=7ffc4e094e2c items=0 ppid=2309 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:09:14.499000 audit[2360]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.499000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd04630560 a2=0 a3=7ffd0463054c items=0 ppid=2309 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:09:14.506000 audit[2362]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.506000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8b4b9650 a2=0 a3=7ffd8b4b963c items=0 ppid=2309 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:09:14.508000 audit[2363]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.508000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff849b2c80 a2=0 a3=7fff849b2c6c items=0 ppid=2309 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:09:14.514000 audit[2365]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.514000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda924b130 a2=0 a3=7ffda924b11c items=0 ppid=2309 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:09:14.521000 audit[2368]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.521000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe59418ff0 a2=0 a3=7ffe59418fdc items=0 ppid=2309 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:09:14.523000 audit[2369]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.523000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc8eb3c30 a2=0 a3=7fffc8eb3c1c items=0 ppid=2309 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:09:14.526000 audit[2371]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.526000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd110d430 a2=0 a3=7ffdd110d41c items=0 ppid=2309 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:09:14.527000 audit[2372]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.527000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbbd14cc0 a2=0 a3=7ffdbbd14cac items=0 ppid=2309 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:09:14.530000 audit[2374]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.530000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd73e12730 a2=0 a3=7ffd73e1271c items=0 ppid=2309 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:14.535000 audit[2377]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.535000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc34d8940 a2=0 a3=7fffc34d892c items=0 ppid=2309 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:14.539000 audit[2380]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.539000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1ac585c0 a2=0 a3=7fff1ac585ac items=0 ppid=2309 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:09:14.541000 audit[2381]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.541000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff89321ba0 a2=0 a3=7fff89321b8c items=0 ppid=2309 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:09:14.572491 kubelet[2093]: E1002 19:09:14.572447 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:14.544000 audit[2383]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.544000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe74de7090 a2=0 a3=7ffe74de707c items=0 ppid=2309 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:14.584000 audit[2388]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.584000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdf7342ac0 a2=0 a3=7ffdf7342aac items=0 ppid=2309 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:14.586000 audit[2389]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.586000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb4e3cce0 a2=0 a3=7ffeb4e3cccc items=0 ppid=2309 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:09:14.590000 audit[2391]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:14.590000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff24733f80 a2=0 a3=7fff24733f6c items=0 ppid=2309 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:09:14.611000 audit[2397]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:14.611000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffda571c170 a2=0 a3=7ffda571c15c items=0 ppid=2309 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:14.638000 audit[2397]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:14.638000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffda571c170 a2=0 a3=7ffda571c15c items=0 ppid=2309 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:14.668000 audit[2406]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.668000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf04b4120 a2=0 a3=7ffcf04b410c items=0 ppid=2309 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:09:14.673000 audit[2408]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.673000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea0f34c40 a2=0 a3=7ffea0f34c2c items=0 ppid=2309 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:09:14.678000 audit[2411]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.678000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7f756920 a2=0 a3=7ffe7f75690c items=0 ppid=2309 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:09:14.680000 audit[2412]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.680000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0b4396d0 a2=0 a3=7ffe0b4396bc items=0 ppid=2309 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:09:14.683000 audit[2414]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.683000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeef11f7d0 a2=0 a3=7ffeef11f7bc items=0 ppid=2309 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:09:14.685000 audit[2415]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.685000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7df53930 a2=0 a3=7ffc7df5391c items=0 ppid=2309 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:09:14.688000 audit[2417]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.688000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe22079b30 a2=0 a3=7ffe22079b1c items=0 ppid=2309 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:09:14.694000 audit[2420]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.694000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe8fb20860 a2=0 a3=7ffe8fb2084c items=0 ppid=2309 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:09:14.698000 audit[2421]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.698000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc9753fe0 a2=0 a3=7ffcc9753fcc items=0 ppid=2309 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:09:14.701000 audit[2423]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.701000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff87886ac0 a2=0 a3=7fff87886aac items=0 ppid=2309 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:09:14.703000 audit[2424]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.703000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca9d802e0 a2=0 a3=7ffca9d802cc items=0 ppid=2309 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:09:14.719000 audit[2426]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.719000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbd3b0110 a2=0 a3=7fffbd3b00fc items=0 ppid=2309 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:14.734000 audit[2429]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.734000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf31d3970 a2=0 a3=7ffcf31d395c items=0 ppid=2309 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:09:14.750000 audit[2432]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.750000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc28ccfd0 a2=0 a3=7ffcc28ccfbc items=0 ppid=2309 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:09:14.752000 audit[2433]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.752000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff30881ba0 a2=0 a3=7fff30881b8c items=0 ppid=2309 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:09:14.756000 audit[2435]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.756000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcf77c56f0 a2=0 a3=7ffcf77c56dc items=0 ppid=2309 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:14.764000 audit[2438]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.764000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffed8b81040 a2=0 a3=7ffed8b8102c items=0 ppid=2309 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:14.768000 audit[2439]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.768000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef7b0af20 a2=0 a3=7ffef7b0af0c items=0 ppid=2309 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:09:14.771000 audit[2441]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.771000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc5f237430 a2=0 a3=7ffc5f23741c items=0 ppid=2309 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:09:14.773000 audit[2442]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.773000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd93e23730 a2=0 a3=7ffd93e2371c items=0 ppid=2309 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:09:14.776000 audit[2444]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.776000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdccd62820 a2=0 a3=7ffdccd6280c items=0 ppid=2309 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:14.781000 audit[2447]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:14.781000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4d557400 a2=0 a3=7fff4d5573ec items=0 ppid=2309 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:14.784000 audit[2449]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:09:14.784000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd8e57d7c0 a2=0 a3=7ffd8e57d7ac items=0 ppid=2309 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.784000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:14.785000 audit[2449]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:09:14.785000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd8e57d7c0 a2=0 a3=7ffd8e57d7ac items=0 ppid=2309 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:14.785000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:14.991467 kubelet[2093]: I1002 19:09:14.991339 2093 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-chv8g" podStartSLOduration=2.6608736520000003 