Oct 2 19:52:54.549959 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:52:54.549973 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:52:54.549980 kernel: BIOS-provided physical RAM map: Oct 2 19:52:54.549984 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Oct 2 19:52:54.549988 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Oct 2 19:52:54.549991 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Oct 2 19:52:54.549996 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Oct 2 19:52:54.550000 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Oct 2 19:52:54.550004 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000008266efff] usable Oct 2 19:52:54.550007 kernel: BIOS-e820: [mem 0x000000008266f000-0x000000008266ffff] ACPI NVS Oct 2 19:52:54.550012 kernel: BIOS-e820: [mem 0x0000000082670000-0x0000000082670fff] reserved Oct 2 19:52:54.550016 kernel: BIOS-e820: [mem 0x0000000082671000-0x000000008afccfff] usable Oct 2 19:52:54.550020 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Oct 2 19:52:54.550024 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Oct 2 19:52:54.550029 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Oct 2 19:52:54.550034 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Oct 2 19:52:54.550038 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Oct 2 19:52:54.550042 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Oct 2 19:52:54.550046 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Oct 2 19:52:54.550050 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Oct 2 19:52:54.550054 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Oct 2 19:52:54.550059 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 2 19:52:54.550063 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Oct 2 19:52:54.550067 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Oct 2 19:52:54.550071 kernel: NX (Execute Disable) protection: active Oct 2 19:52:54.550075 kernel: SMBIOS 3.2.1 present. Oct 2 19:52:54.550080 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Oct 2 19:52:54.550085 kernel: tsc: Detected 3400.000 MHz processor Oct 2 19:52:54.550089 kernel: tsc: Detected 3399.906 MHz TSC Oct 2 19:52:54.550093 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:52:54.550098 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:52:54.550102 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Oct 2 19:52:54.550107 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:52:54.550111 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Oct 2 19:52:54.550115 kernel: Using GB pages for direct mapping Oct 2 19:52:54.550120 kernel: ACPI: Early table checksum verification disabled Oct 2 19:52:54.550125 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Oct 2 19:52:54.550129 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Oct 2 19:52:54.550133 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Oct 2 19:52:54.550138 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Oct 2 19:52:54.550144 kernel: ACPI: FACS 0x000000008C66CF80 000040 Oct 2 19:52:54.550149 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Oct 2 19:52:54.550154 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Oct 2 19:52:54.550159 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Oct 2 19:52:54.550164 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Oct 2 19:52:54.550168 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Oct 2 19:52:54.550173 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Oct 2 19:52:54.550178 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Oct 2 19:52:54.550182 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Oct 2 19:52:54.550187 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:52:54.550192 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Oct 2 19:52:54.550197 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Oct 2 19:52:54.550202 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:52:54.550207 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:52:54.550211 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Oct 2 19:52:54.550216 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Oct 2 19:52:54.550220 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:52:54.550225 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:52:54.550231 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Oct 2 19:52:54.550235 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Oct 2 19:52:54.550240 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Oct 2 19:52:54.550245 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Oct 2 19:52:54.550249 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Oct 2 19:52:54.550254 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Oct 2 19:52:54.550259 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Oct 2 19:52:54.550263 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Oct 2 19:52:54.550268 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Oct 2 19:52:54.550273 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Oct 2 19:52:54.550278 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Oct 2 19:52:54.550283 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Oct 2 19:52:54.550287 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Oct 2 19:52:54.550292 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Oct 2 19:52:54.550297 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Oct 2 19:52:54.550301 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Oct 2 19:52:54.550306 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Oct 2 19:52:54.550311 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Oct 2 19:52:54.550316 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Oct 2 19:52:54.550321 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Oct 2 19:52:54.550325 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Oct 2 19:52:54.550330 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Oct 2 19:52:54.550334 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Oct 2 19:52:54.550339 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Oct 2 19:52:54.550344 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Oct 2 19:52:54.550348 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Oct 2 19:52:54.550354 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Oct 2 19:52:54.550358 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Oct 2 19:52:54.550363 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Oct 2 19:52:54.550368 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Oct 2 19:52:54.550372 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Oct 2 19:52:54.550377 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Oct 2 19:52:54.550382 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Oct 2 19:52:54.550386 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Oct 2 19:52:54.550391 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Oct 2 19:52:54.550396 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Oct 2 19:52:54.550401 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Oct 2 19:52:54.550406 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Oct 2 19:52:54.550410 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Oct 2 19:52:54.550415 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Oct 2 19:52:54.550420 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Oct 2 19:52:54.550424 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Oct 2 19:52:54.550429 kernel: No NUMA configuration found Oct 2 19:52:54.550433 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Oct 2 19:52:54.550439 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Oct 2 19:52:54.550444 kernel: Zone ranges: Oct 2 19:52:54.550448 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:52:54.550453 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:52:54.550458 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Oct 2 19:52:54.550462 kernel: Movable zone start for each node Oct 2 19:52:54.550467 kernel: Early memory node ranges Oct 2 19:52:54.550472 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Oct 2 19:52:54.550476 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Oct 2 19:52:54.550483 kernel: node 0: [mem 0x0000000040400000-0x000000008266efff] Oct 2 19:52:54.550489 kernel: node 0: [mem 0x0000000082671000-0x000000008afccfff] Oct 2 19:52:54.550494 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Oct 2 19:52:54.550499 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Oct 2 19:52:54.550503 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Oct 2 19:52:54.550508 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Oct 2 19:52:54.550513 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:52:54.550521 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Oct 2 19:52:54.550527 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Oct 2 19:52:54.550532 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Oct 2 19:52:54.550551 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Oct 2 19:52:54.550557 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Oct 2 19:52:54.550562 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Oct 2 19:52:54.550567 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Oct 2 19:52:54.550572 kernel: ACPI: PM-Timer IO Port: 0x1808 Oct 2 19:52:54.550577 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 2 19:52:54.550581 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 2 19:52:54.550586 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 2 19:52:54.550592 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 2 19:52:54.550597 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 2 19:52:54.550602 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 2 19:52:54.550606 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 2 19:52:54.550611 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 2 19:52:54.550616 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 2 19:52:54.550621 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 2 19:52:54.550626 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 2 19:52:54.550631 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 2 19:52:54.550636 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 2 19:52:54.550641 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 2 19:52:54.550646 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 2 19:52:54.550651 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 2 19:52:54.550656 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Oct 2 19:52:54.550661 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:52:54.550665 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:52:54.550670 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:52:54.550675 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:52:54.550681 kernel: TSC deadline timer available Oct 2 19:52:54.550686 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Oct 2 19:52:54.550691 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Oct 2 19:52:54.550696 kernel: Booting paravirtualized kernel on bare hardware Oct 2 19:52:54.550701 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:52:54.550706 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 2 19:52:54.550711 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Oct 2 19:52:54.550715 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Oct 2 19:52:54.550720 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 2 19:52:54.550726 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Oct 2 19:52:54.550731 kernel: Policy zone: Normal Oct 2 19:52:54.550736 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:52:54.550741 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:52:54.550746 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Oct 2 19:52:54.550751 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Oct 2 19:52:54.550756 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:52:54.550761 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 728000K reserved, 0K cma-reserved) Oct 2 19:52:54.550767 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 2 19:52:54.550772 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:52:54.550777 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:52:54.550782 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:52:54.550787 kernel: rcu: RCU event tracing is enabled. Oct 2 19:52:54.550792 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 2 19:52:54.550797 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:52:54.550802 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:52:54.550807 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:52:54.550813 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 2 19:52:54.550818 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Oct 2 19:52:54.550823 kernel: random: crng init done Oct 2 19:52:54.550827 kernel: Console: colour dummy device 80x25 Oct 2 19:52:54.550832 kernel: printk: console [tty0] enabled Oct 2 19:52:54.550837 kernel: printk: console [ttyS1] enabled Oct 2 19:52:54.550842 kernel: ACPI: Core revision 20210730 Oct 2 19:52:54.550847 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Oct 2 19:52:54.550852 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:52:54.550857 kernel: DMAR: Host address width 39 Oct 2 19:52:54.550862 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Oct 2 19:52:54.550867 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Oct 2 19:52:54.550872 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Oct 2 19:52:54.550877 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Oct 2 19:52:54.550882 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Oct 2 19:52:54.550887 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Oct 2 19:52:54.550892 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Oct 2 19:52:54.550897 kernel: x2apic enabled Oct 2 19:52:54.550902 kernel: Switched APIC routing to cluster x2apic. Oct 2 19:52:54.550907 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Oct 2 19:52:54.550912 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Oct 2 19:52:54.550917 kernel: CPU0: Thermal monitoring enabled (TM1) Oct 2 19:52:54.550922 kernel: process: using mwait in idle threads Oct 2 19:52:54.550927 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:52:54.550931 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:52:54.550936 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:52:54.550941 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 2 19:52:54.550947 kernel: Spectre V2 : Mitigation: Enhanced IBRS Oct 2 19:52:54.550952 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:52:54.550956 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 2 19:52:54.550961 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 2 19:52:54.550966 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:52:54.550971 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:52:54.550976 kernel: TAA: Mitigation: TSX disabled Oct 2 19:52:54.550980 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Oct 2 19:52:54.550985 kernel: SRBDS: Mitigation: Microcode Oct 2 19:52:54.550990 kernel: GDS: Vulnerable: No microcode Oct 2 19:52:54.550995 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:52:54.551000 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:52:54.551005 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:52:54.551010 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:52:54.551015 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:52:54.551020 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:52:54.551025 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:52:54.551029 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:52:54.551034 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Oct 2 19:52:54.551039 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:52:54.551044 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:52:54.551048 kernel: LSM: Security Framework initializing Oct 2 19:52:54.551053 kernel: SELinux: Initializing. Oct 2 19:52:54.551059 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:52:54.551064 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:52:54.551069 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Oct 2 19:52:54.551073 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 2 19:52:54.551078 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Oct 2 19:52:54.551083 kernel: ... version: 4 Oct 2 19:52:54.551088 kernel: ... bit width: 48 Oct 2 19:52:54.551093 kernel: ... generic registers: 4 Oct 2 19:52:54.551098 kernel: ... value mask: 0000ffffffffffff Oct 2 19:52:54.551103 kernel: ... max period: 00007fffffffffff Oct 2 19:52:54.551108 kernel: ... fixed-purpose events: 3 Oct 2 19:52:54.551113 kernel: ... event mask: 000000070000000f Oct 2 19:52:54.551118 kernel: signal: max sigframe size: 2032 Oct 2 19:52:54.551123 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:52:54.551128 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Oct 2 19:52:54.551133 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:52:54.551137 kernel: x86: Booting SMP configuration: Oct 2 19:52:54.551142 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Oct 2 19:52:54.551147 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:52:54.551153 kernel: #9 #10 #11 #12 #13 #14 #15 Oct 2 19:52:54.551158 kernel: smp: Brought up 1 node, 16 CPUs Oct 2 19:52:54.551163 kernel: smpboot: Max logical packages: 1 Oct 2 19:52:54.551168 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Oct 2 19:52:54.551173 kernel: devtmpfs: initialized Oct 2 19:52:54.551177 kernel: x86/mm: Memory block size: 128MB Oct 2 19:52:54.551182 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8266f000-0x8266ffff] (4096 bytes) Oct 2 19:52:54.551187 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Oct 2 19:52:54.551193 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:52:54.551198 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 2 19:52:54.551203 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:52:54.551208 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:52:54.551213 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:52:54.551217 kernel: audit: type=2000 audit(1696276368.040:1): state=initialized audit_enabled=0 res=1 Oct 2 19:52:54.551222 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:52:54.551227 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:52:54.551232 kernel: cpuidle: using governor menu Oct 2 19:52:54.551238 kernel: ACPI: bus type PCI registered Oct 2 19:52:54.551243 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:52:54.551247 kernel: dca service started, version 1.12.1 Oct 2 19:52:54.551252 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Oct 2 19:52:54.551257 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Oct 2 19:52:54.551262 kernel: PCI: Using configuration type 1 for base access Oct 2 19:52:54.551267 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Oct 2 19:52:54.551272 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:52:54.551277 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:52:54.551282 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:52:54.551287 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:52:54.551292 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:52:54.551297 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:52:54.551302 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:52:54.551307 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:52:54.551312 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:52:54.551316 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:52:54.551321 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Oct 2 19:52:54.551327 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:52:54.551332 kernel: ACPI: SSDT 0xFFFF9A4F8020CB00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Oct 2 19:52:54.551337 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Oct 2 19:52:54.551342 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:52:54.551347 kernel: ACPI: SSDT 0xFFFF9A4F81AE3C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Oct 2 19:52:54.551351 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:52:54.551356 kernel: ACPI: SSDT 0xFFFF9A4F81A53800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Oct 2 19:52:54.551361 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:52:54.551366 kernel: ACPI: SSDT 0xFFFF9A4F81A50800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Oct 2 19:52:54.551371 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:52:54.551376 kernel: ACPI: SSDT 0xFFFF9A4F8014F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Oct 2 19:52:54.551381 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:52:54.551386 kernel: ACPI: SSDT 0xFFFF9A4F81AE0000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Oct 2 19:52:54.551391 kernel: ACPI: Interpreter enabled Oct 2 19:52:54.551396 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:52:54.551401 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:52:54.551406 kernel: HEST: Enabling Firmware First mode for corrected errors. Oct 2 19:52:54.551411 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Oct 2 19:52:54.551415 kernel: HEST: Table parsing has been initialized. Oct 2 19:52:54.551421 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Oct 2 19:52:54.551426 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:52:54.551431 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Oct 2 19:52:54.551436 kernel: ACPI: PM: Power Resource [USBC] Oct 2 19:52:54.551441 kernel: ACPI: PM: Power Resource [V0PR] Oct 2 19:52:54.551446 kernel: ACPI: PM: Power Resource [V1PR] Oct 2 19:52:54.551451 kernel: ACPI: PM: Power Resource [V2PR] Oct 2 19:52:54.551455 kernel: ACPI: PM: Power Resource [WRST] Oct 2 19:52:54.551460 kernel: ACPI: PM: Power Resource [FN00] Oct 2 19:52:54.551466 kernel: ACPI: PM: Power Resource [FN01] Oct 2 19:52:54.551471 kernel: ACPI: PM: Power Resource [FN02] Oct 2 19:52:54.551476 kernel: ACPI: PM: Power Resource [FN03] Oct 2 19:52:54.551482 kernel: ACPI: PM: Power Resource [FN04] Oct 2 19:52:54.551487 kernel: ACPI: PM: Power Resource [PIN] Oct 2 19:52:54.551511 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Oct 2 19:52:54.551587 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:52:54.551631 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Oct 2 19:52:54.551672 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Oct 2 19:52:54.551680 kernel: PCI host bridge to bus 0000:00 Oct 2 19:52:54.551721 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:52:54.551757 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:52:54.551793 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:52:54.551827 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Oct 2 19:52:54.551862 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Oct 2 19:52:54.551900 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Oct 2 19:52:54.551949 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Oct 2 19:52:54.551998 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Oct 2 19:52:54.552039 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.552084 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Oct 2 19:52:54.552125 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Oct 2 19:52:54.552172 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Oct 2 19:52:54.552213 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Oct 2 19:52:54.552256 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Oct 2 19:52:54.552298 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Oct 2 19:52:54.552339 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Oct 2 19:52:54.552384 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Oct 2 19:52:54.552426 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Oct 2 19:52:54.552467 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Oct 2 19:52:54.552549 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Oct 2 19:52:54.552590 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 19:52:54.552636 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Oct 2 19:52:54.552676 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 19:52:54.552720 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Oct 2 19:52:54.552762 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Oct 2 19:52:54.552802 kernel: pci 0000:00:16.0: PME# supported from D3hot Oct 2 19:52:54.552844 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Oct 2 19:52:54.552885 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Oct 2 19:52:54.552924 kernel: pci 0000:00:16.1: PME# supported from D3hot Oct 2 19:52:54.552967 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Oct 2 19:52:54.553009 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Oct 2 19:52:54.553048 kernel: pci 0000:00:16.4: PME# supported from D3hot Oct 2 19:52:54.553092 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Oct 2 19:52:54.553132 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Oct 2 19:52:54.553172 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Oct 2 19:52:54.553211 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Oct 2 19:52:54.553251 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Oct 2 19:52:54.553297 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Oct 2 19:52:54.553338 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Oct 2 19:52:54.553379 kernel: pci 0000:00:17.0: PME# supported from D3hot Oct 2 19:52:54.553423 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Oct 2 19:52:54.553465 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.553531 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Oct 2 19:52:54.553588 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.553636 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Oct 2 19:52:54.553677 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.553721 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Oct 2 19:52:54.553761 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.553806 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Oct 2 19:52:54.553848 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.553892 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Oct 2 19:52:54.553932 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 19:52:54.553977 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Oct 2 19:52:54.554024 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Oct 2 19:52:54.554065 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Oct 2 19:52:54.554107 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Oct 2 19:52:54.554152 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Oct 2 19:52:54.554193 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Oct 2 19:52:54.554239 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Oct 2 19:52:54.554282 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Oct 2 19:52:54.554325 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Oct 2 19:52:54.554366 kernel: pci 0000:01:00.0: PME# supported from D3cold Oct 2 19:52:54.554408 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 19:52:54.554449 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 19:52:54.554514 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Oct 2 19:52:54.554570 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Oct 2 19:52:54.554614 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Oct 2 19:52:54.554655 kernel: pci 0000:01:00.1: PME# supported from D3cold Oct 2 19:52:54.554697 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 19:52:54.554738 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 19:52:54.554781 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:52:54.554821 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Oct 2 19:52:54.554862 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 19:52:54.554902 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Oct 2 19:52:54.554948 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Oct 2 19:52:54.554991 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Oct 2 19:52:54.555033 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Oct 2 19:52:54.555074 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Oct 2 19:52:54.555116 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.555157 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Oct 2 19:52:54.555197 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 19:52:54.555238 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 19:52:54.555285 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Oct 2 19:52:54.555329 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Oct 2 19:52:54.555370 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Oct 2 19:52:54.555412 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Oct 2 19:52:54.555453 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Oct 2 19:52:54.555519 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Oct 2 19:52:54.555581 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 19:52:54.555624 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 19:52:54.555665 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Oct 2 19:52:54.555712 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Oct 2 19:52:54.555755 kernel: pci 0000:06:00.0: enabling Extended Tags Oct 2 19:52:54.555797 kernel: pci 0000:06:00.0: supports D1 D2 Oct 2 19:52:54.555840 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:52:54.555901 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Oct 2 19:52:54.555942 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Oct 2 19:52:54.555986 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:52:54.556033 kernel: pci_bus 0000:07: extended config space not accessible Oct 2 19:52:54.556083 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Oct 2 19:52:54.556128 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Oct 2 19:52:54.556175 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Oct 2 19:52:54.556219 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Oct 2 19:52:54.556319 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:52:54.556367 kernel: pci 0000:07:00.0: supports D1 D2 Oct 2 19:52:54.556412 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:52:54.556456 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Oct 2 19:52:54.556502 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Oct 2 19:52:54.556545 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:52:54.556553 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Oct 2 19:52:54.556559 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Oct 2 19:52:54.556564 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Oct 2 19:52:54.556571 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Oct 2 19:52:54.556576 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Oct 2 19:52:54.556581 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Oct 2 19:52:54.556587 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Oct 2 19:52:54.556592 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Oct 2 19:52:54.556597 kernel: iommu: Default domain type: Translated Oct 2 19:52:54.556602 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:52:54.556646 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Oct 2 19:52:54.556692 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:52:54.556737 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Oct 2 19:52:54.556744 kernel: vgaarb: loaded Oct 2 19:52:54.556750 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:52:54.556755 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:52:54.556761 kernel: PTP clock support registered Oct 2 19:52:54.556766 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:52:54.556771 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:52:54.556777 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Oct 2 19:52:54.556783 kernel: e820: reserve RAM buffer [mem 0x8266f000-0x83ffffff] Oct 2 19:52:54.556788 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Oct 2 19:52:54.556793 