podCreationTimestamp="2023-10-02 19:09:07 +0000 UTC" firstStartedPulling="2023-10-02 19:09:08.817173114 +0000 UTC m=+3.744380605" lastFinishedPulling="2023-10-02 19:09:14.147599168 +0000 UTC m=+9.074806658" observedRunningTime="2023-10-02 19:09:14.991180019 +0000 UTC m=+9.918387528" watchObservedRunningTime="2023-10-02 19:09:14.991299705 +0000 UTC m=+9.918507213" Oct 2 19:09:15.165177 systemd[1]: run-containerd-runc-k8s.io-08d59b2528c59d96445a248d2967e81968b0b5536cb4c0a44586d597edafb953-runc.X03UvI.mount: Deactivated successfully. Oct 2 19:09:15.378741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3384042194.mount: Deactivated successfully. Oct 2 19:09:15.574846 kubelet[2093]: E1002 19:09:15.574795 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:16.575512 kubelet[2093]: E1002 19:09:16.575469 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:17.576748 kubelet[2093]: E1002 19:09:17.576712 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:18.578077 kubelet[2093]: E1002 19:09:18.578036 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:19.578535 kubelet[2093]: E1002 19:09:19.578476 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:20.176877 env[1634]: time="2023-10-02T19:09:20.176823392Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:20.180378 env[1634]: time="2023-10-02T19:09:20.180332880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:20.183192 env[1634]: time="2023-10-02T19:09:20.183147847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:20.187365 env[1634]: time="2023-10-02T19:09:20.187314807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:20.188386 env[1634]: time="2023-10-02T19:09:20.188337882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:09:20.191559 env[1634]: time="2023-10-02T19:09:20.191514647Z" level=info msg="CreateContainer within sandbox \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:09:20.229088 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2097716508.mount: Deactivated successfully. Oct 2 19:09:20.242518 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2115265215.mount: Deactivated successfully. Oct 2 19:09:20.247415 env[1634]: time="2023-10-02T19:09:20.247356294Z" level=info msg="CreateContainer within sandbox \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363\"" Oct 2 19:09:20.248426 env[1634]: time="2023-10-02T19:09:20.248383991Z" level=info msg="StartContainer for \"6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363\"" Oct 2 19:09:20.287507 systemd[1]: Started cri-containerd-6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363.scope. Oct 2 19:09:20.311000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.314477 kernel: kauditd_printk_skb: 186 callbacks suppressed Oct 2 19:09:20.314577 kernel: audit: type=1400 audit(1696273760.311:718): avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.311000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2160 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.328627 kernel: audit: type=1300 audit(1696273760.311:718): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2160 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.328770 kernel: audit: type=1327 audit(1696273760.311:718): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626135663533316632333233613662346439643562393162633439 Oct 2 19:09:20.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626135663533316632333233613662346439643562393162633439 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.341216 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.341384 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.363399 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.377391 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.377605 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.385853 env[1634]: time="2023-10-02T19:09:20.385649637Z" level=info msg="StartContainer for \"6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363\" returns successfully" Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.394209 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.394365 kernel: audit: type=1400 audit(1696273760.312:719): avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.312000 audit: BPF prog-id=87 op=LOAD Oct 2 19:09:20.312000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000349bc0 items=0 ppid=2160 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626135663533316632333233613662346439643562393162633439 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.327000 audit: BPF prog-id=88 op=LOAD Oct 2 19:09:20.327000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000349c08 items=0 ppid=2160 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626135663533316632333233613662346439643562393162633439 Oct 2 19:09:20.335000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:09:20.335000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:20.335000 audit: BPF prog-id=89 op=LOAD Oct 2 19:09:20.335000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000349c98 items=0 ppid=2160 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:20.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626135663533316632333233613662346439643562393162633439 Oct 2 19:09:20.579644 kubelet[2093]: E1002 19:09:20.579519 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:21.580518 kubelet[2093]: E1002 19:09:21.580482 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:21.928295 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:09:21.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:21.947000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:09:21.947000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:09:21.947000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:09:22.580887 kubelet[2093]: E1002 19:09:22.580846 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:23.188173 env[1634]: time="2023-10-02T19:09:23.188097436Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:09:23.192538 systemd[1]: cri-containerd-6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363.scope: Deactivated successfully. Oct 2 19:09:23.196000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:09:23.243821 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363-rootfs.mount: Deactivated successfully. Oct 2 19:09:23.286303 kubelet[2093]: I1002 19:09:23.286259 2093 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:09:23.360713 kubelet[2093]: I1002 19:09:23.360669 2093 topology_manager.go:215] "Topology Admit Handler" podUID="5bf6389e-be28-43e1-b56c-59b148d76ba1" podNamespace="calico-system" podName="csi-node-driver-kjpdn" Oct 2 19:09:23.365655 systemd[1]: Created slice kubepods-besteffort-pod5bf6389e_be28_43e1_b56c_59b148d76ba1.slice. Oct 2 19:09:23.526997 kubelet[2093]: I1002 19:09:23.526526 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5bf6389e-be28-43e1-b56c-59b148d76ba1-varrun\") pod \"csi-node-driver-kjpdn\" (UID: \"5bf6389e-be28-43e1-b56c-59b148d76ba1\") " pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:23.526997 kubelet[2093]: I1002 19:09:23.526625 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5bf6389e-be28-43e1-b56c-59b148d76ba1-kubelet-dir\") pod \"csi-node-driver-kjpdn\" (UID: \"5bf6389e-be28-43e1-b56c-59b148d76ba1\") " pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:23.526997 kubelet[2093]: I1002 19:09:23.526673 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5bf6389e-be28-43e1-b56c-59b148d76ba1-socket-dir\") pod \"csi-node-driver-kjpdn\" (UID: \"5bf6389e-be28-43e1-b56c-59b148d76ba1\") " pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:23.526997 kubelet[2093]: I1002 19:09:23.526727 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/5bf6389e-be28-43e1-b56c-59b148d76ba1-etccalico\") pod \"csi-node-driver-kjpdn\" (UID: \"5bf6389e-be28-43e1-b56c-59b148d76ba1\") " pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:23.526997 kubelet[2093]: I1002 19:09:23.526766 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dg55h\" (UniqueName: \"kubernetes.io/projected/5bf6389e-be28-43e1-b56c-59b148d76ba1-kube-api-access-dg55h\") pod \"csi-node-driver-kjpdn\" (UID: \"5bf6389e-be28-43e1-b56c-59b148d76ba1\") " pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:23.527297 kubelet[2093]: I1002 19:09:23.526828 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5bf6389e-be28-43e1-b56c-59b148d76ba1-registration-dir\") pod \"csi-node-driver-kjpdn\" (UID: \"5bf6389e-be28-43e1-b56c-59b148d76ba1\") " pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:23.581097 kubelet[2093]: E1002 19:09:23.580986 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:23.674591 env[1634]: time="2023-10-02T19:09:23.674444411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kjpdn,Uid:5bf6389e-be28-43e1-b56c-59b148d76ba1,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:24.349054 env[1634]: time="2023-10-02T19:09:24.348628004Z" level=error msg="Failed to destroy network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:24.355778 env[1634]: time="2023-10-02T19:09:24.351604326Z" level=error msg="encountered an error cleaning up failed sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:24.355778 env[1634]: time="2023-10-02T19:09:24.351702031Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kjpdn,Uid:5bf6389e-be28-43e1-b56c-59b148d76ba1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:24.355897 kubelet[2093]: E1002 19:09:24.352301 2093 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:24.355897 kubelet[2093]: E1002 19:09:24.354297 2093 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:24.355897 kubelet[2093]: E1002 19:09:24.354347 2093 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kjpdn" Oct 2 19:09:24.351078 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a-shm.mount: Deactivated successfully. Oct 2 19:09:24.357234 kubelet[2093]: E1002 19:09:24.354424 2093 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kjpdn_calico-system(5bf6389e-be28-43e1-b56c-59b148d76ba1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kjpdn_calico-system(5bf6389e-be28-43e1-b56c-59b148d76ba1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kjpdn" podUID="5bf6389e-be28-43e1-b56c-59b148d76ba1" Oct 2 19:09:24.582434 kubelet[2093]: E1002 19:09:24.582358 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:24.675117 env[1634]: time="2023-10-02T19:09:24.674384822Z" level=info msg="shim disconnected" id=6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363 Oct 2 19:09:24.675117 env[1634]: time="2023-10-02T19:09:24.674442311Z" level=warning msg="cleaning up after shim disconnected" id=6cba5f531f2323a6b4d9d5b91bc49042e511bb1ef902c5eb3b153b1f497b5363 namespace=k8s.io Oct 2 19:09:24.675117 env[1634]: time="2023-10-02T19:09:24.674454660Z" level=info msg="cleaning up dead shim" Oct 2 19:09:24.725201 env[1634]: time="2023-10-02T19:09:24.725143074Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2536 runtime=io.containerd.runc.v2\n" Oct 2 19:09:25.010332 env[1634]: time="2023-10-02T19:09:25.009789399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:09:25.010557 kubelet[2093]: I1002 19:09:25.010135 2093 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:09:25.011773 env[1634]: time="2023-10-02T19:09:25.011115936Z" level=info msg="StopPodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\"" Oct 2 19:09:25.060728 env[1634]: time="2023-10-02T19:09:25.060661873Z" level=error msg="StopPodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" failed" error="failed to destroy network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:25.061250 kubelet[2093]: E1002 19:09:25.061113 2093 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:09:25.061382 kubelet[2093]: E1002 19:09:25.061333 2093 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a"} Oct 2 19:09:25.061434 kubelet[2093]: E1002 19:09:25.061393 2093 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5bf6389e-be28-43e1-b56c-59b148d76ba1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:25.061511 kubelet[2093]: E1002 19:09:25.061438 2093 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5bf6389e-be28-43e1-b56c-59b148d76ba1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kjpdn" podUID="5bf6389e-be28-43e1-b56c-59b148d76ba1" Oct 2 19:09:25.565443 kubelet[2093]: E1002 19:09:25.565392 2093 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:25.582954 kubelet[2093]: E1002 19:09:25.582896 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:26.583968 kubelet[2093]: E1002 19:09:26.583917 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:27.584820 kubelet[2093]: E1002 19:09:27.584769 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:28.585354 kubelet[2093]: E1002 19:09:28.585314 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:29.586632 kubelet[2093]: E1002 19:09:29.586587 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:30.586864 kubelet[2093]: E1002 19:09:30.586797 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:30.614830 kubelet[2093]: I1002 19:09:30.613007 2093 topology_manager.go:215] "Topology Admit Handler" podUID="b5345e6b-b245-4b0e-b790-cbc4faa87498" podNamespace="default" podName="nginx-deployment-6d5f899847-mhtlw" Oct 2 19:09:30.618218 kubelet[2093]: W1002 19:09:30.618187 2093 reflector.go:535] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.17.7" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.17.7' and this object Oct 2 19:09:30.621575 systemd[1]: Created slice kubepods-besteffort-podb5345e6b_b245_4b0e_b790_cbc4faa87498.slice. Oct 2 19:09:30.625518 kubelet[2093]: E1002 19:09:30.625475 2093 reflector.go:147] object-"default"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.17.7" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '172.31.17.7' and this object Oct 2 19:09:30.681810 kubelet[2093]: I1002 19:09:30.681766 2093 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-867wt\" (UniqueName: \"kubernetes.io/projected/b5345e6b-b245-4b0e-b790-cbc4faa87498-kube-api-access-867wt\") pod \"nginx-deployment-6d5f899847-mhtlw\" (UID: \"b5345e6b-b245-4b0e-b790-cbc4faa87498\") " pod="default/nginx-deployment-6d5f899847-mhtlw" Oct 2 19:09:31.587296 kubelet[2093]: E1002 19:09:31.587220 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:31.794675 kubelet[2093]: E1002 19:09:31.794634 2093 projected.go:292] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Oct 2 19:09:31.794675 kubelet[2093]: E1002 19:09:31.794684 2093 projected.go:198] Error preparing data for projected volume kube-api-access-867wt for pod default/nginx-deployment-6d5f899847-mhtlw: failed to sync configmap cache: timed out waiting for the condition Oct 2 19:09:31.794890 kubelet[2093]: E1002 19:09:31.794764 2093 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/b5345e6b-b245-4b0e-b790-cbc4faa87498-kube-api-access-867wt podName:b5345e6b-b245-4b0e-b790-cbc4faa87498 nodeName:}" failed. No retries permitted until 2023-10-02 19:09:32.294739694 +0000 UTC m=+27.221947199 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-867wt" (UniqueName: "kubernetes.io/projected/b5345e6b-b245-4b0e-b790-cbc4faa87498-kube-api-access-867wt") pod "nginx-deployment-6d5f899847-mhtlw" (UID: "b5345e6b-b245-4b0e-b790-cbc4faa87498") : failed to sync configmap cache: timed out waiting for the condition Oct 2 19:09:32.017280 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount173963932.mount: Deactivated successfully. Oct 2 19:09:32.154059 env[1634]: time="2023-10-02T19:09:32.153620044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:32.161774 env[1634]: time="2023-10-02T19:09:32.161725427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:32.167393 env[1634]: time="2023-10-02T19:09:32.167346009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:32.170171 env[1634]: time="2023-10-02T19:09:32.170126577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:32.170713 env[1634]: time="2023-10-02T19:09:32.170672089Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:09:32.176076 env[1634]: time="2023-10-02T19:09:32.175830754Z" level=info msg="CreateContainer within sandbox \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:09:32.211230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4223374555.mount: Deactivated successfully. Oct 2 19:09:32.220883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3238913996.mount: Deactivated successfully. Oct 2 19:09:32.230603 env[1634]: time="2023-10-02T19:09:32.230540807Z" level=info msg="CreateContainer within sandbox \"0e90c93632e8e257e7004607d449290dcd988e92f9db65a800fc663479e8ba57\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c\"" Oct 2 19:09:32.231586 env[1634]: time="2023-10-02T19:09:32.231503906Z" level=info msg="StartContainer for \"82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c\"" Oct 2 19:09:32.254913 systemd[1]: Started cri-containerd-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c.scope. Oct 2 19:09:32.288000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.292536 kernel: kauditd_printk_skb: 38 callbacks suppressed Oct 2 19:09:32.292683 kernel: audit: type=1400 audit(1696273772.288:729): avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.288000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2160 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.309077 kernel: audit: type=1300 audit(1696273772.288:729): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2160 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.309202 kernel: audit: type=1327 audit(1696273772.288:729): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636439633864383034643039393838653734393166613735623961 Oct 2 19:09:32.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636439633864383034643039393838653734393166613735623961 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318280 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318408 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.327625 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.327806 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.338917 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.339220 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.349805 kernel: audit: type=1400 audit(1696273772.295:730): avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.295000 audit: BPF prog-id=90 op=LOAD Oct 2 19:09:32.295000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003499f0 items=0 ppid=2160 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636439633864383034643039393838653734393166613735623961 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.311000 audit: BPF prog-id=91 op=LOAD Oct 2 19:09:32.311000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000349a38 items=0 ppid=2160 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636439633864383034643039393838653734393166613735623961 Oct 2 19:09:32.321000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:09:32.321000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.321000 audit: BPF prog-id=92 op=LOAD Oct 2 19:09:32.321000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000349ac8 items=0 ppid=2160 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636439633864383034643039393838653734393166613735623961 Oct 2 19:09:32.399398 env[1634]: time="2023-10-02T19:09:32.399283286Z" level=info msg="StartContainer for \"82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c\" returns successfully" Oct 2 19:09:32.435318 env[1634]: time="2023-10-02T19:09:32.435255154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mhtlw,Uid:b5345e6b-b245-4b0e-b790-cbc4faa87498,Namespace:default,Attempt:0,}" Oct 2 19:09:32.590529 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:09:32.590671 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:09:32.590925 kubelet[2093]: E1002 19:09:32.590860 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:32.658301 env[1634]: time="2023-10-02T19:09:32.658235371Z" level=error msg="Failed to destroy network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:32.659147 env[1634]: time="2023-10-02T19:09:32.659109391Z" level=error msg="encountered an error cleaning up failed sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:32.659540 env[1634]: time="2023-10-02T19:09:32.659495608Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mhtlw,Uid:b5345e6b-b245-4b0e-b790-cbc4faa87498,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:32.664149 kubelet[2093]: E1002 19:09:32.663853 2093 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:32.664149 kubelet[2093]: E1002 19:09:32.663976 2093 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-mhtlw" Oct 2 19:09:32.664149 kubelet[2093]: E1002 19:09:32.664007 2093 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-mhtlw" Oct 2 19:09:32.664779 kubelet[2093]: E1002 19:09:32.664102 2093 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-mhtlw_default(b5345e6b-b245-4b0e-b790-cbc4faa87498)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-mhtlw_default(b5345e6b-b245-4b0e-b790-cbc4faa87498)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-mhtlw" podUID="b5345e6b-b245-4b0e-b790-cbc4faa87498" Oct 2 19:09:33.050821 kubelet[2093]: I1002 19:09:33.049975 2093 