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Oct 2 19:52:54.556798 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Oct 2 19:52:54.556804 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Oct 2 19:52:54.556809 kernel: clocksource: Switched to clocksource tsc-early Oct 2 19:52:54.556814 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:52:54.556819 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:52:54.556825 kernel: pnp: PnP ACPI init Oct 2 19:52:54.556868 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Oct 2 19:52:54.556910 kernel: pnp 00:02: [dma 0 disabled] Oct 2 19:52:54.556949 kernel: pnp 00:03: [dma 0 disabled] Oct 2 19:52:54.556992 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Oct 2 19:52:54.557029 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Oct 2 19:52:54.557068 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Oct 2 19:52:54.557112 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Oct 2 19:52:54.557149 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Oct 2 19:52:54.557187 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Oct 2 19:52:54.557223 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Oct 2 19:52:54.557261 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Oct 2 19:52:54.557297 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Oct 2 19:52:54.557334 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Oct 2 19:52:54.557373 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Oct 2 19:52:54.557412 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Oct 2 19:52:54.557450 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Oct 2 19:52:54.557489 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Oct 2 19:52:54.557527 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Oct 2 19:52:54.557566 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Oct 2 19:52:54.557603 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Oct 2 19:52:54.557641 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Oct 2 19:52:54.557681 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Oct 2 19:52:54.557689 kernel: pnp: PnP ACPI: found 10 devices Oct 2 19:52:54.557695 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:52:54.557700 kernel: NET: Registered PF_INET protocol family Oct 2 19:52:54.557706 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:52:54.557711 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:52:54.557716 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:52:54.557723 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:52:54.557729 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:52:54.557734 kernel: TCP: Hash tables configured (established 262144 bind 65536) Oct 2 19:52:54.557740 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 19:52:54.557745 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 19:52:54.557750 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:52:54.557756 kernel: NET: Registered PF_XDP protocol family Oct 2 19:52:54.557798 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Oct 2 19:52:54.557842 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Oct 2 19:52:54.557884 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Oct 2 19:52:54.557928 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 19:52:54.557973 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 19:52:54.558016 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 19:52:54.558059 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 19:52:54.558100 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:52:54.558143 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Oct 2 19:52:54.558186 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 19:52:54.558227 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Oct 2 19:52:54.558269 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Oct 2 19:52:54.558310 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 19:52:54.558352 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 19:52:54.558396 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Oct 2 19:52:54.558438 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 19:52:54.558480 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 19:52:54.558522 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Oct 2 19:52:54.558566 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Oct 2 19:52:54.558609 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Oct 2 19:52:54.558651 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:52:54.558693 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Oct 2 19:52:54.558735 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Oct 2 19:52:54.558778 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:52:54.558816 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Oct 2 19:52:54.558853 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:52:54.558889 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:52:54.558925 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:52:54.558960 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Oct 2 19:52:54.558997 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Oct 2 19:52:54.559038 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Oct 2 19:52:54.559079 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 19:52:54.559123 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Oct 2 19:52:54.559162 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Oct 2 19:52:54.559205 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Oct 2 19:52:54.559243 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Oct 2 19:52:54.559285 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Oct 2 19:52:54.559326 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Oct 2 19:52:54.559367 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Oct 2 19:52:54.559407 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Oct 2 19:52:54.559414 kernel: PCI: CLS 64 bytes, default 64 Oct 2 19:52:54.559420 kernel: DMAR: No ATSR found Oct 2 19:52:54.559426 kernel: DMAR: No SATC found Oct 2 19:52:54.559432 kernel: DMAR: dmar0: Using Queued invalidation Oct 2 19:52:54.559473 kernel: pci 0000:00:00.0: Adding to iommu group 0 Oct 2 19:52:54.559520 kernel: pci 0000:00:01.0: Adding to iommu group 1 Oct 2 19:52:54.559562 kernel: pci 0000:00:08.0: Adding to iommu group 2 Oct 2 19:52:54.559604 kernel: pci 0000:00:12.0: Adding to iommu group 3 Oct 2 19:52:54.559644 kernel: pci 0000:00:14.0: Adding to iommu group 4 Oct 2 19:52:54.559685 kernel: pci 0000:00:14.2: Adding to iommu group 4 Oct 2 19:52:54.559726 kernel: pci 0000:00:15.0: Adding to iommu group 5 Oct 2 19:52:54.559767 kernel: pci 0000:00:15.1: Adding to iommu group 5 Oct 2 19:52:54.559808 kernel: pci 0000:00:16.0: Adding to iommu group 6 Oct 2 19:52:54.559851 kernel: pci 0000:00:16.1: Adding to iommu group 6 Oct 2 19:52:54.559892 kernel: pci 0000:00:16.4: Adding to iommu group 6 Oct 2 19:52:54.559933 kernel: pci 0000:00:17.0: Adding to iommu group 7 Oct 2 19:52:54.559974 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Oct 2 19:52:54.560015 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Oct 2 19:52:54.560057 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Oct 2 19:52:54.560098 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Oct 2 19:52:54.560138 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Oct 2 19:52:54.560183 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Oct 2 19:52:54.560224 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Oct 2 19:52:54.560266 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Oct 2 19:52:54.560307 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Oct 2 19:52:54.560351 kernel: pci 0000:01:00.0: Adding to iommu group 1 Oct 2 19:52:54.560394 kernel: pci 0000:01:00.1: Adding to iommu group 1 Oct 2 19:52:54.560438 kernel: pci 0000:03:00.0: Adding to iommu group 15 Oct 2 19:52:54.560482 kernel: pci 0000:04:00.0: Adding to iommu group 16 Oct 2 19:52:54.560528 kernel: pci 0000:06:00.0: Adding to iommu group 17 Oct 2 19:52:54.560573 kernel: pci 0000:07:00.0: Adding to iommu group 17 Oct 2 19:52:54.560580 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Oct 2 19:52:54.560586 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:52:54.560592 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Oct 2 19:52:54.560597 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Oct 2 19:52:54.560602 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Oct 2 19:52:54.560607 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Oct 2 19:52:54.560614 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Oct 2 19:52:54.560659 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Oct 2 19:52:54.560667 kernel: Initialise system trusted keyrings Oct 2 19:52:54.560672 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Oct 2 19:52:54.560678 kernel: Key type asymmetric registered Oct 2 19:52:54.560683 kernel: Asymmetric key parser 'x509' registered Oct 2 19:52:54.560688 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:52:54.560694 kernel: io scheduler mq-deadline registered Oct 2 19:52:54.560700 kernel: io scheduler kyber registered Oct 2 19:52:54.560706 kernel: io scheduler bfq registered Oct 2 19:52:54.560746 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Oct 2 19:52:54.560789 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Oct 2 19:52:54.560831 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Oct 2 19:52:54.560873 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Oct 2 19:52:54.560915 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Oct 2 19:52:54.560957 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Oct 2 19:52:54.561005 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Oct 2 19:52:54.561013 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Oct 2 19:52:54.561019 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Oct 2 19:52:54.561024 kernel: pstore: Registered erst as persistent store backend Oct 2 19:52:54.561030 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:52:54.561035 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:52:54.561040 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:52:54.561045 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:52:54.561052 kernel: hpet_acpi_add: no address or irqs in _CRS Oct 2 19:52:54.561095 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Oct 2 19:52:54.561103 kernel: i8042: PNP: No PS/2 controller found. Oct 2 19:52:54.561140 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Oct 2 19:52:54.561179 kernel: rtc_cmos rtc_cmos: registered as rtc0 Oct 2 19:52:54.561217 kernel: rtc_cmos rtc_cmos: setting system clock to 2023-10-02T19:52:53 UTC (1696276373) Oct 2 19:52:54.561255 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Oct 2 19:52:54.561262 kernel: fail to initialize ptp_kvm Oct 2 19:52:54.561269 kernel: intel_pstate: Intel P-state driver initializing Oct 2 19:52:54.561274 kernel: intel_pstate: Disabling energy efficiency optimization Oct 2 19:52:54.561280 kernel: intel_pstate: HWP enabled Oct 2 19:52:54.561285 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Oct 2 19:52:54.561291 kernel: vesafb: scrolling: redraw Oct 2 19:52:54.561296 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Oct 2 19:52:54.561302 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000c40b3fc2, using 768k, total 768k Oct 2 19:52:54.561307 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:52:54.561312 kernel: fb0: VESA VGA frame buffer device Oct 2 19:52:54.561318 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:52:54.561324 kernel: Segment Routing with IPv6 Oct 2 19:52:54.561329 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:52:54.561334 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:52:54.561340 kernel: Key type dns_resolver registered Oct 2 19:52:54.561345 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Oct 2 19:52:54.561350 kernel: microcode: Microcode Update Driver: v2.2. Oct 2 19:52:54.561355 kernel: IPI shorthand broadcast: enabled Oct 2 19:52:54.561361 kernel: sched_clock: Marking stable (1677514345, 1339833772)->(4437035215, -1419687098) Oct 2 19:52:54.561367 kernel: registered taskstats version 1 Oct 2 19:52:54.561372 kernel: Loading compiled-in X.509 certificates Oct 2 19:52:54.561378 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:52:54.561383 kernel: Key type .fscrypt registered Oct 2 19:52:54.561388 kernel: Key type fscrypt-provisioning registered Oct 2 19:52:54.561393 kernel: pstore: Using crash dump compression: deflate Oct 2 19:52:54.561399 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:52:54.561404 kernel: ima: No architecture policies found Oct 2 19:52:54.561409 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:52:54.561415 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:52:54.561421 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:52:54.561426 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:52:54.561431 kernel: Run /init as init process Oct 2 19:52:54.561437 kernel: with arguments: Oct 2 19:52:54.561442 kernel: /init Oct 2 19:52:54.561447 kernel: with environment: Oct 2 19:52:54.561452 kernel: HOME=/ Oct 2 19:52:54.561458 kernel: TERM=linux Oct 2 19:52:54.561463 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:52:54.561470 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:52:54.561476 systemd[1]: Detected architecture x86-64. Oct 2 19:52:54.561484 systemd[1]: Running in initrd. Oct 2 19:52:54.561490 systemd[1]: No hostname configured, using default hostname. Oct 2 19:52:54.561495 systemd[1]: Hostname set to . Oct 2 19:52:54.561500 systemd[1]: Initializing machine ID from random generator. Oct 2 19:52:54.561507 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:52:54.561512 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:52:54.561518 systemd[1]: Reached target cryptsetup.target. Oct 2 19:52:54.561523 systemd[1]: Reached target paths.target. Oct 2 19:52:54.561528 systemd[1]: Reached target slices.target. Oct 2 19:52:54.561534 systemd[1]: Reached target swap.target. Oct 2 19:52:54.561539 systemd[1]: Reached target timers.target. Oct 2 19:52:54.561544 systemd[1]: Listening on iscsid.socket. Oct 2 19:52:54.561551 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:52:54.561557 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:52:54.561562 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:52:54.561568 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:52:54.561573 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Oct 2 19:52:54.561578 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:52:54.561584 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Oct 2 19:52:54.561589 kernel: clocksource: Switched to clocksource tsc Oct 2 19:52:54.561596 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:52:54.561601 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:52:54.561607 systemd[1]: Reached target sockets.target. Oct 2 19:52:54.561612 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:52:54.561618 systemd[1]: Finished network-cleanup.service. Oct 2 19:52:54.561623 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:52:54.561629 systemd[1]: Starting systemd-journald.service... Oct 2 19:52:54.561634 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:52:54.561642 systemd-journald[268]: Journal started Oct 2 19:52:54.561667 systemd-journald[268]: Runtime Journal (/run/log/journal/38eda367db504e82ac4dbedffdd51748) is 8.0M, max 640.1M, 632.1M free. Oct 2 19:52:54.565118 systemd-modules-load[269]: Inserted module 'overlay' Oct 2 19:52:54.594846 kernel: audit: type=1334 audit(1696276374.570:2): prog-id=6 op=LOAD Oct 2 19:52:54.594856 systemd[1]: Starting systemd-resolved.service... Oct 2 19:52:54.570000 audit: BPF prog-id=6 op=LOAD Oct 2 19:52:54.639514 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:52:54.639546 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:52:54.672514 kernel: Bridge firewalling registered Oct 2 19:52:54.672532 systemd[1]: Started systemd-journald.service. Oct 2 19:52:54.686520 systemd-modules-load[269]: Inserted module 'br_netfilter' Oct 2 19:52:54.728537 kernel: audit: type=1130 audit(1696276374.685:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.686917 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:52:54.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.731073 systemd-resolved[271]: Positive Trust Anchors: Oct 2 19:52:54.838162 kernel: audit: type=1130 audit(1696276374.735:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.838174 kernel: SCSI subsystem initialized Oct 2 19:52:54.838183 kernel: audit: type=1130 audit(1696276374.789:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.731078 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:52:54.960828 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:52:54.960855 kernel: audit: type=1130 audit(1696276374.863:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.960863 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:52:54.960869 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:52:54.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.731097 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:52:55.036687 kernel: audit: type=1130 audit(1696276374.969:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.732621 systemd-resolved[271]: Defaulting to hostname 'linux'. Oct 2 19:52:55.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.736626 systemd[1]: Started systemd-resolved.service. Oct 2 19:52:55.108699 kernel: audit: type=1130 audit(1696276375.044:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:54.790646 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:52:54.864635 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:52:54.963150 systemd-modules-load[269]: Inserted module 'dm_multipath' Oct 2 19:52:54.970792 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:52:55.045761 systemd[1]: Reached target nss-lookup.target. Oct 2 19:52:55.102087 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:52:55.109125 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:52:55.122158 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:52:55.122883 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:52:55.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:55.124969 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:52:55.171678 kernel: audit: type=1130 audit(1696276375.121:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:55.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:55.186804 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:52:55.254555 kernel: audit: type=1130 audit(1696276375.185:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:55.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:55.246134 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:52:55.268583 dracut-cmdline[294]: dracut-dracut-053 Oct 2 19:52:55.268583 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 19:52:55.268583 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:52:55.337584 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:52:55.337596 kernel: iscsi: registered transport (tcp) Oct 2 19:52:55.386786 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:52:55.386807 kernel: QLogic iSCSI HBA Driver Oct 2 19:52:55.403748 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:52:55.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:55.404296 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:52:55.459526 kernel: raid6: avx2x4 gen() 48900 MB/s Oct 2 19:52:55.494510 kernel: raid6: avx2x4 xor() 21619 MB/s Oct 2 19:52:55.529511 kernel: raid6: avx2x2 gen() 55082 MB/s Oct 2 19:52:55.564536 kernel: raid6: avx2x2 xor() 32847 MB/s Oct 2 19:52:55.599535 kernel: raid6: avx2x1 gen() 47233 MB/s Oct 2 19:52:55.634535 kernel: raid6: avx2x1 xor() 29071 MB/s Oct 2 19:52:55.668527 kernel: raid6: sse2x4 gen() 22291 MB/s Oct 2 19:52:55.702535 kernel: raid6: sse2x4 xor() 11982 MB/s Oct 2 19:52:55.736512 kernel: raid6: sse2x2 gen() 22615 MB/s Oct 2 19:52:55.770510 kernel: raid6: sse2x2 xor() 14020 MB/s Oct 2 19:52:55.804535 kernel: raid6: sse2x1 gen() 19108 MB/s Oct 2 19:52:55.856446 kernel: raid6: sse2x1 xor() 9317 MB/s Oct 2 19:52:55.856461 kernel: raid6: using algorithm avx2x2 gen() 55082 MB/s Oct 2 19:52:55.856468 kernel: raid6: .... xor() 32847 MB/s, rmw enabled Oct 2 19:52:55.874667 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:52:55.921484 kernel: xor: automatically using best checksumming function avx Oct 2 19:52:55.997512 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:52:56.002687 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:52:56.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:56.012000 audit: BPF prog-id=7 op=LOAD Oct 2 19:52:56.012000 audit: BPF prog-id=8 op=LOAD Oct 2 19:52:56.013542 systemd[1]: Starting systemd-udevd.service... Oct 2 19:52:56.021251 systemd-udevd[474]: Using default interface naming scheme 'v252'. Oct 2 19:52:56.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:56.026634 systemd[1]: Started systemd-udevd.service. Oct 2 19:52:56.065584 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Oct 2 19:52:56.043606 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:52:56.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:56.070106 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:52:56.084250 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:52:56.131833 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:52:56.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:56.160485 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:52:56.184491 kernel: ACPI: bus type USB registered Oct 2 19:52:56.184532 kernel: libata version 3.00 loaded. Oct 2 19:52:56.184545 kernel: usbcore: registered new interface driver usbfs Oct 2 19:52:56.184556 kernel: usbcore: registered new interface driver hub Oct 2 19:52:56.221521 kernel: usbcore: registered new device driver usb Oct 2 19:52:56.271785 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:52:56.271842 kernel: AES CTR mode by8 optimization enabled Oct 2 19:52:56.308008 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Oct 2 19:52:56.308034 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Oct 2 19:52:56.308545 kernel: ahci 0000:00:17.0: version 3.0 Oct 2 19:52:56.346154 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Oct 2 19:52:56.346264 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Oct 2 19:52:56.346316 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 19:52:56.346370 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Oct 2 19:52:56.350522 kernel: pps pps0: new PPS source ptp0 Oct 2 19:52:56.350612 kernel: igb 0000:03:00.0: added PHC on eth0 Oct 2 19:52:56.350711 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 19:52:56.350761 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:58 Oct 2 19:52:56.350811 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Oct 2 19:52:56.350858 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 19:52:56.400498 kernel: pps pps1: new PPS source ptp1 Oct 2 19:52:56.449082 kernel: scsi host0: ahci Oct 2 19:52:56.449155 kernel: igb 0000:04:00.0: added PHC on eth1 Oct 2 19:52:56.463885 kernel: scsi host1: ahci Oct 2 19:52:56.464534 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 19:52:56.464604 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 19:52:56.464656 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Oct 2 19:52:56.465535 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Oct 2 19:52:56.465603 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 19:52:56.465671 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Oct 2 19:52:56.465732 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Oct 2 19:52:56.465779 kernel: hub 1-0:1.0: USB hub found Oct 2 19:52:56.465847 kernel: hub 1-0:1.0: 16 ports detected Oct 2 19:52:56.466484 kernel: hub 2-0:1.0: USB hub found Oct 2 19:52:56.466564 kernel: hub 2-0:1.0: 10 ports detected Oct 2 19:52:56.467533 kernel: usb: port power management may be unreliable Oct 2 19:52:56.494198 kernel: scsi host2: ahci Oct 2 19:52:56.494221 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:59 Oct 2 19:52:56.518855 kernel: scsi host3: ahci Oct 2 19:52:56.529865 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Oct 2 19:52:56.544763 kernel: scsi host4: ahci Oct 2 19:52:56.544786 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 19:52:56.589196 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Oct 2 19:52:56.589267 kernel: scsi host5: ahci Oct 2 19:52:56.642617 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 19:52:56.642690 kernel: scsi host6: ahci Oct 2 19:52:56.727537 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Oct 2 19:52:56.727565 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Oct 2 19:52:56.870402 kernel: hub 1-14:1.0: USB hub found Oct 2 19:52:56.870486 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Oct 2 19:52:56.900899 kernel: hub 1-14:1.0: 4 ports detected Oct 2 19:52:56.900975 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Oct 2 19:52:56.900984 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Oct 2 19:52:56.900991 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Oct 2 19:52:56.969428 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Oct 2 19:52:56.969445 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Oct 2 19:52:57.002662 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Oct 2 19:52:57.028558 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:52:57.210572 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Oct 2 19:52:57.210739 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 19:52:57.283641 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Oct 2 19:52:57.283772 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 19:52:57.313496 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 19:52:57.313519 kernel: ata7: SATA link down (SStatus 0 SControl 300) Oct 2 19:52:57.328484 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 2 19:52:57.328496 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:52:57.343484 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 19:52:57.373484 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 2 19:52:57.388525 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 2 19:52:57.403526 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 2 19:52:57.417510 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Oct 2 19:52:57.434482 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Oct 2 19:52:57.482178 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 19:52:57.482196 kernel: ata2.00: Features: NCQ-prio Oct 2 19:52:57.482204 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 19:52:57.510828 kernel: ata1.00: Features: NCQ-prio Oct 2 19:52:57.528533 kernel: ata2.00: configured for UDMA/133 Oct 2 19:52:57.528548 kernel: ata1.00: configured for UDMA/133 Oct 2 19:52:57.541553 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Oct 2 19:52:57.575510 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Oct 2 19:52:57.575632 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 19:52:57.626850 kernel: usbcore: registered new interface driver usbhid Oct 2 19:52:57.626873 kernel: port_module: 9 callbacks suppressed Oct 2 19:52:57.626882 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Oct 2 19:52:57.626992 kernel: usbhid: USB HID core driver Oct 2 19:52:57.644509 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:52:57.708483 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Oct 2 19:52:57.708499 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:52:57.722626 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:57.736995 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 19:52:57.737073 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 19:52:57.760522 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 19:52:57.760596 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Oct 2 19:52:57.760663 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Oct 2 19:52:57.760671 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Oct 2 19:52:57.771338 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Oct 2 19:52:57.771415 kernel: sd 1:0:0:0: [sdb] Write Protect is off Oct 2 19:52:57.785910 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:52:57.816954 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Oct 2 19:52:57.817027 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:52:57.848644 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Oct 2 19:52:57.856483 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 19:52:57.881519 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:57.984010 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:52:58.038595 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:52:58.038610 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:52:58.038617 kernel: GPT:9289727 != 937703087 Oct 2 19:52:58.068714 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:52:58.068728 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:52:58.068735 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:52:58.101302 kernel: GPT:9289727 != 937703087 Oct 2 19:52:58.101317 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:52:58.147968 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Oct 2 19:52:58.148570 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:58.164370 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Oct 2 19:52:58.200538 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Oct 2 19:52:58.230538 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (524) Oct 2 19:52:58.230606 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Oct 2 19:52:58.250253 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:52:58.261528 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:52:58.288630 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:52:58.312561 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:52:58.327673 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:52:58.345557 systemd[1]: Starting disk-uuid.service... Oct 2 19:52:58.383606 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:58.383621 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Oct 2 19:52:58.383675 disk-uuid[680]: Primary Header is updated. Oct 2 19:52:58.383675 disk-uuid[680]: Secondary Entries is updated. Oct 2 19:52:58.383675 disk-uuid[680]: Secondary Header is updated. Oct 2 19:52:58.441510 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:58.441520 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Oct 2 19:52:58.441527 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:58.468510 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Oct 2 19:52:59.448876 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:52:59.468199 disk-uuid[681]: The operation has completed successfully. Oct 2 19:52:59.476587 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Oct 2 19:52:59.503927 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:52:59.599094 kernel: audit: type=1130 audit(1696276379.510:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.599109 kernel: audit: type=1131 audit(1696276379.510:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.503984 systemd[1]: Finished disk-uuid.service. Oct 2 19:52:59.629519 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:52:59.516312 systemd[1]: Starting verity-setup.service... Oct 2 19:52:59.696750 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:52:59.708845 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:52:59.720105 systemd[1]: Finished verity-setup.service. Oct 2 19:52:59.