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:09:33.051563 env[1634]: time="2023-10-02T19:09:33.051523927Z" level=info msg="StopPodSandbox for \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\"" Oct 2 19:09:33.089889 systemd[1]: run-containerd-runc-k8s.io-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c-runc.ECivMn.mount: Deactivated successfully. Oct 2 19:09:33.204775 kubelet[2093]: I1002 19:09:33.204068 2093 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zbp5z" podStartSLOduration=2.835953885 podCreationTimestamp="2023-10-02 19:09:07 +0000 UTC" firstStartedPulling="2023-10-02 19:09:08.802945711 +0000 UTC m=+3.730153208" lastFinishedPulling="2023-10-02 19:09:32.17099452 +0000 UTC m=+27.098202019" observedRunningTime="2023-10-02 19:09:33.096779698 +0000 UTC m=+28.023987219" watchObservedRunningTime="2023-10-02 19:09:33.204002696 +0000 UTC m=+28.131210195" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.205 [INFO][2678] k8s.go 576: Cleaning up netns ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.206 [INFO][2678] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" iface="eth0" netns="/var/run/netns/cni-1ac9e7c8-0107-dfb6-284b-4d766a2fa76d" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.207 [INFO][2678] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" iface="eth0" netns="/var/run/netns/cni-1ac9e7c8-0107-dfb6-284b-4d766a2fa76d" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.208 [INFO][2678] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" iface="eth0" netns="/var/run/netns/cni-1ac9e7c8-0107-dfb6-284b-4d766a2fa76d" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.208 [INFO][2678] k8s.go 583: Releasing IP address(es) ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.208 [INFO][2678] utils.go 196: Calico CNI releasing IP address ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.255 [INFO][2710] ipam_plugin.go 416: Releasing address using handleID ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.279699 env[1634]: time="2023-10-02T19:09:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:33.279699 env[1634]: time="2023-10-02T19:09:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.269 [WARNING][2710] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.269 [INFO][2710] ipam_plugin.go 444: Releasing address using workloadID ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.279699 env[1634]: time="2023-10-02T19:09:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:33.279699 env[1634]: 2023-10-02 19:09:33.277 [INFO][2678] k8s.go 589: Teardown processing complete. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:09:33.283319 env[1634]: time="2023-10-02T19:09:33.281938947Z" level=info msg="TearDown network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\" successfully" Oct 2 19:09:33.283319 env[1634]: time="2023-10-02T19:09:33.281985398Z" level=info msg="StopPodSandbox for \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\" returns successfully" Oct 2 19:09:33.281645 systemd[1]: run-netns-cni\x2d1ac9e7c8\x2d0107\x2ddfb6\x2d284b\x2d4d766a2fa76d.mount: Deactivated successfully. Oct 2 19:09:33.284944 env[1634]: time="2023-10-02T19:09:33.284906483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mhtlw,Uid:b5345e6b-b245-4b0e-b790-cbc4faa87498,Namespace:default,Attempt:1,}" Oct 2 19:09:33.493544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:33.493693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali568ff30779d: link becomes ready Oct 2 19:09:33.498582 (udev-worker)[2610]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:33.500126 systemd-networkd[1447]: cali568ff30779d: Link UP Oct 2 19:09:33.500535 systemd-networkd[1447]: cali568ff30779d: Gained carrier Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.354 [INFO][2719] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.372 [INFO][2719] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0 nginx-deployment-6d5f899847- default b5345e6b-b245-4b0e-b790-cbc4faa87498 995 0 2023-10-02 19:09:30 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.17.7 nginx-deployment-6d5f899847-mhtlw eth0 default [] [] [kns.default ksa.default.default] cali568ff30779d [] []}} ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.372 [INFO][2719] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.408 [INFO][2730] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" HandleID="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.427 [INFO][2730] ipam_plugin.go 269: Auto assigning IP ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" HandleID="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d490), Attrs:map[string]string{"namespace":"default", "node":"172.31.17.7", "pod":"nginx-deployment-6d5f899847-mhtlw", "timestamp":"2023-10-02 19:09:33.408183619 +0000 UTC"}, Hostname:"172.31.17.7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:33.515765 env[1634]: time="2023-10-02T19:09:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:33.515765 env[1634]: time="2023-10-02T19:09:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.427 [INFO][2730] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.17.7' Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.430 [INFO][2730] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.442 [INFO][2730] ipam.go 372: Looking up existing affinities for host host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.449 [INFO][2730] ipam.go 489: Trying affinity for 192.168.57.192/26 host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.453 [INFO][2730] ipam.go 155: Attempting to load block cidr=192.168.57.192/26 host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.458 [INFO][2730] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.57.192/26 host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.458 [INFO][2730] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.57.192/26 handle="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.461 [INFO][2730] ipam.go 1682: Creating new handle: k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1 Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.466 [INFO][2730] ipam.go 1203: Writing block in order to claim IPs block=192.168.57.192/26 handle="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.479 [INFO][2730] ipam.go 1216: Successfully claimed IPs: [192.168.57.193/26] block=192.168.57.192/26 handle="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.480 [INFO][2730] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.57.193/26] handle="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" host="172.31.17.7" Oct 2 19:09:33.515765 env[1634]: time="2023-10-02T19:09:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:33.515765 env[1634]: 2023-10-02 19:09:33.480 [INFO][2730] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.57.193/26] IPv6=[] ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" HandleID="k8s-pod-network.941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.516598 env[1634]: 2023-10-02 19:09:33.483 [INFO][2719] k8s.go 383: Populated endpoint ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b5345e6b-b245-4b0e-b790-cbc4faa87498", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"", Pod:"nginx-deployment-6d5f899847-mhtlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali568ff30779d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:33.516598 env[1634]: 2023-10-02 19:09:33.483 [INFO][2719] k8s.go 384: Calico CNI using IPs: [192.168.57.193/32] ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.516598 env[1634]: 2023-10-02 19:09:33.483 [INFO][2719] dataplane_linux.go 68: Setting the host side veth name to cali568ff30779d ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.516598 env[1634]: 2023-10-02 19:09:33.493 [INFO][2719] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.516598 env[1634]: 2023-10-02 19:09:33.501 [INFO][2719] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b5345e6b-b245-4b0e-b790-cbc4faa87498", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1", Pod:"nginx-deployment-6d5f899847-mhtlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali568ff30779d", MAC:"9e:87:a2:e8:f2:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:33.516598 env[1634]: 2023-10-02 19:09:33.509 [INFO][2719] k8s.go 489: Wrote updated endpoint to datastore ContainerID="941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1" Namespace="default" Pod="nginx-deployment-6d5f899847-mhtlw" WorkloadEndpoint="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:09:33.555171 env[1634]: time="2023-10-02T19:09:33.554576290Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:33.555171 env[1634]: time="2023-10-02T19:09:33.555138530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:33.556593 env[1634]: time="2023-10-02T19:09:33.556148972Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:33.558708 env[1634]: time="2023-10-02T19:09:33.557623409Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1 pid=2756 runtime=io.containerd.runc.v2 Oct 2 19:09:33.580800 systemd[1]: Started cri-containerd-941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1.scope. Oct 2 19:09:33.591930 kubelet[2093]: E1002 19:09:33.591853 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.598000 audit: BPF prog-id=93 op=LOAD Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2756 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934313932366263643765633738303966393030356561633937663963 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2756 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934313932366263643765633738303966393030356561633937663963 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit: BPF prog-id=94 op=LOAD Oct 2 19:09:33.599000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003b2740 items=0 ppid=2756 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934313932366263643765633738303966393030356561633937663963 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit: BPF prog-id=95 op=LOAD Oct 2 19:09:33.599000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003b2788 items=0 ppid=2756 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934313932366263643765633738303966393030356561633937663963 Oct 2 19:09:33.599000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:09:33.599000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:33.599000 audit: BPF prog-id=96 op=LOAD Oct 2 19:09:33.599000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b2b98 items=0 ppid=2756 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934313932366263643765633738303966393030356561633937663963 Oct 2 19:09:33.639464 env[1634]: time="2023-10-02T19:09:33.639419817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mhtlw,Uid:b5345e6b-b245-4b0e-b790-cbc4faa87498,Namespace:default,Attempt:1,} returns sandbox id \"941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1\"" Oct 2 19:09:33.641326 env[1634]: time="2023-10-02T19:09:33.641246519Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:09:34.085374 systemd[1]: run-containerd-runc-k8s.io-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c-runc.hUJhiw.mount: Deactivated successfully. Oct 2 19:09:34.346000 audit[2856]: AVC avc: denied { write } for pid=2856 comm="tee" name="fd" dev="proc" ino=19396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.346000 audit[2856]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6be10978 a2=241 a3=1b6 items=1 ppid=2822 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.346000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:09:34.346000 audit: PATH item=0 name="/dev/fd/63" inode=19392 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.346000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.362000 audit[2852]: AVC avc: denied { write } for pid=2852 comm="tee" name="fd" dev="proc" ino=20045 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.363000 audit[2860]: AVC avc: denied { write } for pid=2860 comm="tee" name="fd" dev="proc" ino=19406 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.363000 audit[2860]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb1212988 a2=241 a3=1b6 items=1 ppid=2825 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.363000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:09:34.363000 audit: PATH item=0 name="/dev/fd/63" inode=19397 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.363000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.362000 audit[2852]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea49f3979 a2=241 a3=1b6 items=1 ppid=2819 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.362000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:09:34.362000 audit: PATH item=0 name="/dev/fd/63" inode=20033 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.380000 audit[2872]: AVC avc: denied { write } for pid=2872 comm="tee" name="fd" dev="proc" ino=20055 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.387000 audit[2866]: AVC avc: denied { write } for pid=2866 comm="tee" name="fd" dev="proc" ino=20062 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.387000 audit[2866]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6bffe988 a2=241 a3=1b6 items=1 ppid=2834 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.387000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:09:34.387000 audit: PATH item=0 name="/dev/fd/63" inode=19400 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.389000 audit[2870]: AVC avc: denied { write } for pid=2870 comm="tee" name="fd" dev="proc" ino=20066 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.389000 audit[2870]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffceeb3b989 a2=241 a3=1b6 items=1 ppid=2821 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.389000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:09:34.389000 audit: PATH item=0 name="/dev/fd/63" inode=20046 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.389000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.380000 audit[2872]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4292f98a a2=241 a3=1b6 items=1 ppid=2826 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.380000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:09:34.380000 audit: PATH item=0 name="/dev/fd/63" inode=20047 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.395000 audit[2886]: AVC avc: denied { write } for pid=2886 comm="tee" name="fd" dev="proc" ino=19419 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:34.395000 audit[2886]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3dbb6988 a2=241 a3=1b6 items=1 ppid=2832 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.395000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:09:34.395000 audit: PATH item=0 name="/dev/fd/63" inode=19410 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:34.395000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:34.592380 kubelet[2093]: E1002 19:09:34.592342 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:34.753785 kernel: Initializing XFRM netlink socket Oct 2 19:09:34.908165 (udev-worker)[2957]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit: BPF prog-id=97 op=LOAD Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d176940 a2=70 a3=7f39915c8000 items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.919000 audit: BPF prog-id=97 op=UNLOAD Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit: BPF prog-id=98 op=LOAD Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d176940 a2=70 a3=6e items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.919000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6d1768f0 a2=70 a3=7ffd6d176940 items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit: BPF prog-id=99 op=LOAD Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd6d1768d0 a2=70 a3=7ffd6d176940 items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.919000 audit: BPF prog-id=99 op=UNLOAD Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d1769b0 a2=70 a3=0 items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d1769a0 a2=70 a3=0 items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.919000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.919000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd6d1769e0 a2=70 a3=0 items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.919000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.920000 audit: BPF prog-id=100 op=LOAD Oct 2 19:09:34.920000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd6d176900 a2=70 a3=ffffffff items=0 ppid=2833 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:34.928000 audit[2964]: AVC avc: denied { bpf } for pid=2964 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.928000 audit[2964]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff449d0ca0 a2=70 a3=fff80800 items=0 ppid=2833 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.928000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:34.928000 audit[2964]: AVC avc: denied { bpf } for pid=2964 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.928000 audit[2964]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff449d0b70 a2=70 a3=3 items=0 ppid=2833 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.928000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:34.934159 systemd-networkd[1447]: cali568ff30779d: Gained IPv6LL Oct 2 19:09:35.059000 audit: BPF prog-id=100 op=UNLOAD Oct 2 19:09:35.199000 audit[2987]: NETFILTER_CFG table=nat:65 family=2 entries=16 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:35.199000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff9d53d410 a2=0 a3=7fff9d53d3fc items=0 ppid=2833 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:35.199000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:35.205000 audit[2988]: NETFILTER_CFG table=filter:66 family=2 entries=71 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:35.205000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=36604 a0=3 a1=7ffe2281d6c0 a2=0 a3=5592ff757000 items=0 ppid=2833 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:35.205000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:35.208000 audit[2991]: NETFILTER_CFG table=mangle:67 family=2 entries=19 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:35.208000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffde933f0e0 a2=0 a3=7ffde933f0cc items=0 ppid=2833 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:35.208000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:35.210000 audit[2989]: NETFILTER_CFG table=raw:68 family=2 entries=19 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:35.210000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff9f230010 a2=0 a3=55a04e37a000 items=0 ppid=2833 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:35.210000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:35.596659 kubelet[2093]: E1002 19:09:35.596546 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:35.802022 systemd-networkd[1447]: vxlan.calico: Link UP Oct 2 19:09:35.802032 systemd-networkd[1447]: vxlan.calico: Gained carrier Oct 2 19:09:36.596761 kubelet[2093]: E1002 19:09:36.596679 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:36.919238 env[1634]: time="2023-10-02T19:09:36.917832077Z" level=info msg="StopPodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\"" Oct 2 19:09:36.919668 update_engine[1626]: I1002 19:09:36.918443 1626 update_attempter.cc:505] Updating boot flags... Oct 2 19:09:37.112759 systemd-networkd[1447]: vxlan.calico: Gained IPv6LL Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.335 [INFO][3041] k8s.go 576: Cleaning up netns ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.335 [INFO][3041] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" iface="eth0" netns="/var/run/netns/cni-02b838f4-045f-f3ab-4035-e87055ed9145" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.336 [INFO][3041] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" iface="eth0" netns="/var/run/netns/cni-02b838f4-045f-f3ab-4035-e87055ed9145" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.338 [INFO][3041] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" iface="eth0" netns="/var/run/netns/cni-02b838f4-045f-f3ab-4035-e87055ed9145" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.338 [INFO][3041] k8s.go 583: Releasing IP address(es) ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.338 [INFO][3041] utils.go 196: Calico CNI releasing IP address ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.444 [INFO][3126] ipam_plugin.go 416: Releasing address using handleID ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.465823 env[1634]: time="2023-10-02T19:09:37Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:37.465823 env[1634]: time="2023-10-02T19:09:37Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.454 [WARNING][3126] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.454 [INFO][3126] ipam_plugin.go 444: Releasing address using workloadID ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.465823 env[1634]: time="2023-10-02T19:09:37Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:37.465823 env[1634]: 2023-10-02 19:09:37.464 [INFO][3041] k8s.go 589: Teardown processing complete. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:09:37.470110 env[1634]: time="2023-10-02T19:09:37.468309290Z" level=info msg="TearDown network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" successfully" Oct 2 19:09:37.470110 env[1634]: time="2023-10-02T19:09:37.468353748Z" level=info msg="StopPodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" returns successfully" Oct 2 19:09:37.470110 env[1634]: time="2023-10-02T19:09:37.469505727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kjpdn,Uid:5bf6389e-be28-43e1-b56c-59b148d76ba1,Namespace:calico-system,Attempt:1,}" Oct 2 19:09:37.468051 systemd[1]: run-netns-cni\x2d02b838f4\x2d045f\x2df3ab\x2d4035\x2de87055ed9145.mount: Deactivated successfully. Oct 2 19:09:37.597735 kubelet[2093]: E1002 19:09:37.597691 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:37.811334 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:37.811481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali98bdddeb916: link becomes ready Oct 2 19:09:37.821964 (udev-worker)[2965]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:37.824357 systemd-networkd[1447]: cali98bdddeb916: Link UP Oct 2 19:09:37.824367 systemd-networkd[1447]: cali98bdddeb916: Gained carrier Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.665 [INFO][3138] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.17.7-k8s-csi--node--driver--kjpdn-eth0 csi-node-driver- calico-system 5bf6389e-be28-43e1-b56c-59b148d76ba1 1014 0 2023-10-02 19:09:23 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.17.7 csi-node-driver-kjpdn eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali98bdddeb916 [] []}} ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.665 [INFO][3138] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.733 [INFO][3149] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" HandleID="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.751 [INFO][3149] ipam_plugin.go 269: Auto assigning IP ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" HandleID="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000525040), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.17.7", "pod":"csi-node-driver-kjpdn", "timestamp":"2023-10-02 19:09:37.733968297 +0000 UTC"}, Hostname:"172.31.17.7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:37.850413 env[1634]: time="2023-10-02T19:09:37Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:37.850413 env[1634]: time="2023-10-02T19:09:37Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.752 [INFO][3149] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.17.7' Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.756 [INFO][3149] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.765 [INFO][3149] ipam.go 372: Looking up existing affinities for host host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.772 [INFO][3149] ipam.go 489: Trying affinity for 192.168.57.192/26 host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.775 [INFO][3149] ipam.go 155: Attempting to load block cidr=192.168.57.192/26 host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.778 [INFO][3149] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.57.192/26 host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.778 [INFO][3149] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.57.192/26 handle="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.781 [INFO][3149] ipam.go 1682: Creating new handle: k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88 Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.786 [INFO][3149] ipam.go 1203: Writing block in order to claim IPs block=192.168.57.192/26 handle="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.802 [INFO][3149] ipam.go 1216: Successfully claimed IPs: [192.168.57.194/26] block=192.168.57.192/26 handle="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.803 [INFO][3149] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.57.194/26] handle="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" host="172.31.17.7" Oct 2 19:09:37.850413 env[1634]: time="2023-10-02T19:09:37Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:37.850413 env[1634]: 2023-10-02 19:09:37.803 [INFO][3149] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.57.194/26] IPv6=[] ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" HandleID="k8s-pod-network.a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.851740 env[1634]: 2023-10-02 19:09:37.805 [INFO][3138] k8s.go 383: Populated endpoint ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-csi--node--driver--kjpdn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bf6389e-be28-43e1-b56c-59b148d76ba1", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"", Pod:"csi-node-driver-kjpdn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali98bdddeb916", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:37.851740 env[1634]: 2023-10-02 19:09:37.805 [INFO][3138] k8s.go 384: Calico CNI using IPs: [192.168.57.194/32] ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.851740 env[1634]: 2023-10-02 19:09:37.805 [INFO][3138] dataplane_linux.go 68: Setting the host side veth name to cali98bdddeb916 ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.851740 env[1634]: 2023-10-02 19:09:37.812 [INFO][3138] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.851740 env[1634]: 2023-10-02 19:09:37.826 [INFO][3138] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-csi--node--driver--kjpdn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bf6389e-be28-43e1-b56c-59b148d76ba1", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88", Pod:"csi-node-driver-kjpdn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali98bdddeb916", MAC:"4a:22:00:07:f1:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:37.851740 env[1634]: 2023-10-02 19:09:37.848 [INFO][3138] k8s.go 489: Wrote updated endpoint to datastore ContainerID="a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88" Namespace="calico-system" Pod="csi-node-driver-kjpdn" WorkloadEndpoint="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:09:37.911723 env[1634]: time="2023-10-02T19:09:37.911641076Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:37.912015 env[1634]: time="2023-10-02T19:09:37.911688731Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:37.912015 env[1634]: time="2023-10-02T19:09:37.911708503Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:37.912015 env[1634]: time="2023-10-02T19:09:37.911928073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88 pid=3173 runtime=io.containerd.runc.v2 Oct 2 19:09:37.971000 audit[3196]: NETFILTER_CFG table=filter:69 family=2 entries=40 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:37.975875 kernel: kauditd_printk_skb: 208 callbacks suppressed Oct 2 19:09:37.976002 kernel: audit: type=1325 audit(1696273777.971:778): table=filter:69 family=2 entries=40 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:37.985350 kernel: audit: type=1300 audit(1696273777.971:778): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff450abe50 a2=0 a3=7fff450abe3c items=0 ppid=2833 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.971000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff450abe50 a2=0 a3=7fff450abe3c items=0 ppid=2833 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.988667 systemd[1]: Started cri-containerd-a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88.scope. Oct 2 19:09:37.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:37.995732 kernel: audit: type=1327 audit(1696273777.971:778): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016714 kernel: audit: type=1400 audit(1696273778.006:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016783 kernel: audit: type=1400 audit(1696273778.006:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021835 kernel: audit: type=1400 audit(1696273778.006:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.032579 kernel: audit: type=1400 audit(1696273778.006:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.032882 kernel: audit: type=1400 audit(1696273778.006:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.041333 kernel: audit: type=1400 audit(1696273778.006:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.049435 kernel: audit: type=1400 audit(1696273778.006:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit: BPF prog-id=101 op=LOAD Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:38.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356563383261303266613432646133633635303839353436306435 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:38.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356563383261303266613432646133633635303839353436306435 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.006000 audit: BPF prog-id=102 op=LOAD Oct 2 19:09:38.006000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000388340 items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:38.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356563383261303266613432646133633635303839353436306435 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.016000 audit: BPF prog-id=103 op=LOAD Oct 2 19:09:38.016000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000388388 items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356563383261303266613432646133633635303839353436306435 Oct 2 19:09:38.021000 audit: BPF prog-id=103 op=UNLOAD Oct 2 19:09:38.021000 audit: BPF prog-id=102 op=UNLOAD Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:38.021000 audit: BPF prog-id=104 op=LOAD Oct 2 19:09:38.021000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000388798 items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:38.