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.789488 kernel: audit: type=1130 audit(1696276379.733:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.850105 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:52:59.864638 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:52:59.857754 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:52:59.945142 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:52:59.945160 kernel: BTRFS info (device sdb6): using free space tree Oct 2 19:52:59.945175 kernel: BTRFS info (device sdb6): has skinny extents Oct 2 19:52:59.945185 kernel: BTRFS info (device sdb6): enabling ssd optimizations Oct 2 19:52:59.858154 systemd[1]: Starting ignition-setup.service... Oct 2 19:52:59.879993 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:52:59.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.953942 systemd[1]: Finished ignition-setup.service. Oct 2 19:53:00.072237 kernel: audit: type=1130 audit(1696276379.969:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.072250 kernel: audit: type=1130 audit(1696276380.024:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:59.970805 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:53:00.101584 kernel: audit: type=1334 audit(1696276380.079:24): prog-id=9 op=LOAD Oct 2 19:53:00.079000 audit: BPF prog-id=9 op=LOAD Oct 2 19:53:00.026142 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:53:00.081425 systemd[1]: Starting systemd-networkd.service... Oct 2 19:53:00.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.115065 systemd-networkd[864]: lo: Link UP Oct 2 19:53:00.184623 kernel: audit: type=1130 audit(1696276380.123:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.115067 systemd-networkd[864]: lo: Gained carrier Oct 2 19:53:00.159433 ignition[858]: Ignition 2.14.0 Oct 2 19:53:00.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.115352 systemd-networkd[864]: Enumeration completed Oct 2 19:53:00.333534 kernel: audit: type=1130 audit(1696276380.205:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.333552 kernel: audit: type=1130 audit(1696276380.262:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.333563 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 19:53:00.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.159437 ignition[858]: Stage: fetch-offline Oct 2 19:53:00.115389 systemd[1]: Started systemd-networkd.service. Oct 2 19:53:00.374718 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Oct 2 19:53:00.159464 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:53:00.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.116057 systemd-networkd[864]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:53:00.159481 ignition[858]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:53:00.410621 iscsid[892]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:53:00.410621 iscsid[892]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:53:00.410621 iscsid[892]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:53:00.410621 iscsid[892]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:53:00.410621 iscsid[892]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:53:00.410621 iscsid[892]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:53:00.410621 iscsid[892]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:53:00.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.124615 systemd[1]: Reached target network.target. Oct 2 19:53:00.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:00.167738 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:53:00.172601 systemd[1]: Starting iscsiuio.service... Oct 2 19:53:00.602711 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Oct 2 19:53:00.167807 ignition[858]: parsed url from cmdline: "" Oct 2 19:53:00.177510 unknown[858]: fetched base config from "system" Oct 2 19:53:00.167809 ignition[858]: no config URL provided Oct 2 19:53:00.177515 unknown[858]: fetched user config from "system" Oct 2 19:53:00.167812 ignition[858]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:53:00.191862 systemd[1]: Started iscsiuio.service. Oct 2 19:53:00.167830 ignition[858]: parsing config with SHA512: c16563c64d78911d33c52399e377548f21bd99d5d652e69948a3a336291636f89e32bf72182be2afd88519525a461bcff39a2023c36123e76969c28d8051e37e Oct 2 19:53:00.206916 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:53:00.177756 ignition[858]: fetch-offline: fetch-offline passed Oct 2 19:53:00.263905 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:53:00.177759 ignition[858]: POST message to Packet Timeline Oct 2 19:53:00.264393 systemd[1]: Starting ignition-kargs.service... Oct 2 19:53:00.177764 ignition[858]: POST Status error: resource requires networking Oct 2 19:53:00.334938 systemd-networkd[864]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:53:00.177793 ignition[858]: Ignition finished successfully Oct 2 19:53:00.348054 systemd[1]: Starting iscsid.service... Oct 2 19:53:00.337980 ignition[881]: Ignition 2.14.0 Oct 2 19:53:00.367819 systemd[1]: Started iscsid.service. Oct 2 19:53:00.337983 ignition[881]: Stage: kargs Oct 2 19:53:00.382051 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:53:00.338038 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:53:00.398821 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:53:00.338047 ignition[881]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:53:00.418741 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:53:00.340154 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:53:00.429746 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:53:00.340707 ignition[881]: kargs: kargs passed Oct 2 19:53:00.470849 systemd[1]: Reached target remote-fs.target. Oct 2 19:53:00.340710 ignition[881]: POST message to Packet Timeline Oct 2 19:53:00.502824 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:53:00.340720 ignition[881]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:53:00.528808 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:53:00.344871 ignition[881]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39135->[::1]:53: read: connection refused Oct 2 19:53:00.596472 systemd-networkd[864]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:53:00.545439 ignition[881]: GET https://metadata.packet.net/metadata: attempt #2 Oct 2 19:53:00.626152 systemd-networkd[864]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:53:00.545707 ignition[881]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:52561->[::1]:53: read: connection refused Oct 2 19:53:00.657189 systemd-networkd[864]: enp1s0f1np1: Link UP Oct 2 19:53:00.657635 systemd-networkd[864]: enp1s0f1np1: Gained carrier Oct 2 19:53:00.678990 systemd-networkd[864]: enp1s0f0np0: Link UP Oct 2 19:53:00.679358 systemd-networkd[864]: eno2: Link UP Oct 2 19:53:00.679718 systemd-networkd[864]: eno1: Link UP Oct 2 19:53:00.946252 ignition[881]: GET https://metadata.packet.net/metadata: attempt #3 Oct 2 19:53:00.947449 ignition[881]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33353->[::1]:53: read: connection refused Oct 2 19:53:01.377047 systemd-networkd[864]: enp1s0f0np0: Gained carrier Oct 2 19:53:01.385612 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Oct 2 19:53:01.405646 systemd-networkd[864]: enp1s0f0np0: DHCPv4 address 139.178.89.111/31, gateway 139.178.89.110 acquired from 145.40.83.140 Oct 2 19:53:01.747948 ignition[881]: GET https://metadata.packet.net/metadata: attempt #4 Oct 2 19:53:01.749091 ignition[881]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43292->[::1]:53: read: connection refused Oct 2 19:53:01.868104 systemd-networkd[864]: enp1s0f1np1: Gained IPv6LL Oct 2 19:53:02.508111 systemd-networkd[864]: enp1s0f0np0: Gained IPv6LL Oct 2 19:53:03.350764 ignition[881]: GET https://metadata.packet.net/metadata: attempt #5 Oct 2 19:53:03.352067 ignition[881]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:54692->[::1]:53: read: connection refused Oct 2 19:53:06.555471 ignition[881]: GET https://metadata.packet.net/metadata: attempt #6 Oct 2 19:53:06.594647 ignition[881]: GET result: OK Oct 2 19:53:06.776109 ignition[881]: Ignition finished successfully Oct 2 19:53:06.778661 systemd[1]: Finished ignition-kargs.service. Oct 2 19:53:06.863331 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 19:53:06.863350 kernel: audit: type=1130 audit(1696276386.790:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:06.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:06.799646 ignition[910]: Ignition 2.14.0 Oct 2 19:53:06.793925 systemd[1]: Starting ignition-disks.service... Oct 2 19:53:06.799649 ignition[910]: Stage: disks Oct 2 19:53:06.799724 ignition[910]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:53:06.799732 ignition[910]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:53:06.801251 ignition[910]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:53:06.802738 ignition[910]: disks: disks passed Oct 2 19:53:06.802741 ignition[910]: POST message to Packet Timeline Oct 2 19:53:06.802751 ignition[910]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:53:06.824411 ignition[910]: GET result: OK Oct 2 19:53:06.989001 ignition[910]: Ignition finished successfully Oct 2 19:53:06.992100 systemd[1]: Finished ignition-disks.service. Oct 2 19:53:07.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.005113 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:53:07.088656 kernel: audit: type=1130 audit(1696276387.003:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.074638 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:53:07.074752 systemd[1]: Reached target local-fs.target. Oct 2 19:53:07.096653 systemd[1]: Reached target sysinit.target. Oct 2 19:53:07.096790 systemd[1]: Reached target basic.target. Oct 2 19:53:07.118578 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:53:07.138785 systemd-fsck[927]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:53:07.156214 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:53:07.243583 kernel: audit: type=1130 audit(1696276387.163:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.243597 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:53:07.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.170208 systemd[1]: Mounting sysroot.mount... Oct 2 19:53:07.251175 systemd[1]: Mounted sysroot.mount. Oct 2 19:53:07.264821 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:53:07.272408 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:53:07.297330 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 19:53:07.306039 systemd[1]: Starting flatcar-static-network.service... Oct 2 19:53:07.314722 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:53:07.314750 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:53:07.338728 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:53:07.364116 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:53:07.416582 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (938) Oct 2 19:53:07.376608 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:53:07.560978 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:53:07.560999 kernel: BTRFS info (device sdb6): using free space tree Oct 2 19:53:07.561008 kernel: BTRFS info (device sdb6): has skinny extents Oct 2 19:53:07.561015 kernel: audit: type=1130 audit(1696276387.483:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.561023 kernel: BTRFS info (device sdb6): enabling ssd optimizations Oct 2 19:53:07.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.561057 initrd-setup-root[943]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:53:07.577772 coreos-metadata[935]: Oct 02 19:53:07.464 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:53:07.577772 coreos-metadata[935]: Oct 02 19:53:07.508 INFO Fetch successful Oct 2 19:53:07.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.464928 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:53:07.776043 kernel: audit: type=1130 audit(1696276387.595:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.776056 kernel: audit: type=1130 audit(1696276387.661:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.776064 kernel: audit: type=1131 audit(1696276387.661:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.776108 coreos-metadata[934]: Oct 02 19:53:07.464 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:53:07.776108 coreos-metadata[934]: Oct 02 19:53:07.507 INFO Fetch successful Oct 2 19:53:07.776108 coreos-metadata[934]: Oct 02 19:53:07.523 INFO wrote hostname ci-3510.3.0-a-10f7e2f476 to /sysroot/etc/hostname Oct 2 19:53:07.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.844618 initrd-setup-root[953]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:53:07.878695 kernel: audit: type=1130 audit(1696276387.812:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.485651 systemd[1]: Starting ignition-mount.service... Oct 2 19:53:07.885719 initrd-setup-root[961]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:53:07.896735 bash[1003]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:53:07.568121 systemd[1]: Starting sysroot-boot.service... Oct 2 19:53:07.913657 initrd-setup-root[969]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:53:07.923715 ignition[1010]: INFO : Ignition 2.14.0 Oct 2 19:53:07.923715 ignition[1010]: INFO : Stage: mount Oct 2 19:53:07.923715 ignition[1010]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:53:07.923715 ignition[1010]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:53:07.923715 ignition[1010]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:53:07.923715 ignition[1010]: INFO : mount: mount passed Oct 2 19:53:07.923715 ignition[1010]: INFO : POST message to Packet Timeline Oct 2 19:53:07.923715 ignition[1010]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:53:07.923715 ignition[1010]: INFO : GET result: OK Oct 2 19:53:08.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:07.589331 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 19:53:08.090609 kernel: audit: type=1130 audit(1696276388.014:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:08.090662 ignition[1010]: INFO : Ignition finished successfully Oct 2 19:53:07.596928 systemd[1]: flatcar-static-network.service: Deactivated successfully. Oct 2 19:53:07.597016 systemd[1]: Finished flatcar-static-network.service. Oct 2 19:53:08.118724 ignition[1026]: INFO : Ignition 2.14.0 Oct 2 19:53:08.118724 ignition[1026]: INFO : Stage: files Oct 2 19:53:08.118724 ignition[1026]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:53:08.118724 ignition[1026]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:53:08.118724 ignition[1026]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:53:08.118724 ignition[1026]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:53:08.118724 ignition[1026]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:53:08.118724 ignition[1026]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:53:08.118724 ignition[1026]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:53:08.118724 ignition[1026]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:53:08.118724 ignition[1026]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:53:08.118724 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:53:08.118724 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:53:07.663628 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:53:07.785133 systemd[1]: Finished sysroot-boot.service. Oct 2 19:53:08.007670 systemd[1]: Finished ignition-mount.service. Oct 2 19:53:08.017608 systemd[1]: Starting ignition-files.service... Oct 2 19:53:08.094981 unknown[1026]: wrote ssh authorized keys file for user: core Oct 2 19:53:08.392361 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:53:08.466795 ignition[1026]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:53:08.466795 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:53:08.511700 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:53:08.511700 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:53:08.733854 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:53:08.795780 ignition[1026]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Oct 2 19:53:08.795780 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:53:08.837744 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:53:08.837744 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:53:08.922449 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:53:09.308373 ignition[1026]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Oct 2 19:53:09.333802 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:53:09.333802 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:53:09.333802 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:53:09.386765 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:53:10.098701 ignition[1026]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 19:53:10.122763 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:53:10.266356 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1049) Oct 2 19:53:10.266421 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940918302" Oct 2 19:53:10.266421 ignition[1026]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940918302": device or resource busy Oct 2 19:53:10.266421 ignition[1026]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2940918302", trying btrfs: device or resource busy Oct 2 19:53:10.266421 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940918302" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2940918302" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem2940918302" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem2940918302" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(d): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(d): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(e): [started] processing unit "packet-phone-home.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(e): [finished] processing unit "packet-phone-home.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:53:10.266421 ignition[1026]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Oct 2 19:53:10.652844 kernel: audit: type=1130 audit(1696276390.381:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.372098 systemd[1]: Finished ignition-files.service. Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(14): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(14): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(15): [started] setting preset to enabled for "packet-phone-home.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(15): [finished] setting preset to enabled for "packet-phone-home.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(16): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: createResultFile: createFiles: op(17): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: createResultFile: createFiles: op(17): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:53:10.666748 ignition[1026]: INFO : files: files passed Oct 2 19:53:10.666748 ignition[1026]: INFO : POST message to Packet Timeline Oct 2 19:53:10.666748 ignition[1026]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:53:10.666748 ignition[1026]: INFO : GET result: OK Oct 2 19:53:10.666748 ignition[1026]: INFO : Ignition finished successfully Oct 2 19:53:10.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.387905 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:53:11.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.053081 initrd-setup-root-after-ignition[1060]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:53:10.450725 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:53:11.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.451037 systemd[1]: Starting ignition-quench.service... Oct 2 19:53:11.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.481917 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:53:10.511935 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:53:10.512026 systemd[1]: Finished ignition-quench.service. Oct 2 19:53:10.531993 systemd[1]: Reached target ignition-complete.target. Oct 2 19:53:10.553625 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:53:11.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.571677 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:53:11.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.571728 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:53:11.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.588866 systemd[1]: Reached target initrd-fs.target. Oct 2 19:53:11.247597 ignition[1075]: INFO : Ignition 2.14.0 Oct 2 19:53:11.247597 ignition[1075]: INFO : Stage: umount Oct 2 19:53:11.247597 ignition[1075]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:53:11.247597 ignition[1075]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:53:11.247597 ignition[1075]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:53:11.247597 ignition[1075]: INFO : umount: umount passed Oct 2 19:53:11.247597 ignition[1075]: INFO : POST message to Packet Timeline Oct 2 19:53:11.247597 ignition[1075]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:53:11.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.621706 systemd[1]: Reached target initrd.target. Oct 2 19:53:11.391661 iscsid[892]: iscsid shutting down. Oct 2 19:53:11.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.407062 ignition[1075]: INFO : GET result: OK Oct 2 19:53:11.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.641043 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:53:11.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.441159 ignition[1075]: INFO : Ignition finished successfully Oct 2 19:53:11.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.643248 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:53:10.676985 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:53:10.694512 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:53:11.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.712851 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:53:11.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.726846 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:53:11.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.755003 systemd[1]: Stopped target timers.target. Oct 2 19:53:11.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.775056 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:53:10.775417 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:53:10.798345 systemd[1]: Stopped target initrd.target. Oct 2 19:53:11.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.820081 systemd[1]: Stopped target basic.target. Oct 2 19:53:11.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.609000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:53:10.840183 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:53:10.862064 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:53:10.886079 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:53:11.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.909080 systemd[1]: Stopped target remote-fs.target. Oct 2 19:53:11.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.934066 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:53:11.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.959085 systemd[1]: Stopped target sysinit.target. Oct 2 19:53:10.975088 systemd[1]: Stopped target local-fs.target. Oct 2 19:53:11.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:10.993075 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:53:11.012069 systemd[1]: Stopped target swap.target. Oct 2 19:53:11.026070 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:53:11.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.026436 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:53:11.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.043273 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:53:11.881990 kernel: kauditd_printk_skb: 35 callbacks suppressed Oct 2 19:53:11.882005 kernel: audit: type=1131 audit(1696276391.796:76): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.061973 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:53:11.062330 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:53:11.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.084215 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:53:12.003591 kernel: audit: type=1131 audit(1696276391.904:77): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:12.003603 kernel: audit: type=1130 audit(1696276391.972:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.084586 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:53:12.102684 kernel: audit: type=1131 audit(1696276391.972:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.110281 systemd[1]: Stopped target paths.target. Oct 2 19:53:11.123944 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:53:11.126721 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:53:11.141085 systemd[1]: Stopped target slices.target. Oct 2 19:53:11.158070 systemd[1]: Stopped target sockets.target. Oct 2 19:53:11.173073 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:53:11.173454 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:53:11.191165 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:53:11.191535 systemd[1]: Stopped ignition-files.service. Oct 2 19:53:11.209176 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 19:53:11.209549 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 19:53:11.229142 systemd[1]: Stopping ignition-mount.service... Oct 2 19:53:11.240646 systemd[1]: Stopping iscsid.service... Oct 2 19:53:11.255649 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:53:11.255740 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:53:11.263428 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:53:11.275695 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:53:11.275822 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:53:12.320557 kernel: audit: type=1131 audit(1696276392.248:80): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:12.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:11.302091 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:53:11.302426 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:53:11.335574 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:53:11.335952 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:53:11.335998 systemd[1]: Stopped iscsid.service. Oct 2 19:53:11.354030 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:53:11.354089 systemd[1]: Closed iscsid.socket. Oct 2 19:53:11.362802 systemd[1]: Stopping iscsiuio.service... Oct 2 19:53:11.384933 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:53:11.385046 systemd[1]: Stopped iscsiuio.service. Oct 2 19:53:11.399157 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:53:11.399346 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:53:11.415323 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:53:11.415560 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:53:11.429335 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:53:11.429568 systemd[1]: Stopped ignition-mount.service. Oct 2 19:53:12.389493 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Oct 2 19:53:11.450927 systemd[1]: Stopped target network.target. Oct 2 19:53:11.466747 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:53:11.466843 systemd[1]: Closed iscsiuio.socket. Oct 2 19:53:11.483931 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:53:11.484076 systemd[1]: Stopped ignition-disks.service. Oct 2 19:53:11.499897 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:53:11.500042 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:53:11.514880 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:53:11.515015 systemd[1]: Stopped ignition-setup.service. Oct 2 19:53:11.529887 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:53:11.530031 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:53:11.548179 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:53:11.553606 systemd-networkd[864]: enp1s0f1np1: DHCPv6 lease lost Oct 2 19:53:11.562680 systemd-networkd[864]: enp1s0f0np0: DHCPv6 lease lost Oct 2 19:53:11.562922 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:53:12.388000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:53:11.579265 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:53:11.579515 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:53:11.596139 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:53:11.596474 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:53:11.610959 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:53:11.611079 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:53:11.626213 systemd[1]: Stopping network-cleanup.service... Oct 2 19:53:11.639692 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:53:11.639825 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:53:11.656802 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:53:11.656918 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:53:11.673004 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:53:11.673136 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:53:11.688116 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:53:11.706416 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:53:11.707965 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:53:11.708287 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:53:11.721305 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:53:11.721445 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:53:11.734808 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:53:11.734898 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:53:11.750764 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:53:11.750879 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:53:11.766895 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:53:11.767043 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:53:11.782847 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:53:11.782992 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:53:11.799610 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:53:11.890576 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:53:11.890602 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:53:11.905732 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:53:11.905772 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:53:12.232999 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:53:12.233226 systemd[1]: Stopped network-cleanup.service. Oct 2 19:53:12.250237 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:53:12.329103 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:53:12.343281 systemd[1]: Switching root. Oct 2 19:53:12.390883 systemd-journald[268]: Journal stopped Oct 2 19:53:16.396369 kernel: audit: type=1334 audit(1696276392.388:81): prog-id=9 op=UNLOAD Oct 2 19:53:16.396383 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:53:16.396391 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:53:16.396405 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:53:16.396411 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:53:16.396416 kernel: SELinux: policy capability open_perms=1 Oct 2 19:53:16.396422 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:53:16.396427 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:53:16.396432 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:53:16.396438 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:53:16.396443 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:53:16.396449 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:53:16.396454 kernel: audit: type=1403 audit(1696276392.878:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:53:16.396460 systemd[1]: Successfully loaded SELinux policy in 325.627ms. Oct 2 19:53:16.396467 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.984ms. Oct 2 19:53:16.396475 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:53:16.396484 systemd[1]: Detected architecture x86-64. Oct 2 19:53:16.396490 systemd[1]: Detected first boot. Oct 2 19:53:16.396516 systemd[1]: Hostname set to . Oct 2 19:53:16.396522 systemd[1]: Initializing machine ID from random generator. Oct 2 19:53:16.396543 kernel: audit: type=1400 audit(1696276393.179:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:53:16.396554 kernel: audit: type=1400 audit(1696276393.237:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:53:16.396562 kernel: audit: type=1400 audit(1696276393.237:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:53:16.396567 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:53:16.396574 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:53:16.396580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:53:16.396587 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:53:16.396594 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:53:16.396600 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:53:16.396605 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:53:16.396612 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:53:16.396618 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:53:16.396624 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:53:16.396630 systemd[1]: Created slice system-getty.slice. Oct 2 19:53:16.396637 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:53:16.396643 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:53:16.396649 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:53:16.396655 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:53:16.396661 systemd[1]: Created slice user.slice. Oct 2 19:53:16.396667 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:53:16.396675 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:53:16.396681 systemd[1]: Set up automount boot.automount. Oct 2 19:53:16.396687 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:53:16.396694 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:53:16.396706 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:53:16.396715 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:53:16.396722 systemd[1]: Reached target integritysetup.target. Oct 2 19:53:16.396728 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:53:16.396734 systemd[1]: Reached target remote-fs.target. Oct 2 19:53:16.396740 systemd[1]: Reached target slices.target. Oct 2 19:53:16.396746 systemd[1]: Reached target swap.target. Oct 2 19:53:16.396753 systemd[1]: Reached target torcx.target. Oct 2 19:53:16.396760 systemd[1]: Reached target veritysetup.target. Oct 2 19:53:16.396766 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:53:16.396772 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:53:16.396778 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:53:16.396784 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:53:16.396792 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:53:16.396798 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:53:16.396804 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:53:16.396811 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:53:16.396817 systemd[1]: Mounting media.mount... Oct 2 19:53:16.396824 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:53:16.396830 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:53:16.396837 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:53:16.396844 systemd[1]: Mounting tmp.mount... Oct 2 19:53:16.396850 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:53:16.396857 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:53:16.396863 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:53:16.396869 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:53:16.396876 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:53:16.396882 systemd[1]: Starting modprobe@drm.service... Oct 2 19:53:16.396888 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:53:16.396896 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:53:16.396902 kernel: fuse: init (API version 7.34) Oct 2 19:53:16.396908 systemd[1]: Starting modprobe@loop.service... Oct 2 19:53:16.396914 kernel: loop: module loaded Oct 2 19:53:16.396920 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:53:16.396926 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:53:16.396933 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:53:16.396939 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:53:16.396945 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:53:16.396953 systemd[1]: Stopped systemd-journald.service. Oct 2 19:53:16.396959 systemd[1]: Starting systemd-journald.service... Oct 2 19:53:16.396966 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:53:16.396974 systemd-journald[1227]: Journal started Oct 2 19:53:16.396999 systemd-journald[1227]: Runtime Journal (/run/log/journal/232c8e1055854524975f2eb074906c8d) is 8.0M, max 640.1M, 632.1M free. Oct 2 19:53:12.878000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:53:13.179000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:53:13.