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356563383261303266613432646133633635303839353436306435 Oct 2 19:09:38.077164 env[1634]: time="2023-10-02T19:09:38.073171216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kjpdn,Uid:5bf6389e-be28-43e1-b56c-59b148d76ba1,Namespace:calico-system,Attempt:1,} returns sandbox id \"a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88\"" Oct 2 19:09:38.468321 systemd[1]: run-containerd-runc-k8s.io-a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88-runc.kX8fa3.mount: Deactivated successfully. Oct 2 19:09:38.489201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2210488697.mount: Deactivated successfully. Oct 2 19:09:38.599241 kubelet[2093]: E1002 19:09:38.599184 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:39.090533 systemd-networkd[1447]: cali98bdddeb916: Gained IPv6LL Oct 2 19:09:39.600398 kubelet[2093]: E1002 19:09:39.600350 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:40.582722 systemd[1]: run-containerd-runc-k8s.io-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c-runc.WkP1mL.mount: Deactivated successfully. Oct 2 19:09:40.600985 kubelet[2093]: E1002 19:09:40.600939 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:41.601387 kubelet[2093]: E1002 19:09:41.601335 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:42.602018 kubelet[2093]: E1002 19:09:42.601961 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:43.602400 kubelet[2093]: E1002 19:09:43.602349 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:44.602780 kubelet[2093]: E1002 19:09:44.602727 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:45.566413 kubelet[2093]: E1002 19:09:45.566361 2093 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:45.603719 kubelet[2093]: E1002 19:09:45.603672 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:46.603901 kubelet[2093]: E1002 19:09:46.603849 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:47.605109 kubelet[2093]: E1002 19:09:47.605055 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:48.605704 kubelet[2093]: E1002 19:09:48.605663 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:49.606702 kubelet[2093]: E1002 19:09:49.606650 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:50.567723 systemd[1]: run-containerd-runc-k8s.io-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c-runc.thyXle.mount: Deactivated successfully. Oct 2 19:09:50.607147 kubelet[2093]: E1002 19:09:50.607074 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:51.608085 kubelet[2093]: E1002 19:09:51.608031 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:52.608726 kubelet[2093]: E1002 19:09:52.608679 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:53.609617 kubelet[2093]: E1002 19:09:53.609568 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:54.610171 kubelet[2093]: E1002 19:09:54.610088 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:55.610658 kubelet[2093]: E1002 19:09:55.610609 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:56.611815 kubelet[2093]: E1002 19:09:56.611759 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:57.612560 kubelet[2093]: E1002 19:09:57.612504 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:58.613742 kubelet[2093]: E1002 19:09:58.613697 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:09:59.614898 kubelet[2093]: E1002 19:09:59.614842 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:00.582438 systemd[1]: run-containerd-runc-k8s.io-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c-runc.BdCvcc.mount: Deactivated successfully. Oct 2 19:10:00.616081 kubelet[2093]: E1002 19:10:00.616042 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:01.616397 kubelet[2093]: E1002 19:10:01.616361 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:02.617549 kubelet[2093]: E1002 19:10:02.617383 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:03.617759 kubelet[2093]: E1002 19:10:03.617706 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:04.618205 kubelet[2093]: E1002 19:10:04.618152 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:05.565813 kubelet[2093]: E1002 19:10:05.565758 2093 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:05.583378 env[1634]: time="2023-10-02T19:10:05.583334943Z" level=info msg="StopPodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\"" Oct 2 19:10:05.619201 kubelet[2093]: E1002 19:10:05.619127 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.705 [WARNING][3323] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-csi--node--driver--kjpdn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bf6389e-be28-43e1-b56c-59b148d76ba1", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88", Pod:"csi-node-driver-kjpdn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali98bdddeb916", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.705 [INFO][3323] k8s.go 576: Cleaning up netns ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.705 [INFO][3323] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" iface="eth0" netns="" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.705 [INFO][3323] k8s.go 583: Releasing IP address(es) ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.705 [INFO][3323] utils.go 196: Calico CNI releasing IP address ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.762 [INFO][3329] ipam_plugin.go 416: Releasing address using handleID ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:10:05.781244 env[1634]: time="2023-10-02T19:10:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:05.781244 env[1634]: time="2023-10-02T19:10:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.772 [WARNING][3329] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.772 [INFO][3329] ipam_plugin.go 444: Releasing address using workloadID ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:10:05.781244 env[1634]: time="2023-10-02T19:10:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:05.781244 env[1634]: 2023-10-02 19:10:05.779 [INFO][3323] k8s.go 589: Teardown processing complete. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.782180 env[1634]: time="2023-10-02T19:10:05.781293906Z" level=info msg="TearDown network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" successfully" Oct 2 19:10:05.782180 env[1634]: time="2023-10-02T19:10:05.781332179Z" level=info msg="StopPodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" returns successfully" Oct 2 19:10:05.782623 env[1634]: time="2023-10-02T19:10:05.782595052Z" level=info msg="RemovePodSandbox for \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\"" Oct 2 19:10:05.782926 env[1634]: time="2023-10-02T19:10:05.782726795Z" level=info msg="Forcibly stopping sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\"" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.839 [WARNING][3347] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-csi--node--driver--kjpdn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bf6389e-be28-43e1-b56c-59b148d76ba1", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"a35ec82a02fa42da3c650895460d5eb5a0d71aaca786008a3bfeec2685177a88", Pod:"csi-node-driver-kjpdn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali98bdddeb916", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.839 [INFO][3347] k8s.go 576: Cleaning up netns ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.839 [INFO][3347] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" iface="eth0" netns="" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.839 [INFO][3347] k8s.go 583: Releasing IP address(es) ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.839 [INFO][3347] utils.go 196: Calico CNI releasing IP address ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.876 [INFO][3354] ipam_plugin.go 416: Releasing address using handleID ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:10:05.893313 env[1634]: time="2023-10-02T19:10:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:05.893313 env[1634]: time="2023-10-02T19:10:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.888 [WARNING][3354] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.888 [INFO][3354] ipam_plugin.go 444: Releasing address using workloadID ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" HandleID="k8s-pod-network.23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Workload="172.31.17.7-k8s-csi--node--driver--kjpdn-eth0" Oct 2 19:10:05.893313 env[1634]: time="2023-10-02T19:10:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:05.893313 env[1634]: 2023-10-02 19:10:05.891 [INFO][3347] k8s.go 589: Teardown processing complete. ContainerID="23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a" Oct 2 19:10:05.896082 env[1634]: time="2023-10-02T19:10:05.895732293Z" level=info msg="TearDown network for sandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" successfully" Oct 2 19:10:05.906783 env[1634]: time="2023-10-02T19:10:05.905773641Z" level=info msg="RemovePodSandbox \"23b138fbae1bd573280701254b0b0463789c5a4dd62e0817afbd90cd987bd77a\" returns successfully" Oct 2 19:10:05.910496 env[1634]: time="2023-10-02T19:10:05.910372169Z" level=info msg="StopPodSandbox for \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\"" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.008 [WARNING][3375] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b5345e6b-b245-4b0e-b790-cbc4faa87498", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1", Pod:"nginx-deployment-6d5f899847-mhtlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali568ff30779d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.009 [INFO][3375] k8s.go 576: Cleaning up netns ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.009 [INFO][3375] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" iface="eth0" netns="" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.009 [INFO][3375] k8s.go 583: Releasing IP address(es) ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.009 [INFO][3375] utils.go 196: Calico CNI releasing IP address ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.074 [INFO][3381] ipam_plugin.go 416: Releasing address using handleID ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:10:06.094763 env[1634]: time="2023-10-02T19:10:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:06.094763 env[1634]: time="2023-10-02T19:10:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.085 [WARNING][3381] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.086 [INFO][3381] ipam_plugin.go 444: Releasing address using workloadID ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:10:06.094763 env[1634]: time="2023-10-02T19:10:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:06.094763 env[1634]: 2023-10-02 19:10:06.089 [INFO][3375] k8s.go 589: Teardown processing complete. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.095471 env[1634]: time="2023-10-02T19:10:06.094912934Z" level=info msg="TearDown network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\" successfully" Oct 2 19:10:06.095471 env[1634]: time="2023-10-02T19:10:06.094967284Z" level=info msg="StopPodSandbox for \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\" returns successfully" Oct 2 19:10:06.095761 env[1634]: time="2023-10-02T19:10:06.095714263Z" level=info msg="RemovePodSandbox for \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\"" Oct 2 19:10:06.095851 env[1634]: time="2023-10-02T19:10:06.095752875Z" level=info msg="Forcibly stopping sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\"" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.158 [WARNING][3400] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b5345e6b-b245-4b0e-b790-cbc4faa87498", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.17.7", ContainerID:"941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1", Pod:"nginx-deployment-6d5f899847-mhtlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.57.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali568ff30779d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.159 [INFO][3400] k8s.go 576: Cleaning up netns ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.159 [INFO][3400] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" iface="eth0" netns="" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.159 [INFO][3400] k8s.go 583: Releasing IP address(es) ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.159 [INFO][3400] utils.go 196: Calico CNI releasing IP address ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.186 [INFO][3406] ipam_plugin.go 416: Releasing address using handleID ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:10:06.200529 env[1634]: time="2023-10-02T19:10:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:06.200529 env[1634]: time="2023-10-02T19:10:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.195 [WARNING][3406] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.195 [INFO][3406] ipam_plugin.go 444: Releasing address using workloadID ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" HandleID="k8s-pod-network.498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Workload="172.31.17.7-k8s-nginx--deployment--6d5f899847--mhtlw-eth0" Oct 2 19:10:06.200529 env[1634]: time="2023-10-02T19:10:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:06.200529 env[1634]: 2023-10-02 19:10:06.199 [INFO][3400] k8s.go 589: Teardown processing complete. ContainerID="498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4" Oct 2 19:10:06.202195 env[1634]: time="2023-10-02T19:10:06.200487860Z" level=info msg="TearDown network for sandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\" successfully" Oct 2 19:10:06.206729 env[1634]: time="2023-10-02T19:10:06.206680786Z" level=info msg="RemovePodSandbox \"498d77342e93d410bb9450acf7fdf934729bf46a86e67e1120a8deaf1dfebcf4\" returns successfully" Oct 2 19:10:06.619787 kubelet[2093]: E1002 19:10:06.619733 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:07.620800 kubelet[2093]: E1002 19:10:07.620744 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:08.621575 kubelet[2093]: E1002 19:10:08.621533 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:09.622319 kubelet[2093]: E1002 19:10:09.622258 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:10.626682 kubelet[2093]: E1002 19:10:10.626598 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:10.654371 systemd[1]: run-containerd-runc-k8s.io-82cd9c8d804d09988e7491fa75b9aa0459406228721bbd8ab6739ee5e841465c-runc.3fSJ4E.mount: Deactivated successfully. Oct 2 19:10:11.627425 kubelet[2093]: E1002 19:10:11.627308 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:11.953213 env[1634]: time="2023-10-02T19:10:11.952549765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.962873 env[1634]: time="2023-10-02T19:10:11.962818250Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.969790 env[1634]: time="2023-10-02T19:10:11.969744650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.973697 env[1634]: time="2023-10-02T19:10:11.973647758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:11.974430 env[1634]: time="2023-10-02T19:10:11.974386253Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:10:11.977079 env[1634]: time="2023-10-02T19:10:11.976991711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:11.983290 env[1634]: time="2023-10-02T19:10:11.983221698Z" level=info msg="CreateContainer within sandbox \"941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:10:12.004919 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2891812241.mount: Deactivated successfully. Oct 2 19:10:12.035067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount504774280.mount: Deactivated successfully. Oct 2 19:10:12.056736 env[1634]: time="2023-10-02T19:10:12.056681152Z" level=info msg="CreateContainer within sandbox \"941926bcd7ec7809f9005eac97f9c72f85106ecb5b3f02bcacb28651796f46e1\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6e7057fbea2511bae94f12858ffe764c27d3913aeada3eea6a018ee8b768eb27\"" Oct 2 19:10:12.059877 env[1634]: time="2023-10-02T19:10:12.059845577Z" level=info msg="StartContainer for \"6e7057fbea2511bae94f12858ffe764c27d3913aeada3eea6a018ee8b768eb27\"" Oct 2 19:10:12.132631 systemd[1]: Started cri-containerd-6e7057fbea2511bae94f12858ffe764c27d3913aeada3eea6a018ee8b768eb27.scope. Oct 2 19:10:12.171299 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 2 19:10:12.171431 kernel: audit: type=1400 audit(1696273812.161:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.171470 kernel: audit: type=1400 audit(1696273812.161:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.182382 kernel: audit: type=1400 audit(1696273812.161:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.182669 kernel: audit: type=1400 audit(1696273812.161:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.183178 env[1634]: time="2023-10-02T19:10:12.183123522Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.195063 env[1634]: time="2023-10-02T19:10:12.194585968Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:12.196115 kubelet[2093]: E1002 19:10:12.195821 2093 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:12.196115 kubelet[2093]: E1002 19:10:12.195975 2093 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:12.199884 kernel: audit: type=1400 audit(1696273812.161:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.200079 kernel: audit: type=1400 audit(1696273812.161:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.201721 kubelet[2093]: E1002 19:10:12.201479 2093 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-dg55h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-kjpdn_calico-system(5bf6389e-be28-43e1-b56c-59b148d76ba1): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:12.206958 kernel: audit: type=1400 audit(1696273812.161:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.207198 env[1634]: time="2023-10-02T19:10:12.206915669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.218297 kernel: audit: type=1400 audit(1696273812.161:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.234410 kernel: audit: type=1400 audit(1696273812.161:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.234683 kernel: audit: type=1400 audit(1696273812.169:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.169000 audit: BPF prog-id=105 op=LOAD Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2756 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373035376662656132353131626165393466313238353866666537 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2756 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373035376662656132353131626165393466313238353866666537 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.172000 audit: BPF prog-id=106 op=LOAD Oct 2 19:10:12.172000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000302c50 items=0 ppid=2756 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373035376662656132353131626165393466313238353866666537 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.176000 audit: BPF prog-id=107 op=LOAD Oct 2 19:10:12.176000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000302c98 items=0 ppid=2756 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373035376662656132353131626165393466313238353866666537 Oct 2 19:10:12.187000 audit: BPF prog-id=107 op=UNLOAD Oct 2 19:10:12.187000 audit: BPF prog-id=106 op=UNLOAD Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:12.187000 audit: BPF prog-id=108 op=LOAD Oct 2 19:10:12.187000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003030a8 items=0 ppid=2756 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373035376662656132353131626165393466313238353866666537 Oct 2 19:10:12.251053 env[1634]: time="2023-10-02T19:10:12.251012276Z" level=info msg="StartContainer for \"6e7057fbea2511bae94f12858ffe764c27d3913aeada3eea6a018ee8b768eb27\" returns successfully" Oct 2 19:10:12.398836 env[1634]: time="2023-10-02T19:10:12.398769778Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:12.400525 env[1634]: time="2023-10-02T19:10:12.400464084Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:12.401032 kubelet[2093]: E1002 19:10:12.401008 2093 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:12.401162 kubelet[2093]: E1002 19:10:12.401055 2093 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:12.401216 kubelet[2093]: E1002 19:10:12.401165 2093 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dg55h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-kjpdn_calico-system(5bf6389e-be28-43e1-b56c-59b148d76ba1): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:12.401382 kubelet[2093]: E1002 19:10:12.401239 2093 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-kjpdn" podUID="5bf6389e-be28-43e1-b56c-59b148d76ba1" Oct 2 19:10:12.628066 kubelet[2093]: E1002 19:10:12.628007 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:13.165768 kubelet[2093]: E1002 19:10:13.165731 2093 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kjpdn" podUID="5bf6389e-be28-43e1-b56c-59b148d76ba1" Oct 2 19:10:13.224907 kubelet[2093]: I1002 19:10:13.224860 2093 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-mhtlw" podStartSLOduration=4.888715243 podCreationTimestamp="2023-10-02 19:09:30 +0000 UTC" firstStartedPulling="2023-10-02 19:09:33.640737661 +0000 UTC m=+28.567945161" lastFinishedPulling="2023-10-02 19:10:11.976715802 +0000 UTC m=+66.903923294" observedRunningTime="2023-10-02 19:10:13.224393364 +0000 UTC m=+68.151600873" watchObservedRunningTime="2023-10-02 19:10:13.224693376 +0000 UTC m=+68.151900884" Oct 2 19:10:13.629165 kubelet[2093]: E1002 19:10:13.629114 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:14.629581 kubelet[2093]: E1002 19:10:14.629528 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:10:15.629954 kubelet[2093]: E1002 19:10:15.629894 2093 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"