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:53:13.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:53:13.291000 audit: BPF prog-id=10 op=LOAD Oct 2 19:53:13.291000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:53:13.345000 audit: BPF prog-id=11 op=LOAD Oct 2 19:53:13.345000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:53:15.007000 audit: BPF prog-id=12 op=LOAD Oct 2 19:53:15.007000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:53:15.007000 audit: BPF prog-id=13 op=LOAD Oct 2 19:53:15.008000 audit: BPF prog-id=14 op=LOAD Oct 2 19:53:15.008000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:53:15.008000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:53:15.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:15.059000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:53:15.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:15.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.368000 audit: BPF prog-id=15 op=LOAD Oct 2 19:53:16.369000 audit: BPF prog-id=16 op=LOAD Oct 2 19:53:16.369000 audit: BPF prog-id=17 op=LOAD Oct 2 19:53:16.369000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:53:16.369000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:53:16.392000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:53:16.392000 audit[1227]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdbdbf9400 a2=4000 a3=7ffdbdbf949c items=0 ppid=1 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:16.392000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:53:13.416165 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:53:15.007103 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:53:13.416562 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:53:15.009769 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:53:13.416574 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:53:13.416593 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:53:13.416600 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:53:13.416618 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:53:13.416625 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:53:13.416749 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:53:13.416774 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:53:13.416782 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:53:13.417647 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:53:13.417670 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:53:13.417681 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:53:13.417690 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:53:13.417700 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:53:13.417709 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:53:14.659130 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:53:14.659283 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:53:14.659343 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:53:14.659438 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:53:14.659469 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:53:14.659507 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2023-10-02T19:53:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:53:16.428540 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:53:16.451675 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:53:16.471522 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:53:16.504976 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:53:16.504997 systemd[1]: Stopped verity-setup.service. Oct 2 19:53:16.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.539527 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:53:16.553527 systemd[1]: Started systemd-journald.service. Oct 2 19:53:16.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.562012 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:53:16.569744 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:53:16.576737 systemd[1]: Mounted media.mount. Oct 2 19:53:16.583725 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:53:16.592718 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:53:16.601702 systemd[1]: Mounted tmp.mount. Oct 2 19:53:16.608805 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:53:16.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.617814 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:53:16.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.626835 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:53:16.626955 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:53:16.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.636950 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:53:16.637103 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:53:16.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.647129 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:53:16.647370 systemd[1]: Finished modprobe@drm.service. Oct 2 19:53:16.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.657285 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:53:16.657605 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:53:16.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.666285 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:53:16.666627 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:53:16.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.675335 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:53:16.675654 systemd[1]: Finished modprobe@loop.service. Oct 2 19:53:16.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.684337 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:53:16.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.693295 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:53:16.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.702294 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:53:16.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.711283 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:53:16.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.720767 systemd[1]: Reached target network-pre.target. Oct 2 19:53:16.731228 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:53:16.741200 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:53:16.749687 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:53:16.750642 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:53:16.759158 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:53:16.762849 systemd-journald[1227]: Time spent on flushing to /var/log/journal/232c8e1055854524975f2eb074906c8d is 14.583ms for 1560 entries. Oct 2 19:53:16.762849 systemd-journald[1227]: System Journal (/var/log/journal/232c8e1055854524975f2eb074906c8d) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:53:16.797047 systemd-journald[1227]: Received client request to flush runtime journal. Oct 2 19:53:16.776578 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:53:16.777152 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:53:16.786594 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:53:16.787103 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:53:16.794408 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:53:16.803075 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:53:16.811676 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:53:16.819645 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:53:16.827726 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:53:16.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.835723 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:53:16.849472 kernel: kauditd_printk_skb: 46 callbacks suppressed Oct 2 19:53:16.849545 kernel: audit: type=1130 audit(1696276396.834:130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.898698 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:53:16.941532 kernel: audit: type=1130 audit(1696276396.897:131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.948701 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:53:16.992548 kernel: audit: type=1130 audit(1696276396.947:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.001827 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:53:17.046583 kernel: audit: type=1130 audit(1696276396.999:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.053858 udevadm[1244]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:53:17.060817 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:53:17.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.115000 audit: BPF prog-id=18 op=LOAD Oct 2 19:53:17.137213 kernel: audit: type=1130 audit(1696276397.068:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.137237 kernel: audit: type=1334 audit(1696276397.115:135): prog-id=18 op=LOAD Oct 2 19:53:17.137249 kernel: audit: type=1334 audit(1696276397.135:136): prog-id=19 op=LOAD Oct 2 19:53:17.135000 audit: BPF prog-id=19 op=LOAD Oct 2 19:53:17.137202 systemd[1]: Starting systemd-udevd.service... Oct 2 19:53:17.156588 kernel: audit: type=1334 audit(1696276397.135:137): prog-id=7 op=UNLOAD Oct 2 19:53:17.156612 kernel: audit: type=1334 audit(1696276397.135:138): prog-id=8 op=UNLOAD Oct 2 19:53:17.135000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:53:17.135000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:53:17.205647 systemd-udevd[1245]: Using default interface naming scheme 'v252'. Oct 2 19:53:17.224613 systemd[1]: Started systemd-udevd.service. Oct 2 19:53:17.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.234698 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Oct 2 19:53:17.278000 audit: BPF prog-id=20 op=LOAD Oct 2 19:53:17.279484 kernel: audit: type=1130 audit(1696276397.231:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.279608 systemd[1]: Starting systemd-networkd.service... Oct 2 19:53:17.302000 audit: BPF prog-id=21 op=LOAD Oct 2 19:53:17.302000 audit: BPF prog-id=22 op=LOAD Oct 2 19:53:17.304488 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Oct 2 19:53:17.304527 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:53:17.322535 kernel: ACPI: button: Sleep Button [SLPB] Oct 2 19:53:17.363098 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1250) Oct 2 19:53:17.363139 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:53:17.382000 audit: BPF prog-id=23 op=LOAD Oct 2 19:53:17.384091 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:53:17.384486 kernel: IPMI message handler: version 39.2 Oct 2 19:53:17.403486 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:53:17.404372 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:53:17.288000 audit[1285]: AVC avc: denied { confidentiality } for pid=1285 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:53:17.288000 audit[1285]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56412be816b0 a1=4d8bc a2=7fa6dc62abc5 a3=5 items=40 ppid=1245 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:17.288000 audit: CWD cwd="/" Oct 2 19:53:17.288000 audit: PATH item=0 name=(null) inode=12449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=1 name=(null) inode=12450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=2 name=(null) inode=12449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=3 name=(null) inode=12451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=4 name=(null) inode=12449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=5 name=(null) inode=12452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=6 name=(null) inode=12452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=7 name=(null) inode=12453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=8 name=(null) inode=12452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=9 name=(null) inode=12454 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=10 name=(null) inode=12452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=11 name=(null) inode=12455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=12 name=(null) inode=12452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=13 name=(null) inode=12456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=14 name=(null) inode=12452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=15 name=(null) inode=12457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=16 name=(null) inode=12449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=17 name=(null) inode=12458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=18 name=(null) inode=12458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=19 name=(null) inode=12459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=20 name=(null) inode=12458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=21 name=(null) inode=12460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=22 name=(null) inode=12458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=23 name=(null) inode=12461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=24 name=(null) inode=12458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=25 name=(null) inode=12462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=26 name=(null) inode=12458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=27 name=(null) inode=12463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=28 name=(null) inode=12449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=29 name=(null) inode=12464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=30 name=(null) inode=12464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=31 name=(null) inode=12465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=32 name=(null) inode=12464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=33 name=(null) inode=12466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=34 name=(null) inode=12464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=35 name=(null) inode=12467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=36 name=(null) inode=12464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=37 name=(null) inode=12468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=38 name=(null) inode=12464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PATH item=39 name=(null) inode=12469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:53:17.288000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:53:17.442492 kernel: ipmi device interface Oct 2 19:53:17.466494 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Oct 2 19:53:17.487489 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Oct 2 19:53:17.489490 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Oct 2 19:53:17.489683 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Oct 2 19:53:17.489863 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Oct 2 19:53:17.551438 systemd[1]: Started systemd-userdbd.service. Oct 2 19:53:17.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.578485 kernel: iTCO_vendor_support: vendor-support=0 Oct 2 19:53:17.578512 kernel: ipmi_si: IPMI System Interface driver Oct 2 19:53:17.614518 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Oct 2 19:53:17.614618 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Oct 2 19:53:17.653151 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Oct 2 19:53:17.672065 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Oct 2 19:53:17.672170 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Oct 2 19:53:17.743879 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Oct 2 19:53:17.743993 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Oct 2 19:53:17.744052 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Oct 2 19:53:17.744121 kernel: ipmi_si: Adding ACPI-specified kcs state machine Oct 2 19:53:17.744133 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Oct 2 19:53:17.851803 systemd-networkd[1302]: bond0: netdev ready Oct 2 19:53:17.853900 systemd-networkd[1302]: lo: Link UP Oct 2 19:53:17.853902 systemd-networkd[1302]: lo: Gained carrier Oct 2 19:53:17.854361 systemd-networkd[1302]: Enumeration completed Oct 2 19:53:17.854450 systemd[1]: Started systemd-networkd.service. Oct 2 19:53:17.854646 systemd-networkd[1302]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Oct 2 19:53:17.858078 systemd-networkd[1302]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:b7:dd.network. Oct 2 19:53:17.865109 kernel: intel_rapl_common: Found RAPL domain package Oct 2 19:53:17.865163 kernel: intel_rapl_common: Found RAPL domain core Oct 2 19:53:17.865177 kernel: intel_rapl_common: Found RAPL domain dram Oct 2 19:53:17.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.944516 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Oct 2 19:53:17.995530 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Oct 2 19:53:18.081517 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Oct 2 19:53:18.102485 kernel: ipmi_ssif: IPMI SSIF Interface driver Oct 2 19:53:18.106938 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:53:18.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.116388 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:53:18.135067 lvm[1348]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:53:18.167881 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:53:18.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.175614 systemd[1]: Reached target cryptsetup.target. Oct 2 19:53:18.184157 systemd[1]: Starting lvm2-activation.service... Oct 2 19:53:18.186327 lvm[1350]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:53:18.215960 systemd[1]: Finished lvm2-activation.service. Oct 2 19:53:18.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.224602 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:53:18.232559 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:53:18.232573 systemd[1]: Reached target local-fs.target. Oct 2 19:53:18.240562 systemd[1]: Reached target machines.target. Oct 2 19:53:18.249143 systemd[1]: Starting ldconfig.service... Oct 2 19:53:18.255960 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:53:18.255982 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:53:18.256498 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:53:18.263989 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:53:18.274061 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:53:18.274159 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:53:18.274193 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:53:18.274717 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:53:18.274954 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1352 (bootctl) Oct 2 19:53:18.275527 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:53:18.294847 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:53:18.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.368549 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 19:53:18.401544 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Oct 2 19:53:18.402506 systemd-networkd[1302]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:b7:dc.network. Oct 2 19:53:18.497642 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 19:53:18.497755 systemd-tmpfiles[1356]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:53:18.579534 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Oct 2 19:53:18.605486 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Oct 2 19:53:18.605568 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 19:53:18.605582 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Oct 2 19:53:18.625117 systemd-tmpfiles[1356]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:53:18.646384 systemd-networkd[1302]: bond0: Link UP Oct 2 19:53:18.646617 systemd-networkd[1302]: enp1s0f1np1: Link UP Oct 2 19:53:18.646727 systemd-networkd[1302]: enp1s0f1np1: Gained carrier Oct 2 19:53:18.647686 systemd-networkd[1302]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:b7:dc.network. Oct 2 19:53:18.688247 systemd-tmpfiles[1356]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:53:18.702484 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.704094 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:53:18.704418 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:53:18.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.724094 systemd-fsck[1360]: fsck.fat 4.2 (2021-01-31) Oct 2 19:53:18.724094 systemd-fsck[1360]: /dev/sdb1: 789 files, 115069/258078 clusters Oct 2 19:53:18.724484 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.724736 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:53:18.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.744483 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.744546 systemd[1]: Mounting boot.mount... Oct 2 19:53:18.759555 systemd[1]: Mounted boot.mount. Oct 2 19:53:18.765482 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.785484 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.793123 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:53:18.804482 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.819802 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:53:18.825483 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:18.841390 systemd[1]: Starting audit-rules.service... Oct 2 19:53:18.844486 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.860094 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:53:18.859000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:53:18.859000 audit[1379]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd71a33560 a2=420 a3=0 items=0 ppid=1364 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:18.859000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:53:18.861249 augenrules[1379]: No rules Oct 2 19:53:18.862482 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.878117 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:53:18.882483 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.902419 systemd[1]: Starting systemd-resolved.service... Oct 2 19:53:18.902492 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.921356 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:53:18.921482 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.936047 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:53:18.940483 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.948757 ldconfig[1351]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:53:18.953816 systemd[1]: Finished ldconfig.service. Oct 2 19:53:18.959482 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.960075 systemd-networkd[1302]: enp1s0f0np0: Link UP Oct 2 19:53:18.960230 systemd-networkd[1302]: bond0: Gained carrier Oct 2 19:53:18.960314 systemd-networkd[1302]: enp1s0f0np0: Gained carrier Oct 2 19:53:18.972685 systemd[1]: Finished audit-rules.service. Oct 2 19:53:18.977483 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Oct 2 19:53:18.977513 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Oct 2 19:53:18.977528 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 19:53:19.008663 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:53:19.027381 systemd-networkd[1302]: enp1s0f1np1: Link DOWN Oct 2 19:53:19.027383 systemd-networkd[1302]: enp1s0f1np1: Lost carrier Oct 2 19:53:19.027482 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Oct 2 19:53:19.027501 kernel: bond0: active interface up! Oct 2 19:53:19.047673 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:53:19.059540 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:53:19.068200 systemd[1]: Starting systemd-update-done.service... Oct 2 19:53:19.074637 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:53:19.074803 systemd[1]: Finished systemd-update-done.service. Oct 2 19:53:19.086840 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:53:19.088897 systemd-resolved[1386]: Positive Trust Anchors: Oct 2 19:53:19.088922 systemd-resolved[1386]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:53:19.088957 systemd-resolved[1386]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:53:19.092761 systemd-resolved[1386]: Using system hostname 'ci-3510.3.0-a-10f7e2f476'. Oct 2 19:53:19.095629 systemd[1]: Reached target time-set.target. Oct 2 19:53:19.200484 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 19:53:19.202851 systemd-networkd[1302]: enp1s0f1np1: Link UP Oct 2 19:53:19.204579 systemd-networkd[1302]: enp1s0f1np1: Gained carrier Oct 2 19:53:19.205361 systemd[1]: Started systemd-resolved.service. Oct 2 19:53:19.214536 systemd[1]: Reached target network.target. Oct 2 19:53:19.223508 systemd[1]: Reached target nss-lookup.target. Oct 2 19:53:19.232511 systemd[1]: Reached target sysinit.target. Oct 2 19:53:19.247618 systemd[1]: Started motdgen.path. Oct 2 19:53:19.253486 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Oct 2 19:53:19.253513 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Oct 2 19:53:19.275537 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:53:19.287070 systemd[1]: Started logrotate.timer. Oct 2 19:53:19.294576 systemd[1]: Started mdadm.timer. Oct 2 19:53:19.302520 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:53:19.310510 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:53:19.310524 systemd[1]: Reached target paths.target. Oct 2 19:53:19.318508 systemd[1]: Reached target timers.target. Oct 2 19:53:19.326640 systemd[1]: Listening on dbus.socket. Oct 2 19:53:19.335085 systemd[1]: Starting docker.socket... Oct 2 19:53:19.343880 systemd[1]: Listening on sshd.socket. Oct 2 19:53:19.350624 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:53:19.350840 systemd[1]: Listening on docker.socket. Oct 2 19:53:19.358565 systemd[1]: Reached target sockets.target. Oct 2 19:53:19.366535 systemd[1]: Reached target basic.target. Oct 2 19:53:19.373532 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:53:19.373545 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:53:19.373996 systemd[1]: Starting containerd.service... Oct 2 19:53:19.380908 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:53:19.389000 systemd[1]: Starting coreos-metadata.service... Oct 2 19:53:19.396053 systemd[1]: Starting dbus.service... Oct 2 19:53:19.402091 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:53:19.407713 jq[1403]: false Oct 2 19:53:19.409172 systemd[1]: Starting extend-filesystems.service... Oct 2 19:53:19.411160 coreos-metadata[1396]: Oct 02 19:53:19.411 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:53:19.415555 dbus-daemon[1402]: [system] SELinux support is enabled Oct 2 19:53:19.415558 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:53:19.416273 systemd[1]: Starting motdgen.service... Oct 2 19:53:19.417680 extend-filesystems[1404]: Found sda Oct 2 19:53:19.417680 extend-filesystems[1404]: Found sdb Oct 2 19:53:19.417680 extend-filesystems[1404]: Found sdb1 Oct 2 19:53:19.417680 extend-filesystems[1404]: Found sdb2 Oct 2 19:53:19.489524 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Oct 2 19:53:19.489544 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Oct 2 19:53:19.489557 extend-filesystems[1404]: Found sdb3 Oct 2 19:53:19.489557 extend-filesystems[1404]: Found usr Oct 2 19:53:19.489557 extend-filesystems[1404]: Found sdb4 Oct 2 19:53:19.489557 extend-filesystems[1404]: Found sdb6 Oct 2 19:53:19.489557 extend-filesystems[1404]: Found sdb7 Oct 2 19:53:19.489557 extend-filesystems[1404]: Found sdb9 Oct 2 19:53:19.489557 extend-filesystems[1404]: Checking size of /dev/sdb9 Oct 2 19:53:19.489557 extend-filesystems[1404]: Resized partition /dev/sdb9 Oct 2 19:53:19.567607 coreos-metadata[1399]: Oct 02 19:53:19.421 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:53:19.423139 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:53:19.567794 extend-filesystems[1420]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:53:19.456300 systemd[1]: Starting prepare-critools.service... Oct 2 19:53:19.478213 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:53:19.497094 systemd[1]: Starting sshd-keygen.service... Oct 2 19:53:19.516955 systemd[1]: Starting systemd-logind.service... Oct 2 19:53:19.533556 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:53:19.534130 systemd[1]: Starting tcsd.service... Oct 2 19:53:19.538042 systemd-logind[1432]: Watching system buttons on /dev/input/event3 (Power Button) Oct 2 19:53:19.583149 jq[1435]: true Oct 2 19:53:19.538051 systemd-logind[1432]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:53:19.538061 systemd-logind[1432]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Oct 2 19:53:19.538154 systemd-logind[1432]: New seat seat0. Oct 2 19:53:19.559834 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:53:19.560217 systemd[1]: Starting update-engine.service... Oct 2 19:53:19.575191 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:53:19.590826 systemd[1]: Started dbus.service. Oct 2 19:53:19.599323 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:53:19.599414 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:53:19.599583 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:53:19.599658 systemd[1]: Finished motdgen.service. Oct 2 19:53:19.607230 update_engine[1434]: I1002 19:53:19.606787 1434 main.cc:92] Flatcar Update Engine starting Oct 2 19:53:19.607333 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:53:19.607412 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:53:19.610528 update_engine[1434]: I1002 19:53:19.610519 1434 update_check_scheduler.cc:74] Next update check in 11m34s Oct 2 19:53:19.612716 tar[1437]: ./ Oct 2 19:53:19.612716 tar[1437]: ./macvlan Oct 2 19:53:19.618254 jq[1441]: true Oct 2 19:53:19.618809 dbus-daemon[1402]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:53:19.619883 tar[1438]: crictl Oct 2 19:53:19.623856 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Oct 2 19:53:19.623999 systemd[1]: Condition check resulted in tcsd.service being skipped. Oct 2 19:53:19.626116 systemd[1]: Started systemd-logind.service. Oct 2 19:53:19.628192 env[1442]: time="2023-10-02T19:53:19.628170019Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:53:19.633138 tar[1437]: ./static Oct 2 19:53:19.636453 env[1442]: time="2023-10-02T19:53:19.636436544Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:53:19.636552 systemd[1]: Started update-engine.service. Oct 2 19:53:19.636890 env[1442]: time="2023-10-02T19:53:19.636881663Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:53:19.637552 env[1442]: time="2023-10-02T19:53:19.637506353Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:53:19.637552 env[1442]: time="2023-10-02T19:53:19.637522923Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639186 env[1442]: time="2023-10-02T19:53:19.639144137Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639186 env[1442]: time="2023-10-02T19:53:19.639157198Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639186 env[1442]: time="2023-10-02T19:53:19.639166032Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:53:19.639186 env[1442]: time="2023-10-02T19:53:19.639171668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639266 env[1442]: time="2023-10-02T19:53:19.639212302Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639347 env[1442]: time="2023-10-02T19:53:19.639339536Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639411 env[1442]: time="2023-10-02T19:53:19.639402138Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:53:19.639429 env[1442]: time="2023-10-02T19:53:19.639411530Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:53:19.641261 env[1442]: time="2023-10-02T19:53:19.641249413Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:53:19.641261 env[1442]: time="2023-10-02T19:53:19.641261392Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:53:19.647543 systemd[1]: Started locksmithd.service. Oct 2 19:53:19.649730 bash[1470]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:53:19.652618 env[1442]: time="2023-10-02T19:53:19.652603220Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:53:19.652658 env[1442]: time="2023-10-02T19:53:19.652623928Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:53:19.652658 env[1442]: time="2023-10-02T19:53:19.652632209Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:53:19.652658 env[1442]: time="2023-10-02T19:53:19.652650021Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652658408Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652666082Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652672564Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652684239Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652692520Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652699989Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652707764Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652719 env[1442]: time="2023-10-02T19:53:19.652714466Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:53:19.652871 env[1442]: time="2023-10-02T19:53:19.652763722Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:53:19.652871 env[1442]: time="2023-10-02T19:53:19.652807707Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:53:19.652957 env[1442]: time="2023-10-02T19:53:19.652948128Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:53:19.652982 env[1442]: time="2023-10-02T19:53:19.652963591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.652982 env[1442]: time="2023-10-02T19:53:19.652971249Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:53:19.653016 env[1442]: time="2023-10-02T19:53:19.652996001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653016 env[1442]: time="2023-10-02T19:53:19.653003298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653016 env[1442]: time="2023-10-02T19:53:19.653009828Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653016 env[1442]: time="2023-10-02T19:53:19.653015491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653081 env[1442]: time="2023-10-02T19:53:19.653021993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653081 env[1442]: time="2023-10-02T19:53:19.653028597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653081 env[1442]: time="2023-10-02T19:53:19.653034616Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653081 env[1442]: time="2023-10-02T19:53:19.653040327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653081 env[1442]: time="2023-10-02T19:53:19.653048026Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653105354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653116234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653122939Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653128823Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653136401Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653142665Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653152591Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:53:19.653178 env[1442]: time="2023-10-02T19:53:19.653173300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:53:19.653326 env[1442]: time="2023-10-02T19:53:19.653283396Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:53:19.653326 env[1442]: time="2023-10-02T19:53:19.653315105Z" level=info msg="Connect containerd service" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653333418Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653623311Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653707933Z" level=info msg="Start subscribing containerd event" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653737641Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653740243Z" level=info msg="Start recovering state" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653758909Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653777942Z" level=info msg="Start event monitor" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653784472Z" level=info msg="containerd successfully booted in 0.025954s" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653785672Z" level=info msg="Start snapshots syncer" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653795661Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:53:19.656114 env[1442]: time="2023-10-02T19:53:19.653801067Z" level=info msg="Start streaming server" Oct 2 19:53:19.654650 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:53:19.654773 systemd[1]: Reached target system-config.target. Oct 2 19:53:19.657560 tar[1437]: ./vlan Oct 2 19:53:19.662617 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:53:19.662692 systemd[1]: Reached target user-config.target. Oct 2 19:53:19.672025 systemd[1]: Started containerd.service. Oct 2 19:53:19.677891 tar[1437]: ./portmap Oct 2 19:53:19.678744 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:53:19.696983 tar[1437]: ./host-local Oct 2 19:53:19.713733 tar[1437]: ./vrf Oct 2 19:53:19.722734 locksmithd[1479]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:53:19.731865 tar[1437]: ./bridge Oct 2 19:53:19.753524 tar[1437]: ./tuning Oct 2 19:53:19.770807 tar[1437]: ./firewall Oct 2 19:53:19.793201 tar[1437]: ./host-device Oct 2 19:53:19.812722 tar[1437]: ./sbr Oct 2 19:53:19.830615 tar[1437]: ./loopback Oct 2 19:53:19.847541 tar[1437]: ./dhcp Oct 2 19:53:19.866533 sshd_keygen[1431]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:53:19.874411 systemd[1]: Finished prepare-critools.service. Oct 2 19:53:19.882747 systemd[1]: Finished sshd-keygen.service. Oct 2 19:53:19.890364 systemd[1]: Starting issuegen.service... Oct 2 19:53:19.896725 tar[1437]: ./ptp Oct 2 19:53:19.897762 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:53:19.897842 systemd[1]: Finished issuegen.service. Oct 2 19:53:19.906347 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:53:19.914745 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:53:19.917827 tar[1437]: ./ipvlan Oct 2 19:53:19.930625 systemd[1]: Started getty@tty1.service. Oct 2 19:53:19.931545 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Oct 2 19:53:19.939373 systemd[1]: Started serial-getty@ttyS1.service. Oct 2 19:53:19.947673 systemd[1]: Reached target getty.target. Oct 2 19:53:19.959214 extend-filesystems[1420]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Oct 2 19:53:19.959214 extend-filesystems[1420]: old_desc_blocks = 1, new_desc_blocks = 56 Oct 2 19:53:19.959214 extend-filesystems[1420]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Oct 2 19:53:19.997528 extend-filesystems[1404]: Resized filesystem in /dev/sdb9 Oct 2 19:53:19.959606 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:53:19.997624 tar[1437]: ./bandwidth Oct 2 19:53:19.959690 systemd[1]: Finished extend-filesystems.service. Oct 2 19:53:19.991471 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:53:20.235561 systemd-networkd[1302]: bond0: Gained IPv6LL Oct 2 19:53:21.312534 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Oct 2 19:53:24.665116 coreos-metadata[1399]: Oct 02 19:53:24.665 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:53:24.665295 coreos-metadata[1396]: Oct 02 19:53:24.665 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:53:25.064334 login[1500]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 19:53:25.065370 login[1499]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:53:25.092778 systemd-logind[1432]: New session 1 of user core. Oct 2 19:53:25.095088 systemd[1]: Created slice user-500.slice. Oct 2 19:53:25.097807 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:53:25.109759 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:53:25.110440 systemd[1]: Starting user@500.service... Oct 2 19:53:25.120416 (systemd)[1507]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:25.267850 systemd[1507]: Queued start job for default target default.target. Oct 2 19:53:25.268081 systemd[1507]: Reached target paths.target. Oct 2 19:53:25.268093 systemd[1507]: Reached target sockets.target. Oct 2 19:53:25.268100 systemd[1507]: Reached target timers.target. Oct 2 19:53:25.268107 systemd[1507]: Reached target basic.target. Oct 2 19:53:25.268142 systemd[1507]: Reached target default.target. Oct 2 19:53:25.268156 systemd[1507]: Startup finished in 131ms. Oct 2 19:53:25.268204 systemd[1]: Started user@500.service. Oct 2 19:53:25.268843 systemd[1]: Started session-1.scope. Oct 2 19:53:25.665642 coreos-metadata[1399]: Oct 02 19:53:25.665 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Oct 2 19:53:25.666374 coreos-metadata[1396]: Oct 02 19:53:25.665 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Oct 2 19:53:25.669999 coreos-metadata[1399]: Oct 02 19:53:25.669 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:53:25.673235 coreos-metadata[1396]: Oct 02 19:53:25.673 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:53:26.069747 login[1500]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:53:26.072368 systemd-logind[1432]: New session 2 of user core. Oct 2 19:53:26.072803 systemd[1]: Started session-2.scope. Oct 2 19:53:26.866525 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Oct 2 19:53:26.866687 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Oct 2 19:53:27.489601 systemd[1]: Created slice system-sshd.slice. Oct 2 19:53:27.490198 systemd[1]: Started sshd@0-139.178.89.111:22-139.178.89.65:54852.service. Oct 2 19:53:27.537406 sshd[1528]: Accepted publickey for core from 139.178.89.65 port 54852 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:27.538294 sshd[1528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:27.541372 systemd-logind[1432]: New session 3 of user core. Oct 2 19:53:27.542177 systemd[1]: Started session-3.scope. Oct 2 19:53:27.597687 systemd[1]: Started sshd@1-139.178.89.111:22-139.178.89.65:54868.service. Oct 2 19:53:27.624349 sshd[1533]: Accepted publickey for core from 139.178.89.65 port 54868 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:27.625063 sshd[1533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:27.627382 systemd-logind[1432]: New session 4 of user core. Oct 2 19:53:27.627907 systemd[1]: Started session-4.scope. Oct 2 19:53:27.670385 coreos-metadata[1399]: Oct 02 19:53:27.670 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Oct 2 19:53:27.673432 coreos-metadata[1396]: Oct 02 19:53:27.673 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Oct 2 19:53:27.680341 sshd[1533]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:27.681820 systemd[1]: sshd@1-139.178.89.111:22-139.178.89.65:54868.service: Deactivated successfully. Oct 2 19:53:27.682126 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:53:27.682389 systemd-logind[1432]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:53:27.682894 systemd[1]: Started sshd@2-139.178.89.111:22-139.178.89.65:54880.service. Oct 2 19:53:27.683288 systemd-logind[1432]: Removed session 4. Oct 2 19:53:27.710804 sshd[1539]: Accepted publickey for core from 139.178.89.65 port 54880 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:27.711984 sshd[1539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:27.713150 coreos-metadata[1399]: Oct 02 19:53:27.713 INFO Fetch successful Oct 2 19:53:27.713212 coreos-metadata[1396]: Oct 02 19:53:27.713 INFO Fetch successful Oct 2 19:53:27.715400 systemd-logind[1432]: New session 5 of user core. Oct 2 19:53:27.716149 systemd[1]: Started session-5.scope. Oct 2 19:53:27.748917 systemd[1]: Finished coreos-metadata.service. Oct 2 19:53:27.749660 unknown[1396]: wrote ssh authorized keys file for user: core Oct 2 19:53:27.750016 systemd[1]: Started packet-phone-home.service. Oct 2 19:53:27.755990 curl[1544]: % Total % Received % Xferd Average Speed Time Time Time Current Oct 2 19:53:27.756182 curl[1544]: Dload Upload Total Spent Left Speed Oct 2 19:53:27.761319 update-ssh-keys[1545]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:53:27.761708 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:53:27.761942 systemd[1]: Reached target multi-user.target. Oct 2 19:53:27.762825 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:53:27.767632 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:53:27.767728 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:53:27.767861 sshd[1539]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:27.767875 systemd[1]: Startup finished in 1.847s (kernel) + 18.691s (initrd) + 15.243s (userspace) = 35.783s. Oct 2 19:53:27.769288 systemd[1]: sshd@2-139.178.89.111:22-139.178.89.65:54880.service: Deactivated successfully. Oct 2 19:53:27.769693 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:53:27.770130 systemd-logind[1432]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:53:27.770723 systemd-logind[1432]: Removed session 5. Oct 2 19:53:27.920805 curl[1544]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Oct 2 19:53:27.923194 systemd[1]: packet-phone-home.service: Deactivated successfully. Oct 2 19:53:37.777562 systemd[1]: Started sshd@3-139.178.89.111:22-139.178.89.65:55968.service. Oct 2 19:53:37.806612 sshd[1550]: Accepted publickey for core from 139.178.89.65 port 55968 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:37.807475 sshd[1550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:37.810461 systemd-logind[1432]: New session 6 of user core. Oct 2 19:53:37.811083 systemd[1]: Started session-6.scope. Oct 2 19:53:37.865789 sshd[1550]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:37.867154 systemd[1]: sshd@3-139.178.89.111:22-139.178.89.65:55968.service: Deactivated successfully. Oct 2 19:53:37.867446 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:53:37.867784 systemd-logind[1432]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:53:37.868248 systemd[1]: Started sshd@4-139.178.89.111:22-139.178.89.65:55970.service. Oct 2 19:53:37.868657 systemd-logind[1432]: Removed session 6. Oct 2 19:53:37.898182 sshd[1556]: Accepted publickey for core from 139.178.89.65 port 55970 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:37.899117 sshd[1556]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:37.902256 systemd-logind[1432]: New session 7 of user core. Oct 2 19:53:37.902865 systemd[1]: Started session-7.scope. Oct 2 19:53:37.955143 sshd[1556]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:37.956695 systemd[1]: sshd@4-139.178.89.111:22-139.178.89.65:55970.service: Deactivated successfully. Oct 2 19:53:37.957007 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:53:37.957307 systemd-logind[1432]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:53:37.957836 systemd[1]: Started sshd@5-139.178.89.111:22-139.178.89.65:55986.service. Oct 2 19:53:37.958278 systemd-logind[1432]: Removed session 7. Oct 2 19:53:37.987774 sshd[1563]: Accepted publickey for core from 139.178.89.65 port 55986 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:37.988710 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:37.991980 systemd-logind[1432]: New session 8 of user core. Oct 2 19:53:37.992629 systemd[1]: Started session-8.scope. Oct 2 19:53:38.057348 sshd[1563]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:38.063704 systemd[1]: sshd@5-139.178.89.111:22-139.178.89.65:55986.service: Deactivated successfully. Oct 2 19:53:38.063987 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:53:38.064300 systemd-logind[1432]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:53:38.064732 systemd[1]: Started sshd@6-139.178.89.111:22-139.178.89.65:56000.service. Oct 2 19:53:38.065045 systemd-logind[1432]: Removed session 8. Oct 2 19:53:38.093802 sshd[1569]: Accepted publickey for core from 139.178.89.65 port 56000 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:38.094664 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:38.097737 systemd-logind[1432]: New session 9 of user core. Oct 2 19:53:38.098353 systemd[1]: Started session-9.scope. Oct 2 19:53:38.183315 sudo[1572]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:53:38.183924 sudo[1572]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:53:38.205922 dbus-daemon[1402]: \xd0\u001dg\xda\xefU: received setenforce notice (enforcing=142007776) Oct 2 19:53:38.210816 sudo[1572]: pam_unix(sudo:session): session closed for user root Oct 2 19:53:38.216298 sshd[1569]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:38.223097 systemd[1]: sshd@6-139.178.89.111:22-139.178.89.65:56000.service: Deactivated successfully. Oct 2 19:53:38.224719 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:53:38.226494 systemd-logind[1432]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:53:38.229048 systemd[1]: Started sshd@7-139.178.89.111:22-139.178.89.65:56004.service. Oct 2 19:53:38.231349 systemd-logind[1432]: Removed session 9. Oct 2 19:53:38.317912 sshd[1576]: Accepted publickey for core from 139.178.89.65 port 56004 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:38.319054 sshd[1576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:38.322941 systemd-logind[1432]: New session 10 of user core. Oct 2 19:53:38.323753 systemd[1]: Started session-10.scope. Oct 2 19:53:38.387022 sudo[1580]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:53:38.387625 sudo[1580]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:53:38.394751 sudo[1580]: pam_unix(sudo:session): session closed for user root Oct 2 19:53:38.407004 sudo[1579]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:53:38.407587 sudo[1579]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:53:38.420861 systemd[1]: Stopping audit-rules.service... Oct 2 19:53:38.419000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:53:38.421544 auditctl[1583]: No rules Oct 2 19:53:38.421638 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:53:38.421719 systemd[1]: Stopped audit-rules.service. Oct 2 19:53:38.422444 systemd[1]: Starting audit-rules.service... Oct 2 19:53:38.426919 kernel: kauditd_printk_skb: 61 callbacks suppressed Oct 2 19:53:38.426967 kernel: audit: type=1305 audit(1696276418.419:156): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:53:38.432144 augenrules[1600]: No rules Oct 2 19:53:38.432452 systemd[1]: Finished audit-rules.service. Oct 2 19:53:38.432883 sudo[1579]: pam_unix(sudo:session): session closed for user root Oct 2 19:53:38.433675 sshd[1576]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:38.436018 systemd[1]: sshd@7-139.178.89.111:22-139.178.89.65:56004.service: Deactivated successfully. Oct 2 19:53:38.436554 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:53:38.437136 systemd-logind[1432]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:53:38.438140 systemd[1]: Started sshd@8-139.178.89.111:22-139.178.89.65:56016.service. Oct 2 19:53:38.438928 systemd-logind[1432]: Removed session 10. Oct 2 19:53:38.419000 audit[1583]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7891ad90 a2=420 a3=0 items=0 ppid=1 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:38.473497 kernel: audit: type=1300 audit(1696276418.419:156): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7891ad90 a2=420 a3=0 items=0 ppid=1 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:38.473548 kernel: audit: type=1327 audit(1696276418.419:156): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:53:38.419000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:53:38.483063 kernel: audit: type=1131 audit(1696276418.420:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.505504 kernel: audit: type=1130 audit(1696276418.431:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.431000 audit[1579]: USER_END pid=1579 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.528061 sshd[1606]: Accepted publickey for core from 139.178.89.65 port 56016 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:38.529278 sshd[1606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:38.531677 systemd-logind[1432]: New session 11 of user core. Oct 2 19:53:38.532570 systemd[1]: Started session-11.scope. Oct 2 19:53:38.554082 kernel: audit: type=1106 audit(1696276418.431:159): pid=1579 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.554106 kernel: audit: type=1104 audit(1696276418.431:160): pid=1579 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.431000 audit[1579]: CRED_DISP pid=1579 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.577706 kernel: audit: type=1106 audit(1696276418.432:161): pid=1576 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.432000 audit[1576]: USER_END pid=1576 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.579431 sudo[1609]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:53:38.579544 sudo[1609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:53:38.609826 kernel: audit: type=1104 audit(1696276418.432:162): pid=1576 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.432000 audit[1576]: CRED_DISP pid=1576 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.635712 kernel: audit: type=1131 audit(1696276418.434:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.111:22-139.178.89.65:56004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.111:22-139.178.89.65:56004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.111:22-139.178.89.65:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.526000 audit[1606]: USER_ACCT pid=1606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.527000 audit[1606]: CRED_ACQ pid=1606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.527000 audit[1606]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1e5be130 a2=3 a3=0 items=0 ppid=1 pid=1606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:38.527000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:53:38.533000 audit[1606]: USER_START pid=1606 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.533000 audit[1608]: CRED_ACQ pid=1608 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:38.577000 audit[1609]: USER_ACCT pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.577000 audit[1609]: CRED_REFR pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:38.579000 audit[1609]: USER_START pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:39.118285 systemd[1]: Reloading. Oct 2 19:53:39.157280 /usr/lib/systemd/system-generators/torcx-generator[1641]: time="2023-10-02T19:53:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:53:39.157297 /usr/lib/systemd/system-generators/torcx-generator[1641]: time="2023-10-02T19:53:39Z" level=info msg="torcx already run" Oct 2 19:53:39.213495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:53:39.213506 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:53:39.226573 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit: BPF prog-id=31 op=LOAD Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit: BPF prog-id=32 op=LOAD Oct 2 19:53:39.269000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:53:39.269000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.269000 audit: BPF prog-id=33 op=LOAD Oct 2 19:53:39.269000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.270000 audit: BPF prog-id=34 op=LOAD Oct 2 19:53:39.271000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit: BPF prog-id=35 op=LOAD Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit: BPF prog-id=36 op=LOAD Oct 2 19:53:39.271000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:53:39.271000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit: BPF prog-id=37 op=LOAD Oct 2 19:53:39.272000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit: BPF prog-id=38 op=LOAD Oct 2 19:53:39.272000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit: BPF prog-id=39 op=LOAD Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.273000 audit: BPF prog-id=40 op=LOAD Oct 2 19:53:39.273000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:53:39.273000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit: BPF prog-id=41 op=LOAD Oct 2 19:53:39.274000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit: BPF prog-id=42 op=LOAD Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit: BPF prog-id=43 op=LOAD Oct 2 19:53:39.274000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:53:39.274000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit: BPF prog-id=44 op=LOAD Oct 2 19:53:39.275000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:39.275000 audit: BPF prog-id=45 op=LOAD Oct 2 19:53:39.275000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:53:39.280437 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:53:39.284568 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:53:39.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:39.284804 systemd[1]: Reached target network-online.target. Oct 2 19:53:39.285466 systemd[1]: Started kubelet.service. Oct 2 19:53:39.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:39.309795 kubelet[1699]: E1002 19:53:39.309572 1699 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:53:39.311269 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:53:39.311335 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:53:39.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:53:39.858762 systemd[1]: Stopped kubelet.service. Oct 2 19:53:39.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:39.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:39.896703 systemd[1]: Reloading. Oct 2 19:53:39.955349 /usr/lib/systemd/system-generators/torcx-generator[1806]: time="2023-10-02T19:53:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:53:39.955373 /usr/lib/systemd/system-generators/torcx-generator[1806]: time="2023-10-02T19:53:39Z" level=info msg="torcx already run" Oct 2 19:53:40.006454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:53:40.006462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:53:40.018391 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:53:40.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit: BPF prog-id=46 op=LOAD Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit: BPF prog-id=47 op=LOAD Oct 2 19:53:40.061000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:53:40.061000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.062000 audit: BPF prog-id=48 op=LOAD Oct 2 19:53:40.062000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit: BPF prog-id=49 op=LOAD Oct 2 19:53:40.063000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit: BPF prog-id=50 op=LOAD Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.063000 audit: BPF prog-id=51 op=LOAD Oct 2 19:53:40.063000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:53:40.063000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.064000 audit: BPF prog-id=52 op=LOAD Oct 2 19:53:40.064000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit: BPF prog-id=53 op=LOAD Oct 2 19:53:40.065000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit: BPF prog-id=54 op=LOAD Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.065000 audit: BPF prog-id=55 op=LOAD Oct 2 19:53:40.065000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:53:40.065000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.066000 audit: BPF prog-id=56 op=LOAD Oct 2 19:53:40.067000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit: BPF prog-id=57 op=LOAD Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit: BPF prog-id=58 op=LOAD Oct 2 19:53:40.067000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:53:40.067000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.067000 audit: BPF prog-id=59 op=LOAD Oct 2 19:53:40.067000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.068000 audit: BPF prog-id=60 op=LOAD Oct 2 19:53:40.068000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:53:40.075835 systemd[1]: Started kubelet.service. Oct 2 19:53:40.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:40.098222 kubelet[1864]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:53:40.098222 kubelet[1864]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:53:40.098222 kubelet[1864]: I1002 19:53:40.098215 1864 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:53:40.098990 kubelet[1864]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:53:40.098990 kubelet[1864]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:53:40.391659 kubelet[1864]: I1002 19:53:40.391621 1864 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:53:40.391659 kubelet[1864]: I1002 19:53:40.391632 1864 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:53:40.391781 kubelet[1864]: I1002 19:53:40.391742 1864 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:53:40.392682 kubelet[1864]: I1002 19:53:40.392651 1864 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:53:40.411674 kubelet[1864]: I1002 19:53:40.411638 1864 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:53:40.411810 kubelet[1864]: I1002 19:53:40.411765 1864 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:53:40.411810 kubelet[1864]: I1002 19:53:40.411798 1864 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:53:40.411810 kubelet[1864]: I1002 19:53:40.411808 1864 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:53:40.411911 kubelet[1864]: I1002 19:53:40.411814 1864 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:53:40.411911 kubelet[1864]: I1002 19:53:40.411859 1864 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:53:40.413442 kubelet[1864]: I1002 19:53:40.413434 1864 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:53:40.413473 kubelet[1864]: I1002 19:53:40.413444 1864 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:53:40.413473 kubelet[1864]: I1002 19:53:40.413457 1864 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:53:40.413473 kubelet[1864]: I1002 19:53:40.413464 1864 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:53:40.413562 kubelet[1864]: E1002 19:53:40.413540 1864 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:40.413603 kubelet[1864]: E1002 19:53:40.413564 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:40.413888 kubelet[1864]: I1002 19:53:40.413883 1864 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:53:40.414027 kubelet[1864]: W1002 19:53:40.414021 1864 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:53:40.414227 kubelet[1864]: I1002 19:53:40.414221 1864 server.go:1186] "Started kubelet" Oct 2 19:53:40.414269 kubelet[1864]: I1002 19:53:40.414261 1864 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:53:40.414431 kubelet[1864]: E1002 19:53:40.414420 1864 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:53:40.414431 kubelet[1864]: E1002 19:53:40.414431 1864 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:53:40.414899 kubelet[1864]: I1002 19:53:40.414891 1864 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:53:40.413000 audit[1864]: AVC avc: denied { mac_admin } for pid=1864 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.413000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:53:40.413000 audit[1864]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003177a0 a1=c0011980a8 a2=c000317770 a3=25 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.413000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:53:40.413000 audit[1864]: AVC avc: denied { mac_admin } for pid=1864 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.413000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:53:40.413000 audit[1864]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000611940 a1=c0011980c0 a2=c000317830 a3=25 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.413000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:53:40.415290 kubelet[1864]: I1002 19:53:40.414987 1864 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:53:40.415290 kubelet[1864]: I1002 19:53:40.415044 1864 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:53:40.415290 kubelet[1864]: I1002 19:53:40.415111 1864 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:53:40.415290 kubelet[1864]: I1002 19:53:40.415155 1864 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:53:40.415290 kubelet[1864]: E1002 19:53:40.415158 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:40.415290 kubelet[1864]: I1002 19:53:40.415173 1864 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:53:40.424864 kubelet[1864]: I1002 19:53:40.424826 1864 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:53:40.424864 kubelet[1864]: I1002 19:53:40.424856 1864 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:53:40.424864 kubelet[1864]: I1002 19:53:40.424865 1864 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:53:40.425852 kubelet[1864]: I1002 19:53:40.425822 1864 policy_none.go:49] "None policy: Start" Oct 2 19:53:40.426237 kubelet[1864]: I1002 19:53:40.426197 1864 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:53:40.426237 kubelet[1864]: I1002 19:53:40.426223 1864 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:53:40.426690 kubelet[1864]: W1002 19:53:40.426639 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:40.426690 kubelet[1864]: E1002 19:53:40.426664 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:40.427039 kubelet[1864]: W1002 19:53:40.427021 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:53:40.427039 kubelet[1864]: E1002 19:53:40.427032 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:53:40.427107 kubelet[1864]: W1002 19:53:40.427050 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:40.427107 kubelet[1864]: E1002 19:53:40.427061 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:40.427107 kubelet[1864]: E1002 19:53:40.427081 1864 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.67.124.189" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:53:40.427194 kubelet[1864]: E1002 19:53:40.427081 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac7a90664", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 414211684, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 414211684, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.428303 kubelet[1864]: E1002 19:53:40.428269 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac7ac501c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 414427164, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 414427164, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.428554 systemd[1]: Created slice kubepods.slice. Oct 2 19:53:40.429552 kubelet[1864]: E1002 19:53:40.429459 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.430687 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:53:40.430963 kubelet[1864]: E1002 19:53:40.430907 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.432170 kubelet[1864]: E1002 19:53:40.432140 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.432170 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:53:40.431000 audit[1890]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.431000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd705b4fe0 a2=0 a3=7ffd705b4fcc items=0 ppid=1864 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:53:40.432000 audit[1893]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.432000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffee88d62c0 a2=0 a3=7ffee88d62ac items=0 ppid=1864 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:53:40.444075 kubelet[1864]: I1002 19:53:40.444019 1864 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:53:40.442000 audit[1864]: AVC avc: denied { mac_admin } for pid=1864 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:40.442000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:53:40.442000 audit[1864]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0015df5c0 a1=c001353ba8 a2=c0015df590 a3=25 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.442000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:53:40.445149 kubelet[1864]: I1002 19:53:40.444243 1864 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:53:40.445149 kubelet[1864]: I1002 19:53:40.444722 1864 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:53:40.445543 kubelet[1864]: E1002 19:53:40.445499 1864 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.189\" not found" Oct 2 19:53:40.449390 kubelet[1864]: E1002 19:53:40.449228 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac9a404da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 447438042, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 447438042, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.433000 audit[1895]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.433000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef2e76410 a2=0 a3=7ffef2e763fc items=0 ppid=1864 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:53:40.465000 audit[1900]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.465000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf15636a0 a2=0 a3=7ffdf156368c items=0 ppid=1864 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:53:40.493000 audit[1905]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.493000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff69c65960 a2=0 a3=7fff69c6594c items=0 ppid=1864 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:53:40.494000 audit[1906]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.494000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd8bd96420 a2=0 a3=7ffd8bd9640c items=0 ppid=1864 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:53:40.496000 audit[1909]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.496000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff192e27b0 a2=0 a3=7fff192e279c items=0 ppid=1864 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:53:40.498000 audit[1912]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.498000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd6f2dad70 a2=0 a3=7ffd6f2dad5c items=0 ppid=1864 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:53:40.499000 audit[1913]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.499000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe58ac8390 a2=0 a3=7ffe58ac837c items=0 ppid=1864 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:53:40.499000 audit[1914]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.499000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeef1e6260 a2=0 a3=7ffeef1e624c items=0 ppid=1864 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:53:40.500000 audit[1916]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.500000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe5ad7f110 a2=0 a3=7ffe5ad7f0fc items=0 ppid=1864 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:53:40.516086 kubelet[1864]: I1002 19:53:40.516048 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:40.517808 kubelet[1864]: E1002 19:53:40.517772 1864 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.189" Oct 2 19:53:40.517808 kubelet[1864]: E1002 19:53:40.517755 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 516024573, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84540e7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.519175 kubelet[1864]: E1002 19:53:40.519120 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 516027379, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84550b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.520591 kubelet[1864]: E1002 19:53:40.520518 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 516028946, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac845571c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.502000 audit[1918]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.502000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe71ffd510 a2=0 a3=7ffe71ffd4fc items=0 ppid=1864 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:53:40.532000 audit[1921]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.532000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc42ba5cb0 a2=0 a3=7ffc42ba5c9c items=0 ppid=1864 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:53:40.534000 audit[1923]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.534000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fffaad3d5a0 a2=0 a3=7fffaad3d58c items=0 ppid=1864 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:53:40.539000 audit[1926]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.539000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd052f4440 a2=0 a3=7ffd052f442c items=0 ppid=1864 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:53:40.540839 kubelet[1864]: I1002 19:53:40.540823 1864 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:53:40.539000 audit[1927]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.539000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9786d420 a2=0 a3=7ffd9786d40c items=0 ppid=1864 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:53:40.539000 audit[1928]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.539000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfeabbd30 a2=0 a3=7ffcfeabbd1c items=0 ppid=1864 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:53:40.540000 audit[1929]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.540000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffe619b9c0 a2=0 a3=7fffe619b9ac items=0 ppid=1864 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:53:40.540000 audit[1930]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.540000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0d6bf960 a2=0 a3=7fff0d6bf94c items=0 ppid=1864 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:53:40.540000 audit[1932]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:53:40.540000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc52b9c830 a2=0 a3=7ffc52b9c81c items=0 ppid=1864 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:53:40.541000 audit[1933]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.541000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffec9eda290 a2=0 a3=7ffec9eda27c items=0 ppid=1864 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:53:40.541000 audit[1934]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.541000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff5da84c80 a2=0 a3=7fff5da84c6c items=0 ppid=1864 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:53:40.542000 audit[1936]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.542000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc67e4bcd0 a2=0 a3=7ffc67e4bcbc items=0 ppid=1864 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:53:40.543000 audit[1937]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.543000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3f0338c0 a2=0 a3=7fff3f0338ac items=0 ppid=1864 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:53:40.544000 audit[1938]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.544000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff66be0a80 a2=0 a3=7fff66be0a6c items=0 ppid=1864 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:53:40.545000 audit[1940]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.545000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffadbbcbd0 a2=0 a3=7fffadbbcbbc items=0 ppid=1864 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:53:40.546000 audit[1942]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.546000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc6c3db230 a2=0 a3=7ffc6c3db21c items=0 ppid=1864 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:53:40.547000 audit[1944]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.547000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff3b870190 a2=0 a3=7fff3b87017c items=0 ppid=1864 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:53:40.548000 audit[1946]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.548000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd5dd0fd40 a2=0 a3=7ffd5dd0fd2c items=0 ppid=1864 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:53:40.550000 audit[1948]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.550000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc4d3dd8e0 a2=0 a3=7ffc4d3dd8cc items=0 ppid=1864 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:53:40.552130 kubelet[1864]: I1002 19:53:40.552086 1864 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:53:40.552130 kubelet[1864]: I1002 19:53:40.552097 1864 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:53:40.552130 kubelet[1864]: I1002 19:53:40.552110 1864 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:53:40.552187 kubelet[1864]: E1002 19:53:40.552135 1864 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:53:40.551000 audit[1949]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.551000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7abf8300 a2=0 a3=7ffe7abf82ec items=0 ppid=1864 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:53:40.551000 audit[1950]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.551000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3a5f5ff0 a2=0 a3=7ffc3a5f5fdc items=0 ppid=1864 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:53:40.552000 audit[1951]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:53:40.552000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc29b3f0b0 a2=0 a3=7ffc29b3f09c items=0 ppid=1864 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:40.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:53:40.553909 kubelet[1864]: W1002 19:53:40.553878 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:53:40.553909 kubelet[1864]: E1002 19:53:40.553891 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:53:40.630522 kubelet[1864]: E1002 19:53:40.630393 1864 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.67.124.189" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:53:40.719298 kubelet[1864]: I1002 19:53:40.719095 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:40.721583 kubelet[1864]: E1002 19:53:40.721498 1864 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.189" Oct 2 19:53:40.721583 kubelet[1864]: E1002 19:53:40.721375 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 718994214, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84540e7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.723727 kubelet[1864]: E1002 19:53:40.723543 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 719011102, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84550b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:40.816415 kubelet[1864]: E1002 19:53:40.816264 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 719018307, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac845571c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:41.033448 kubelet[1864]: E1002 19:53:41.033231 1864 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.67.124.189" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:53:41.123268 kubelet[1864]: I1002 19:53:41.123168 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:41.125740 kubelet[1864]: E1002 19:53:41.125655 1864 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.189" Oct 2 19:53:41.125740 kubelet[1864]: E1002 19:53:41.125562 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 41, 123066385, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84540e7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:41.216994 kubelet[1864]: E1002 19:53:41.216777 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 41, 123083300, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84550b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:41.414304 kubelet[1864]: E1002 19:53:41.414079 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:41.417691 kubelet[1864]: E1002 19:53:41.417454 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 41, 123112479, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac845571c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:41.479233 kubelet[1864]: W1002 19:53:41.479132 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:53:41.479233 kubelet[1864]: E1002 19:53:41.479200 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:53:41.576697 kubelet[1864]: W1002 19:53:41.576648 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:41.576697 kubelet[1864]: E1002 19:53:41.576671 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:41.836358 kubelet[1864]: E1002 19:53:41.836257 1864 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.67.124.189" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:53:41.844780 kubelet[1864]: W1002 19:53:41.844688 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:41.844780 kubelet[1864]: E1002 19:53:41.844753 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:41.927227 kubelet[1864]: I1002 19:53:41.927132 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:41.929542 kubelet[1864]: E1002 19:53:41.929468 1864 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.189" Oct 2 19:53:41.929760 kubelet[1864]: E1002 19:53:41.929418 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 41, 927048797, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84540e7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:41.931808 kubelet[1864]: E1002 19:53:41.931609 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 41, 927071045, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84550b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:42.015323 kubelet[1864]: W1002 19:53:42.015213 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:53:42.015323 kubelet[1864]: E1002 19:53:42.015281 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:53:42.016844 kubelet[1864]: E1002 19:53:42.016635 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 41, 927078305, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac845571c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:42.415512 kubelet[1864]: E1002 19:53:42.415393 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:43.415835 kubelet[1864]: E1002 19:53:43.415733 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:43.439133 kubelet[1864]: E1002 19:53:43.439031 1864 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.67.124.189" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:53:43.531911 kubelet[1864]: I1002 19:53:43.531817 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:43.534348 kubelet[1864]: E1002 19:53:43.534269 1864 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.189" Oct 2 19:53:43.534553 kubelet[1864]: E1002 19:53:43.534334 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 43, 531716002, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84540e7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:43.536561 kubelet[1864]: E1002 19:53:43.536387 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 43, 531738845, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84550b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:43.538608 kubelet[1864]: E1002 19:53:43.538390 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 43, 531746823, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac845571c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:43.573160 kubelet[1864]: W1002 19:53:43.573061 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:43.573160 kubelet[1864]: E1002 19:53:43.573131 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:43.859576 kubelet[1864]: W1002 19:53:43.859452 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:43.859576 kubelet[1864]: E1002 19:53:43.859553 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:44.406300 kubelet[1864]: W1002 19:53:44.406194 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:53:44.406300 kubelet[1864]: E1002 19:53:44.406268 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:53:44.416675 kubelet[1864]: E1002 19:53:44.416570 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:44.600995 kubelet[1864]: W1002 19:53:44.600895 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:53:44.600995 kubelet[1864]: E1002 19:53:44.600962 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:53:45.417945 kubelet[1864]: E1002 19:53:45.417839 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:46.418894 kubelet[1864]: E1002 19:53:46.418790 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:46.642409 kubelet[1864]: E1002 19:53:46.642307 1864 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.67.124.189" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:53:46.736658 kubelet[1864]: I1002 19:53:46.736422 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:46.739189 kubelet[1864]: E1002 19:53:46.739084 1864 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.189" Oct 2 19:53:46.740268 kubelet[1864]: E1002 19:53:46.740073 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84540e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.124.189 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424450279, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 46, 735408460, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84540e7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:46.742640 kubelet[1864]: E1002 19:53:46.742583 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac84550b3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.124.189 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424454323, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 46, 736144539, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac84550b3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:46.744007 kubelet[1864]: E1002 19:53:46.743947 1864 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189.178a626ac845571c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.124.189", UID:"10.67.124.189", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.124.189 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.124.189"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 53, 40, 424455964, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 53, 46, 736169490, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.124.189.178a626ac845571c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:53:47.419335 kubelet[1864]: E1002 19:53:47.419233 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:48.419769 kubelet[1864]: E1002 19:53:48.419660 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:48.966217 kubelet[1864]: W1002 19:53:48.966120 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:48.966217 kubelet[1864]: E1002 19:53:48.966187 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:53:49.420098 kubelet[1864]: E1002 19:53:49.419978 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:49.783769 kubelet[1864]: W1002 19:53:49.783563 1864 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:49.783769 kubelet[1864]: E1002 19:53:49.783630 1864 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.189" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:53:50.392932 kubelet[1864]: I1002 19:53:50.392810 1864 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:53:50.420884 kubelet[1864]: E1002 19:53:50.420776 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:50.446317 kubelet[1864]: E1002 19:53:50.446207 1864 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.189\" not found" Oct 2 19:53:50.819740 kubelet[1864]: E1002 19:53:50.819629 1864 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.67.124.189" not found Oct 2 19:53:51.422073 kubelet[1864]: E1002 19:53:51.421969 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:52.234017 kubelet[1864]: E1002 19:53:52.233914 1864 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.67.124.189" not found Oct 2 19:53:52.422597 kubelet[1864]: E1002 19:53:52.422470 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:53.053342 kubelet[1864]: E1002 19:53:53.053239 1864 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.124.189\" not found" node="10.67.124.189" Oct 2 19:53:53.141221 kubelet[1864]: I1002 19:53:53.141123 1864 kubelet_node_status.go:70] "Attempting to register node" node="10.67.124.189" Oct 2 19:53:53.423154 kubelet[1864]: E1002 19:53:53.423060 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:53.435690 kubelet[1864]: I1002 19:53:53.435581 1864 kubelet_node_status.go:73] "Successfully registered node" node="10.67.124.189" Oct 2 19:53:53.447049 kubelet[1864]: E1002 19:53:53.446955 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.548024 kubelet[1864]: E1002 19:53:53.547912 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.604224 sudo[1609]: pam_unix(sudo:session): session closed for user root Oct 2 19:53:53.602000 audit[1609]: USER_END pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.607084 sshd[1606]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:53.610213 kernel: kauditd_printk_skb: 472 callbacks suppressed Oct 2 19:53:53.610302 kernel: audit: type=1106 audit(1696276433.602:559): pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.610905 systemd[1]: sshd@8-139.178.89.111:22-139.178.89.65:56016.service: Deactivated successfully. Oct 2 19:53:53.611398 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:53:53.611850 systemd-logind[1432]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:53:53.612324 systemd-logind[1432]: Removed session 11. Oct 2 19:53:53.648279 kubelet[1864]: E1002 19:53:53.648251 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.603000 audit[1609]: CRED_DISP pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.748938 kubelet[1864]: E1002 19:53:53.748875 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.749445 kernel: audit: type=1104 audit(1696276433.603:560): pid=1609 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.749473 kernel: audit: type=1106 audit(1696276433.608:561): pid=1606 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.608000 audit[1606]: USER_END pid=1606 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.836354 kernel: audit: type=1104 audit(1696276433.608:562): pid=1606 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.608000 audit[1606]: CRED_DISP pid=1606 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.849604 kubelet[1864]: E1002 19:53:53.849566 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.920712 kernel: audit: type=1131 audit(1696276433.609:563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.111:22-139.178.89.65:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.111:22-139.178.89.65:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.949918 kubelet[1864]: E1002 19:53:53.949883 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.050591 kubelet[1864]: E1002 19:53:54.050503 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.150908 kubelet[1864]: E1002 19:53:54.150808 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.820138 systemd-resolved[1386]: Clock change detected. Flushing caches. Oct 2 19:53:53.860106 systemd-journald[1227]: Time jumped backwards, rotating. Oct 2 19:53:53.820442 systemd-timesyncd[1387]: Contacted time server [2607:ff50:0:1a::20]:123 (2.flatcar.pool.ntp.org). Oct 2 19:53:53.860252 kubelet[1864]: E1002 19:53:53.826858 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.820646 systemd-timesyncd[1387]: Initial clock synchronization to Mon 2023-10-02 19:53:53.819965 UTC. Oct 2 19:53:53.927732 kubelet[1864]: E1002 19:53:53.927662 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:53.999435 kubelet[1864]: E1002 19:53:53.999354 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:54.028868 kubelet[1864]: E1002 19:53:54.028770 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.129285 kubelet[1864]: E1002 19:53:54.129077 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.229694 kubelet[1864]: E1002 19:53:54.229622 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.330010 kubelet[1864]: E1002 19:53:54.329899 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.430427 kubelet[1864]: E1002 19:53:54.430221 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.530866 kubelet[1864]: E1002 19:53:54.530755 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.632008 kubelet[1864]: E1002 19:53:54.631898 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.732701 kubelet[1864]: E1002 19:53:54.732477 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.832913 kubelet[1864]: E1002 19:53:54.832807 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:54.934005 kubelet[1864]: E1002 19:53:54.933891 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.000022 kubelet[1864]: E1002 19:53:54.999926 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:55.035188 kubelet[1864]: E1002 19:53:55.035078 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.135647 kubelet[1864]: E1002 19:53:55.135518 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.235838 kubelet[1864]: E1002 19:53:55.235729 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.336124 kubelet[1864]: E1002 19:53:55.335920 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.437094 kubelet[1864]: E1002 19:53:55.436987 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.538001 kubelet[1864]: E1002 19:53:55.537887 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.638212 kubelet[1864]: E1002 19:53:55.638034 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.739250 kubelet[1864]: E1002 19:53:55.739143 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.840195 kubelet[1864]: E1002 19:53:55.840088 1864 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.124.189\" not found" Oct 2 19:53:55.941816 kubelet[1864]: I1002 19:53:55.941701 1864 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:53:55.942101 env[1442]: time="2023-10-02T19:53:55.942029483Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:53:55.942548 kubelet[1864]: I1002 19:53:55.942202 1864 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:53:55.997397 kubelet[1864]: I1002 19:53:55.997282 1864 apiserver.go:52] "Watching apiserver" Oct 2 19:53:56.000686 kubelet[1864]: E1002 19:53:56.000629 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:56.002299 kubelet[1864]: I1002 19:53:56.002206 1864 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:53:56.002515 kubelet[1864]: I1002 19:53:56.002369 1864 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:53:56.015535 systemd[1]: Created slice kubepods-besteffort-poddde9f351_f9ac_4ddf_aff6_c8cee2a5b7d3.slice. Oct 2 19:53:56.048290 systemd[1]: Created slice kubepods-besteffort-podb159b15b_c7af_4fc2_a301_de4b2136e67c.slice. Oct 2 19:53:56.094101 kubelet[1864]: I1002 19:53:56.094027 1864 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:53:56.187110 kubelet[1864]: I1002 19:53:56.187002 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vr5nf\" (UniqueName: \"kubernetes.io/projected/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-kube-api-access-vr5nf\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.187110 kubelet[1864]: I1002 19:53:56.187128 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qrmm5\" (UniqueName: \"kubernetes.io/projected/b159b15b-c7af-4fc2-a301-de4b2136e67c-kube-api-access-qrmm5\") pod \"kube-proxy-lzr7x\" (UID: \"b159b15b-c7af-4fc2-a301-de4b2136e67c\") " pod="kube-system/kube-proxy-lzr7x" Oct 2 19:53:56.187435 kubelet[1864]: I1002 19:53:56.187261 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-lib-modules\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.187586 kubelet[1864]: I1002 19:53:56.187437 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-tigera-ca-bundle\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.187726 kubelet[1864]: I1002 19:53:56.187634 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-var-run-calico\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.187819 kubelet[1864]: I1002 19:53:56.187757 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-cni-bin-dir\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.187924 kubelet[1864]: I1002 19:53:56.187842 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-flexvol-driver-host\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.187924 kubelet[1864]: I1002 19:53:56.187912 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b159b15b-c7af-4fc2-a301-de4b2136e67c-kube-proxy\") pod \"kube-proxy-lzr7x\" (UID: \"b159b15b-c7af-4fc2-a301-de4b2136e67c\") " pod="kube-system/kube-proxy-lzr7x" Oct 2 19:53:56.188104 kubelet[1864]: I1002 19:53:56.188072 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-xtables-lock\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.188253 kubelet[1864]: I1002 19:53:56.188199 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-node-certs\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.188403 kubelet[1864]: I1002 19:53:56.188360 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-var-lib-calico\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.188602 kubelet[1864]: I1002 19:53:56.188519 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b159b15b-c7af-4fc2-a301-de4b2136e67c-lib-modules\") pod \"kube-proxy-lzr7x\" (UID: \"b159b15b-c7af-4fc2-a301-de4b2136e67c\") " pod="kube-system/kube-proxy-lzr7x" Oct 2 19:53:56.188724 kubelet[1864]: I1002 19:53:56.188677 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-policysync\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.188813 kubelet[1864]: I1002 19:53:56.188785 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-cni-log-dir\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.188904 kubelet[1864]: I1002 19:53:56.188891 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b159b15b-c7af-4fc2-a301-de4b2136e67c-xtables-lock\") pod \"kube-proxy-lzr7x\" (UID: \"b159b15b-c7af-4fc2-a301-de4b2136e67c\") " pod="kube-system/kube-proxy-lzr7x" Oct 2 19:53:56.189011 kubelet[1864]: I1002 19:53:56.188952 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3-cni-net-dir\") pod \"calico-node-cqbnp\" (UID: \"dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3\") " pod="calico-system/calico-node-cqbnp" Oct 2 19:53:56.189106 kubelet[1864]: I1002 19:53:56.189012 1864 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:53:56.291507 kubelet[1864]: E1002 19:53:56.291434 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.291507 kubelet[1864]: W1002 19:53:56.291490 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.291903 kubelet[1864]: E1002 19:53:56.291558 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.292220 kubelet[1864]: E1002 19:53:56.292141 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.292220 kubelet[1864]: W1002 19:53:56.292177 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.292550 kubelet[1864]: E1002 19:53:56.292238 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.292957 kubelet[1864]: E1002 19:53:56.292873 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.292957 kubelet[1864]: W1002 19:53:56.292919 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.293215 kubelet[1864]: E1002 19:53:56.293006 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.293528 kubelet[1864]: E1002 19:53:56.293478 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.293528 kubelet[1864]: W1002 19:53:56.293505 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.293787 kubelet[1864]: E1002 19:53:56.293570 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.294135 kubelet[1864]: E1002 19:53:56.294057 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.294135 kubelet[1864]: W1002 19:53:56.294090 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.294391 kubelet[1864]: E1002 19:53:56.294217 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.294764 kubelet[1864]: E1002 19:53:56.294696 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.294764 kubelet[1864]: W1002 19:53:56.294723 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.295058 kubelet[1864]: E1002 19:53:56.294846 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.295324 kubelet[1864]: E1002 19:53:56.295246 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.295324 kubelet[1864]: W1002 19:53:56.295280 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.295324 kubelet[1864]: E1002 19:53:56.295319 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.297237 kubelet[1864]: E1002 19:53:56.297207 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.297237 kubelet[1864]: W1002 19:53:56.297213 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.297237 kubelet[1864]: E1002 19:53:56.297236 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.391268 kubelet[1864]: E1002 19:53:56.391165 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.391268 kubelet[1864]: W1002 19:53:56.391207 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.391268 kubelet[1864]: E1002 19:53:56.391253 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.391893 kubelet[1864]: E1002 19:53:56.391815 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.391893 kubelet[1864]: W1002 19:53:56.391849 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.391893 kubelet[1864]: E1002 19:53:56.391889 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.493464 kubelet[1864]: E1002 19:53:56.493369 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.493464 kubelet[1864]: W1002 19:53:56.493409 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.493464 kubelet[1864]: E1002 19:53:56.493454 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.494132 kubelet[1864]: E1002 19:53:56.494053 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.494132 kubelet[1864]: W1002 19:53:56.494091 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.494132 kubelet[1864]: E1002 19:53:56.494130 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.514086 kubelet[1864]: E1002 19:53:56.514036 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.514086 kubelet[1864]: W1002 19:53:56.514045 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.514086 kubelet[1864]: E1002 19:53:56.514056 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.595429 kubelet[1864]: E1002 19:53:56.595240 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.595429 kubelet[1864]: W1002 19:53:56.595280 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.595429 kubelet[1864]: E1002 19:53:56.595324 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.654294 env[1442]: time="2023-10-02T19:53:56.654163373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lzr7x,Uid:b159b15b-c7af-4fc2-a301-de4b2136e67c,Namespace:kube-system,Attempt:0,}" Oct 2 19:53:56.695620 kubelet[1864]: E1002 19:53:56.695581 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.695620 kubelet[1864]: W1002 19:53:56.695590 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.695620 kubelet[1864]: E1002 19:53:56.695637 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.708512 kubelet[1864]: E1002 19:53:56.708505 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:56.708512 kubelet[1864]: W1002 19:53:56.708511 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:56.708558 kubelet[1864]: E1002 19:53:56.708518 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:56.945573 env[1442]: time="2023-10-02T19:53:56.945353292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cqbnp,Uid:dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3,Namespace:calico-system,Attempt:0,}" Oct 2 19:53:57.001655 kubelet[1864]: E1002 19:53:57.001540 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:57.264228 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount166090581.mount: Deactivated successfully. Oct 2 19:53:57.265632 env[1442]: time="2023-10-02T19:53:57.265614268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.266549 env[1442]: time="2023-10-02T19:53:57.266534989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.267206 env[1442]: time="2023-10-02T19:53:57.267194027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.267872 env[1442]: time="2023-10-02T19:53:57.267828682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.268713 env[1442]: time="2023-10-02T19:53:57.268701709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.269062 env[1442]: time="2023-10-02T19:53:57.269052107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.270200 env[1442]: time="2023-10-02T19:53:57.270190634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.271305 env[1442]: time="2023-10-02T19:53:57.271293617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:57.278161 env[1442]: time="2023-10-02T19:53:57.278127496Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:53:57.278249 env[1442]: time="2023-10-02T19:53:57.278154544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:53:57.278249 env[1442]: time="2023-10-02T19:53:57.278170387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:53:57.278297 env[1442]: time="2023-10-02T19:53:57.278243639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abc578084d82116fdf32ccf6ea607fcf5242bcb253b0a200192c246abb667075 pid=1985 runtime=io.containerd.runc.v2 Oct 2 19:53:57.278453 env[1442]: time="2023-10-02T19:53:57.278435641Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:53:57.278485 env[1442]: time="2023-10-02T19:53:57.278452144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:53:57.278485 env[1442]: time="2023-10-02T19:53:57.278459241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:53:57.278519 env[1442]: time="2023-10-02T19:53:57.278509317Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd pid=1989 runtime=io.containerd.runc.v2 Oct 2 19:53:57.283931 systemd[1]: Started cri-containerd-766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd.scope. Oct 2 19:53:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.415064 kernel: audit: type=1400 audit(1696276437.287:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.415100 kernel: audit: type=1400 audit(1696276437.287:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.415112 kernel: audit: type=1400 audit(1696276437.288:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.419157 systemd[1]: Started cri-containerd-abc578084d82116fdf32ccf6ea607fcf5242bcb253b0a200192c246abb667075.scope. Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.478612 kernel: audit: type=1400 audit(1696276437.288:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604999 kernel: audit: type=1400 audit(1696276437.288:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit: BPF prog-id=61 op=LOAD Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1989 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366131313634653533633639626136396332633864306563396333 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1989 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366131313634653533633639626136396332633864306563396333 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.413000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit: BPF prog-id=62 op=LOAD Oct 2 19:53:57.413000 audit: BPF prog-id=63 op=LOAD Oct 2 19:53:57.413000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000300d30 items=0 ppid=1989 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366131313634653533633639626136396332633864306563396333 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1985 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162633537383038346438323131366664663332636366366561363037 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1985 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162633537383038346438323131366664663332636366366561363037 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit: BPF prog-id=64 op=LOAD Oct 2 19:53:57.540000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.540000 audit: BPF prog-id=65 op=LOAD Oct 2 19:53:57.540000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000300d78 items=0 ppid=1989 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366131313634653533633639626136396332633864306563396333 Oct 2 19:53:57.540000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002887c0 items=0 ppid=1985 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162633537383038346438323131366664663332636366366561363037 Oct 2 19:53:57.604000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit: BPF prog-id=66 op=LOAD Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000288808 items=0 ppid=1985 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162633537383038346438323131366664663332636366366561363037 Oct 2 19:53:57.604000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:53:57.604000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit: BPF prog-id=67 op=LOAD Oct 2 19:53:57.604000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:53:57.604000 audit: BPF prog-id=68 op=LOAD Oct 2 19:53:57.604000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000288c18 items=0 ppid=1985 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162633537383038346438323131366664663332636366366561363037 Oct 2 19:53:57.604000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000301188 items=0 ppid=1989 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:57.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736366131313634653533633639626136396332633864306563396333 Oct 2 19:53:57.622548 env[1442]: time="2023-10-02T19:53:57.622522519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lzr7x,Uid:b159b15b-c7af-4fc2-a301-de4b2136e67c,Namespace:kube-system,Attempt:0,} returns sandbox id \"abc578084d82116fdf32ccf6ea607fcf5242bcb253b0a200192c246abb667075\"" Oct 2 19:53:57.622635 env[1442]: time="2023-10-02T19:53:57.622554548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cqbnp,Uid:dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3,Namespace:calico-system,Attempt:0,} returns sandbox id \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\"" Oct 2 19:53:57.623366 env[1442]: time="2023-10-02T19:53:57.623352993Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\"" Oct 2 19:53:58.001880 kubelet[1864]: E1002 19:53:58.001829 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:58.448003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3288727385.mount: Deactivated successfully. Oct 2 19:53:58.740993 env[1442]: time="2023-10-02T19:53:58.740915956Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:58.741754 env[1442]: time="2023-10-02T19:53:58.741666208Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:58.742451 env[1442]: time="2023-10-02T19:53:58.742391686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:58.743143 env[1442]: time="2023-10-02T19:53:58.743130343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:53:58.743438 env[1442]: time="2023-10-02T19:53:58.743427517Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad\"" Oct 2 19:53:58.743835 kubelet[1864]: E1002 19:53:58.743800 1864 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.9,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qrmm5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-lzr7x_kube-system(b159b15b-c7af-4fc2-a301-de4b2136e67c): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Oct 2 19:53:58.743950 kubelet[1864]: E1002 19:53:58.743867 1864 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-lzr7x" podUID=b159b15b-c7af-4fc2-a301-de4b2136e67c Oct 2 19:53:58.743982 env[1442]: time="2023-10-02T19:53:58.743869380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:53:59.002339 kubelet[1864]: E1002 19:53:59.002211 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:53:59.179290 kubelet[1864]: E1002 19:53:59.179230 1864 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.9,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qrmm5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-lzr7x_kube-system(b159b15b-c7af-4fc2-a301-de4b2136e67c): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Oct 2 19:53:59.179723 kubelet[1864]: E1002 19:53:59.179325 1864 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-lzr7x" podUID=b159b15b-c7af-4fc2-a301-de4b2136e67c Oct 2 19:53:59.267484 kubelet[1864]: E1002 19:53:59.267327 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.267484 kubelet[1864]: W1002 19:53:59.267371 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.267484 kubelet[1864]: E1002 19:53:59.267424 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.268028 kubelet[1864]: E1002 19:53:59.267952 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.268028 kubelet[1864]: W1002 19:53:59.267985 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.268028 kubelet[1864]: E1002 19:53:59.268024 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.268589 kubelet[1864]: E1002 19:53:59.268536 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.268589 kubelet[1864]: W1002 19:53:59.268576 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.268830 kubelet[1864]: E1002 19:53:59.268642 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.269292 kubelet[1864]: E1002 19:53:59.269219 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.269292 kubelet[1864]: W1002 19:53:59.269252 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.269292 kubelet[1864]: E1002 19:53:59.269291 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.269814 kubelet[1864]: E1002 19:53:59.269746 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.269814 kubelet[1864]: W1002 19:53:59.269773 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.269814 kubelet[1864]: E1002 19:53:59.269807 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.270387 kubelet[1864]: E1002 19:53:59.270308 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.270387 kubelet[1864]: W1002 19:53:59.270341 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.270387 kubelet[1864]: E1002 19:53:59.270381 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.271006 kubelet[1864]: E1002 19:53:59.270934 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.271006 kubelet[1864]: W1002 19:53:59.270967 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.271006 kubelet[1864]: E1002 19:53:59.271006 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.271528 kubelet[1864]: E1002 19:53:59.271500 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.271528 kubelet[1864]: W1002 19:53:59.271526 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.271740 kubelet[1864]: E1002 19:53:59.271561 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.272145 kubelet[1864]: E1002 19:53:59.272066 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.272145 kubelet[1864]: W1002 19:53:59.272099 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.272145 kubelet[1864]: E1002 19:53:59.272137 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.272721 kubelet[1864]: E1002 19:53:59.272693 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.272721 kubelet[1864]: W1002 19:53:59.272720 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.272916 kubelet[1864]: E1002 19:53:59.272755 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.273255 kubelet[1864]: E1002 19:53:59.273222 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.273372 kubelet[1864]: W1002 19:53:59.273256 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.273372 kubelet[1864]: E1002 19:53:59.273295 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.273795 kubelet[1864]: E1002 19:53:59.273712 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.273795 kubelet[1864]: W1002 19:53:59.273737 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.273795 kubelet[1864]: E1002 19:53:59.273769 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.274295 kubelet[1864]: E1002 19:53:59.274226 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.274295 kubelet[1864]: W1002 19:53:59.274258 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.274295 kubelet[1864]: E1002 19:53:59.274299 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.274763 kubelet[1864]: E1002 19:53:59.274696 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.274763 kubelet[1864]: W1002 19:53:59.274720 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.274763 kubelet[1864]: E1002 19:53:59.274752 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.275146 kubelet[1864]: E1002 19:53:59.275120 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.275146 kubelet[1864]: W1002 19:53:59.275143 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.275368 kubelet[1864]: E1002 19:53:59.275174 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.275555 kubelet[1864]: E1002 19:53:59.275527 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.275670 kubelet[1864]: W1002 19:53:59.275556 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.275670 kubelet[1864]: E1002 19:53:59.275589 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.367425 kubelet[1864]: E1002 19:53:59.367324 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.367425 kubelet[1864]: W1002 19:53:59.367369 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.367425 kubelet[1864]: E1002 19:53:59.367414 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.368108 kubelet[1864]: E1002 19:53:59.368030 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.368108 kubelet[1864]: W1002 19:53:59.368063 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.368108 kubelet[1864]: E1002 19:53:59.368110 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.368790 kubelet[1864]: E1002 19:53:59.368711 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.368790 kubelet[1864]: W1002 19:53:59.368752 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.368790 kubelet[1864]: E1002 19:53:59.368801 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.369404 kubelet[1864]: E1002 19:53:59.369324 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.369404 kubelet[1864]: W1002 19:53:59.369359 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.369404 kubelet[1864]: E1002 19:53:59.369405 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.369988 kubelet[1864]: E1002 19:53:59.369911 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.369988 kubelet[1864]: W1002 19:53:59.369944 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.370289 kubelet[1864]: E1002 19:53:59.370075 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.370503 kubelet[1864]: E1002 19:53:59.370468 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.370623 kubelet[1864]: W1002 19:53:59.370503 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.370623 kubelet[1864]: E1002 19:53:59.370548 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.371191 kubelet[1864]: E1002 19:53:59.371108 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.371191 kubelet[1864]: W1002 19:53:59.371142 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.371191 kubelet[1864]: E1002 19:53:59.371189 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.371758 kubelet[1864]: E1002 19:53:59.371679 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.371758 kubelet[1864]: W1002 19:53:59.371706 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.372024 kubelet[1864]: E1002 19:53:59.371830 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.372306 kubelet[1864]: E1002 19:53:59.372247 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.372306 kubelet[1864]: W1002 19:53:59.372280 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.372533 kubelet[1864]: E1002 19:53:59.372325 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.373007 kubelet[1864]: E1002 19:53:59.372928 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.373007 kubelet[1864]: W1002 19:53:59.372962 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.373007 kubelet[1864]: E1002 19:53:59.373009 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.373716 kubelet[1864]: E1002 19:53:59.373643 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.373716 kubelet[1864]: W1002 19:53:59.373679 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.373716 kubelet[1864]: E1002 19:53:59.373725 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.374307 kubelet[1864]: E1002 19:53:59.374255 1864 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:53:59.374307 kubelet[1864]: W1002 19:53:59.374288 1864 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:53:59.374506 kubelet[1864]: E1002 19:53:59.374327 1864 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:53:59.989542 kubelet[1864]: E1002 19:53:59.989439 1864 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:00.002697 kubelet[1864]: E1002 19:54:00.002659 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:00.088273 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount812566452.mount: Deactivated successfully. Oct 2 19:54:01.003384 kubelet[1864]: E1002 19:54:01.003337 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:01.032116 env[1442]: time="2023-10-02T19:54:01.032025023Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:01.034791 env[1442]: time="2023-10-02T19:54:01.034725454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:01.039486 env[1442]: time="2023-10-02T19:54:01.039438938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:01.044022 env[1442]: time="2023-10-02T19:54:01.043969273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:01.046267 env[1442]: time="2023-10-02T19:54:01.046209252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:54:01.050219 env[1442]: time="2023-10-02T19:54:01.050123423Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:54:01.064372 env[1442]: time="2023-10-02T19:54:01.064309380Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59\"" Oct 2 19:54:01.065043 env[1442]: time="2023-10-02T19:54:01.064982483Z" level=info msg="StartContainer for \"40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59\"" Oct 2 19:54:01.087630 systemd[1]: Started cri-containerd-40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59.scope. Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.123303 kernel: kauditd_printk_skb: 109 callbacks suppressed Oct 2 19:54:01.123327 kernel: audit: type=1400 audit(1696276441.094:600): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1989 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:01.283452 kernel: audit: type=1300 audit(1696276441.094:600): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1989 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:01.283476 kernel: audit: type=1327 audit(1696276441.094:600): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636262323366373439306263356265383563623461326566356638 Oct 2 19:54:01.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636262323366373439306263356265383563623461326566356638 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.442038 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.442066 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.568047 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.568070 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.585889 env[1442]: time="2023-10-02T19:54:01.585835357Z" level=info msg="StartContainer for \"40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59\" returns successfully" Oct 2 19:54:01.632779 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.633011 systemd[1]: cri-containerd-40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59.scope: Deactivated successfully. Oct 2 19:54:01.654006 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59-rootfs.mount: Deactivated successfully. Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.759592 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.759648 kernel: audit: type=1400 audit(1696276441.094:601): avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.094000 audit: BPF prog-id=69 op=LOAD Oct 2 19:54:01.094000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000291020 items=0 ppid=1989 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:01.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636262323366373439306263356265383563623461326566356638 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.185000 audit: BPF prog-id=70 op=LOAD Oct 2 19:54:01.185000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000291068 items=0 ppid=1989 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:01.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636262323366373439306263356265383563623461326566356638 Oct 2 19:54:01.376000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:54:01.376000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:01.376000 audit: BPF prog-id=71 op=LOAD Oct 2 19:54:01.376000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002910f8 items=0 ppid=1989 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:01.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636262323366373439306263356265383563623461326566356638 Oct 2 19:54:01.823000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:54:01.913918 env[1442]: time="2023-10-02T19:54:01.913801297Z" level=info msg="shim disconnected" id=40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59 Oct 2 19:54:01.913918 env[1442]: time="2023-10-02T19:54:01.913882417Z" level=warning msg="cleaning up after shim disconnected" id=40cbb23f7490bc5be85cb4a2ef5f8053f56f7fe9fe63f5fbf4e89b81f5830b59 namespace=k8s.io Oct 2 19:54:01.913918 env[1442]: time="2023-10-02T19:54:01.913906003Z" level=info msg="cleaning up dead shim" Oct 2 19:54:01.940970 env[1442]: time="2023-10-02T19:54:01.940827287Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:54:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2136 runtime=io.containerd.runc.v2\n" Oct 2 19:54:02.004129 kubelet[1864]: E1002 19:54:02.004043 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:02.189450 env[1442]: time="2023-10-02T19:54:02.189223541Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:54:03.004926 kubelet[1864]: E1002 19:54:03.004846 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:03.574714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3715445106.mount: Deactivated successfully. Oct 2 19:54:04.005218 kubelet[1864]: E1002 19:54:04.005174 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:04.563300 update_engine[1434]: I1002 19:54:04.563251 1434 update_attempter.cc:505] Updating boot flags... Oct 2 19:54:05.005755 kubelet[1864]: E1002 19:54:05.005710 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:05.557132 env[1442]: time="2023-10-02T19:54:05.557110303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:05.557737 env[1442]: time="2023-10-02T19:54:05.557724630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:05.558712 env[1442]: time="2023-10-02T19:54:05.558700078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:05.559551 env[1442]: time="2023-10-02T19:54:05.559539070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:05.560087 env[1442]: time="2023-10-02T19:54:05.560031824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:54:05.561334 env[1442]: time="2023-10-02T19:54:05.561321504Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:54:05.566513 env[1442]: time="2023-10-02T19:54:05.566498889Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\"" Oct 2 19:54:05.566771 env[1442]: time="2023-10-02T19:54:05.566746145Z" level=info msg="StartContainer for \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\"" Oct 2 19:54:05.587253 systemd[1]: Started cri-containerd-f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63.scope. Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1989 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:05.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635633864646331333466346362316564613737336539656435373763 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit: BPF prog-id=72 op=LOAD Oct 2 19:54:05.593000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c1ca0 items=0 ppid=1989 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:05.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635633864646331333466346362316564613737336539656435373763 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit: BPF prog-id=73 op=LOAD Oct 2 19:54:05.593000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c1ce8 items=0 ppid=1989 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:05.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635633864646331333466346362316564613737336539656435373763 Oct 2 19:54:05.593000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:54:05.593000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:05.593000 audit: BPF prog-id=74 op=LOAD Oct 2 19:54:05.593000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002c1d78 items=0 ppid=1989 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:05.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635633864646331333466346362316564613737336539656435373763 Oct 2 19:54:05.614533 env[1442]: time="2023-10-02T19:54:05.614495513Z" level=info msg="StartContainer for \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\" returns successfully" Oct 2 19:54:06.006634 kubelet[1864]: E1002 19:54:06.006558 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:07.007422 kubelet[1864]: E1002 19:54:07.007363 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:08.008535 kubelet[1864]: E1002 19:54:08.008443 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:09.009542 kubelet[1864]: E1002 19:54:09.009434 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:10.010331 kubelet[1864]: E1002 19:54:10.010222 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:11.011121 kubelet[1864]: E1002 19:54:11.011009 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:11.133227 env[1442]: time="2023-10-02T19:54:11.133073740Z" level=info msg="CreateContainer within sandbox \"abc578084d82116fdf32ccf6ea607fcf5242bcb253b0a200192c246abb667075\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:54:11.144853 env[1442]: time="2023-10-02T19:54:11.144810537Z" level=info msg="CreateContainer within sandbox \"abc578084d82116fdf32ccf6ea607fcf5242bcb253b0a200192c246abb667075\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f94d82534b42c97a7092da9f661584f96d4f95066264dc6e836897a0ee9d8731\"" Oct 2 19:54:11.145110 env[1442]: time="2023-10-02T19:54:11.145066539Z" level=info msg="StartContainer for \"f94d82534b42c97a7092da9f661584f96d4f95066264dc6e836897a0ee9d8731\"" Oct 2 19:54:11.166875 systemd[1]: Started cri-containerd-f94d82534b42c97a7092da9f661584f96d4f95066264dc6e836897a0ee9d8731.scope. Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.203045 kernel: kauditd_printk_skb: 77 callbacks suppressed Oct 2 19:54:11.203106 kernel: audit: type=1400 audit(1696276451.173:613): avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1985 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.362363 kernel: audit: type=1300 audit(1696276451.173:613): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1985 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.362393 kernel: audit: type=1327 audit(1696276451.173:613): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346438323533346234326339376137303932646139663636313538 Oct 2 19:54:11.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346438323533346234326339376137303932646139663636313538 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.455680 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.581046 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.581069 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.612159 env[1442]: time="2023-10-02T19:54:11.612093284Z" level=info msg="StartContainer for \"f94d82534b42c97a7092da9f661584f96d4f95066264dc6e836897a0ee9d8731\" returns successfully" Oct 2 19:54:11.644572 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.708438 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.772335 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.836279 kernel: audit: type=1400 audit(1696276451.173:614): avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.173000 audit: BPF prog-id=75 op=LOAD Oct 2 19:54:11.173000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009aa30 items=0 ppid=1985 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346438323533346234326339376137303932646139663636313538 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.265000 audit: BPF prog-id=76 op=LOAD Oct 2 19:54:11.265000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009aa78 items=0 ppid=1985 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346438323533346234326339376137303932646139663636313538 Oct 2 19:54:11.453000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:54:11.453000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:11.453000 audit: BPF prog-id=77 op=LOAD Oct 2 19:54:11.453000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009ab08 items=0 ppid=1985 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346438323533346234326339376137303932646139663636313538 Oct 2 19:54:11.624000 audit[2291]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.624000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea7fa3b10 a2=0 a3=7ffea7fa3afc items=0 ppid=2244 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:54:11.624000 audit[2292]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.624000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd8826990 a2=0 a3=7ffdd882697c items=0 ppid=2244 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:54:11.625000 audit[2295]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.625000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf8369450 a2=0 a3=7ffdf836943c items=0 ppid=2244 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:54:11.625000 audit[2296]: NETFILTER_CFG table=nat:38 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.625000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe692ebfe0 a2=0 a3=7ffe692ebfcc items=0 ppid=2244 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:54:11.625000 audit[2297]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.625000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8063f8b0 a2=0 a3=7ffd8063f89c items=0 ppid=2244 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:54:11.626000 audit[2298]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.626000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe20510df0 a2=0 a3=7ffe20510ddc items=0 ppid=2244 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:54:11.728000 audit[2299]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.728000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdb5d7e320 a2=0 a3=7ffdb5d7e30c items=0 ppid=2244 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:54:11.900000 audit[2301]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.900000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffedf1089c0 a2=0 a3=7ffedf1089ac items=0 ppid=2244 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:54:11.901000 audit[2304]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.901000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd5e7ba690 a2=0 a3=7ffd5e7ba67c items=0 ppid=2244 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:54:11.902000 audit[2305]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.902000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d69b410 a2=0 a3=7ffd0d69b3fc items=0 ppid=2244 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:54:11.903000 audit[2307]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.903000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd23f34390 a2=0 a3=7ffd23f3437c items=0 ppid=2244 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:54:11.904000 audit[2308]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.904000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefe071ad0 a2=0 a3=7ffefe071abc items=0 ppid=2244 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:54:11.905000 audit[2310]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.905000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc9f9b1ad0 a2=0 a3=7ffc9f9b1abc items=0 ppid=2244 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:54:11.907000 audit[2313]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.907000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa2b2bb50 a2=0 a3=7fffa2b2bb3c items=0 ppid=2244 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:54:11.907000 audit[2314]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.907000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9fabce30 a2=0 a3=7ffd9fabce1c items=0 ppid=2244 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:54:11.908000 audit[2316]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.908000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd26ce5f0 a2=0 a3=7ffcd26ce5dc items=0 ppid=2244 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:54:11.909000 audit[2317]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.909000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8c3947a0 a2=0 a3=7ffd8c39478c items=0 ppid=2244 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:54:11.910000 audit[2319]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.910000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd480ae70 a2=0 a3=7ffdd480ae5c items=0 ppid=2244 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:54:11.912000 audit[2322]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.912000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff698f0130 a2=0 a3=7fff698f011c items=0 ppid=2244 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:54:11.914000 audit[2325]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.914000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1aba0dc0 a2=0 a3=7ffd1aba0dac items=0 ppid=2244 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:54:11.914000 audit[2326]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.914000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe7e55500 a2=0 a3=7fffe7e554ec items=0 ppid=2244 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:54:11.916000 audit[2328]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.916000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdaf3e0e30 a2=0 a3=7ffdaf3e0e1c items=0 ppid=2244 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:54:11.917000 audit[2331]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:54:11.917000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5ce7e480 a2=0 a3=7ffe5ce7e46c items=0 ppid=2244 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:54:11.923000 audit[2335]: NETFILTER_CFG table=filter:58 family=2 entries=4 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:54:11.923000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe6b950160 a2=0 a3=7ffe6b95014c items=0 ppid=2244 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:54:11.930000 audit[2335]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:54:11.930000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe6b950160 a2=0 a3=7ffe6b95014c items=0 ppid=2244 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:54:11.938000 audit[2344]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.938000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc61891aa0 a2=0 a3=7ffc61891a8c items=0 ppid=2244 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:54:11.939000 audit[2346]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.939000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdca2a5670 a2=0 a3=7ffdca2a565c items=0 ppid=2244 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:54:11.954000 audit[2349]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.954000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4cba0a90 a2=0 a3=7fff4cba0a7c items=0 ppid=2244 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:54:11.954000 audit[2350]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.954000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0ed17d60 a2=0 a3=7fff0ed17d4c items=0 ppid=2244 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:54:11.956000 audit[2352]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.956000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa5c8f390 a2=0 a3=7fffa5c8f37c items=0 ppid=2244 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:54:11.957000 audit[2353]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.957000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3452f550 a2=0 a3=7ffe3452f53c items=0 ppid=2244 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:54:11.959000 audit[2355]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.959000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7db3ca60 a2=0 a3=7ffd7db3ca4c items=0 ppid=2244 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:54:11.961000 audit[2358]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.961000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb0c1f800 a2=0 a3=7ffcb0c1f7ec items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:54:11.962000 audit[2359]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.962000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcffd63950 a2=0 a3=7ffcffd6393c items=0 ppid=2244 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:54:11.964000 audit[2361]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.964000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5a7ced60 a2=0 a3=7fff5a7ced4c items=0 ppid=2244 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:54:11.965000 audit[2362]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.965000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf97616a0 a2=0 a3=7ffdf976168c items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:54:11.967000 audit[2364]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.967000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2e6ccb50 a2=0 a3=7ffe2e6ccb3c items=0 ppid=2244 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:54:11.970000 audit[2367]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.970000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe70d0cf0 a2=0 a3=7fffe70d0cdc items=0 ppid=2244 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:54:11.973000 audit[2370]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.973000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcdb484080 a2=0 a3=7ffcdb48406c items=0 ppid=2244 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:54:11.974000 audit[2371]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.974000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff39f573e0 a2=0 a3=7fff39f573cc items=0 ppid=2244 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:54:11.976000 audit[2373]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.976000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffedd3ae350 a2=0 a3=7ffedd3ae33c items=0 ppid=2244 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:54:11.980000 audit[2376]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:54:11.980000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff5befbcb0 a2=0 a3=7fff5befbc9c items=0 ppid=2244 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:54:11.987000 audit[2380]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:54:11.987000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcc6acea00 a2=0 a3=7ffcc6ace9ec items=0 ppid=2244 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.987000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:54:11.988000 audit[2380]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:54:11.988000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcc6acea00 a2=0 a3=7ffcc6ace9ec items=0 ppid=2244 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:11.988000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:54:12.011646 kubelet[1864]: E1002 19:54:12.011557 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:12.232396 kubelet[1864]: I1002 19:54:12.232208 1864 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-lzr7x" podStartSLOduration=-9.223372017622658e+09 pod.CreationTimestamp="2023-10-02 19:53:53 +0000 UTC" firstStartedPulling="2023-10-02 19:53:57.623169358 +0000 UTC m=+17.970452526" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:54:12.232086613 +0000 UTC m=+32.579369842" watchObservedRunningTime="2023-10-02 19:54:12.232117241 +0000 UTC m=+32.579400471" Oct 2 19:54:13.011984 kubelet[1864]: E1002 19:54:13.011907 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:14.013223 kubelet[1864]: E1002 19:54:14.013153 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:15.014294 kubelet[1864]: E1002 19:54:15.014189 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:16.014789 kubelet[1864]: E1002 19:54:16.014675 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:17.015258 kubelet[1864]: E1002 19:54:17.015152 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:18.015718 kubelet[1864]: E1002 19:54:18.015591 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:19.015893 kubelet[1864]: E1002 19:54:19.015793 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:19.989221 kubelet[1864]: E1002 19:54:19.989117 1864 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:20.016523 kubelet[1864]: E1002 19:54:20.016418 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:21.017145 kubelet[1864]: E1002 19:54:21.017040 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:22.017546 kubelet[1864]: E1002 19:54:22.017435 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:23.018417 kubelet[1864]: E1002 19:54:23.018310 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:24.019636 kubelet[1864]: E1002 19:54:24.019511 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:25.020158 kubelet[1864]: E1002 19:54:25.020047 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:26.020418 kubelet[1864]: E1002 19:54:26.020345 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:27.021535 kubelet[1864]: E1002 19:54:27.021431 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:28.021704 kubelet[1864]: E1002 19:54:28.021639 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:29.022770 kubelet[1864]: E1002 19:54:29.022665 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:30.023338 kubelet[1864]: E1002 19:54:30.023196 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:31.024577 kubelet[1864]: E1002 19:54:31.024467 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:32.024690 kubelet[1864]: E1002 19:54:32.024626 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:33.024935 kubelet[1864]: E1002 19:54:33.024858 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:34.025212 kubelet[1864]: E1002 19:54:34.025126 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:35.026002 kubelet[1864]: E1002 19:54:35.025926 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:36.026471 kubelet[1864]: E1002 19:54:36.026394 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:36.336054 systemd[1]: cri-containerd-f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63.scope: Deactivated successfully. Oct 2 19:54:36.345000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:54:36.374895 kernel: kauditd_printk_skb: 165 callbacks suppressed Oct 2 19:54:36.374937 kernel: audit: type=1334 audit(1696276476.345:663): prog-id=74 op=UNLOAD Oct 2 19:54:36.390604 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63-rootfs.mount: Deactivated successfully. Oct 2 19:54:36.774956 env[1442]: time="2023-10-02T19:54:36.774830776Z" level=info msg="shim disconnected" id=f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63 Oct 2 19:54:36.774956 env[1442]: time="2023-10-02T19:54:36.774947309Z" level=warning msg="cleaning up after shim disconnected" id=f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63 namespace=k8s.io Oct 2 19:54:36.775934 env[1442]: time="2023-10-02T19:54:36.774981016Z" level=info msg="cleaning up dead shim" Oct 2 19:54:36.783692 env[1442]: time="2023-10-02T19:54:36.783637941Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:54:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2394 runtime=io.containerd.runc.v2\n" Oct 2 19:54:37.026847 kubelet[1864]: E1002 19:54:37.026636 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:37.286023 env[1442]: time="2023-10-02T19:54:37.285802521Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for container &ContainerMetadata{Name:install-cni,Attempt:1,}" Oct 2 19:54:37.304450 env[1442]: time="2023-10-02T19:54:37.304357185Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for &ContainerMetadata{Name:install-cni,Attempt:1,} returns container id \"f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5\"" Oct 2 19:54:37.304970 env[1442]: time="2023-10-02T19:54:37.304923951Z" level=info msg="StartContainer for \"f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5\"" Oct 2 19:54:37.335786 systemd[1]: Started cri-containerd-f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5.scope. Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1989 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:37.502139 kernel: audit: type=1400 audit(1696276477.341:664): avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.502195 kernel: audit: type=1300 audit(1696276477.341:664): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1989 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:37.502211 kernel: audit: type=1327 audit(1696276477.341:664): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366664346535633136343339656633623335323831663233623437 Oct 2 19:54:37.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366664346535633136343339656633623335323831663233623437 Oct 2 19:54:37.596232 kernel: audit: type=1400 audit(1696276477.341:665): avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.659573 kernel: audit: type=1400 audit(1696276477.341:665): avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.722643 kernel: audit: type=1400 audit(1696276477.341:665): avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.785621 kernel: audit: type=1400 audit(1696276477.341:665): avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.848908 kernel: audit: type=1400 audit(1696276477.341:665): avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.932840 env[1442]: time="2023-10-02T19:54:37.932809840Z" level=info msg="StartContainer for \"f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5\" returns successfully" Oct 2 19:54:37.975541 kernel: audit: type=1400 audit(1696276477.341:665): avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.341000 audit: BPF prog-id=78 op=LOAD Oct 2 19:54:37.341000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c6210 items=0 ppid=1989 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:37.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366664346535633136343339656633623335323831663233623437 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.500000 audit: BPF prog-id=79 op=LOAD Oct 2 19:54:37.500000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c6258 items=0 ppid=1989 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:37.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366664346535633136343339656633623335323831663233623437 Oct 2 19:54:37.657000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:54:37.657000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:37.657000 audit: BPF prog-id=80 op=LOAD Oct 2 19:54:37.657000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c62e8 items=0 ppid=1989 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:37.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633366664346535633136343339656633623335323831663233623437 Oct 2 19:54:38.026918 kubelet[1864]: E1002 19:54:38.026872 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:38.034880 env[1442]: time="2023-10-02T19:54:38.034811535Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:54:38.035881 systemd[1]: cri-containerd-f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5.scope: Deactivated successfully. Oct 2 19:54:38.048000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:54:38.056178 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5-rootfs.mount: Deactivated successfully. Oct 2 19:54:38.058833 env[1442]: time="2023-10-02T19:54:38.058785221Z" level=info msg="shim disconnected" id=f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5 Oct 2 19:54:38.058833 env[1442]: time="2023-10-02T19:54:38.058813222Z" level=warning msg="cleaning up after shim disconnected" id=f36fd4e5c16439ef3b35281f23b47a76687a74c885626ba4983a1c7dd07177f5 namespace=k8s.io Oct 2 19:54:38.058833 env[1442]: time="2023-10-02T19:54:38.058819907Z" level=info msg="cleaning up dead shim" Oct 2 19:54:38.062597 env[1442]: time="2023-10-02T19:54:38.062580537Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:54:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2477 runtime=io.containerd.runc.v2\n" Oct 2 19:54:38.073100 kubelet[1864]: I1002 19:54:38.073056 1864 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:54:38.093353 kubelet[1864]: I1002 19:54:38.093296 1864 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:54:38.099507 systemd[1]: Created slice kubepods-besteffort-podbfbec99e_3f87_4a0b_8ebd_b49b4c276d1c.slice. Oct 2 19:54:38.227436 kubelet[1864]: I1002 19:54:38.227365 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c-etccalico\") pod \"csi-node-driver-6nfww\" (UID: \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\") " pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.227848 kubelet[1864]: I1002 19:54:38.227475 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c-kubelet-dir\") pod \"csi-node-driver-6nfww\" (UID: \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\") " pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.227848 kubelet[1864]: I1002 19:54:38.227797 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c-socket-dir\") pod \"csi-node-driver-6nfww\" (UID: \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\") " pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.228155 kubelet[1864]: I1002 19:54:38.227924 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c-registration-dir\") pod \"csi-node-driver-6nfww\" (UID: \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\") " pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.228333 kubelet[1864]: I1002 19:54:38.228140 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wm5k8\" (UniqueName: \"kubernetes.io/projected/bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c-kube-api-access-wm5k8\") pod \"csi-node-driver-6nfww\" (UID: \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\") " pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.228333 kubelet[1864]: I1002 19:54:38.228284 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c-varrun\") pod \"csi-node-driver-6nfww\" (UID: \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\") " pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.289380 kubelet[1864]: I1002 19:54:38.289318 1864 scope.go:115] "RemoveContainer" containerID="f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63" Oct 2 19:54:38.290057 kubelet[1864]: I1002 19:54:38.290007 1864 scope.go:115] "RemoveContainer" containerID="f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63" Oct 2 19:54:38.292501 env[1442]: time="2023-10-02T19:54:38.292377067Z" level=info msg="RemoveContainer for \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\"" Oct 2 19:54:38.292731 env[1442]: time="2023-10-02T19:54:38.292600706Z" level=info msg="RemoveContainer for \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\"" Oct 2 19:54:38.293018 env[1442]: time="2023-10-02T19:54:38.292863528Z" level=error msg="RemoveContainer for \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\" failed" error="failed to set removing state for container \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\": container is already in removing state" Oct 2 19:54:38.293333 kubelet[1864]: E1002 19:54:38.293258 1864 remote_runtime.go:368] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\": container is already in removing state" containerID="f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63" Oct 2 19:54:38.293585 kubelet[1864]: E1002 19:54:38.293374 1864 kuberuntime_container.go:784] failed to remove pod init container "install-cni": rpc error: code = Unknown desc = failed to set removing state for container "f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63": container is already in removing state; Skipping pod "calico-node-cqbnp_calico-system(dde9f351-f9ac-4ddf-aff6-c8cee2a5b7d3)" Oct 2 19:54:38.295118 env[1442]: time="2023-10-02T19:54:38.295040244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:54:38.295836 env[1442]: time="2023-10-02T19:54:38.295736985Z" level=info msg="RemoveContainer for \"f5c8ddc134f4cb1eda773e9ed577ce6d9f744e14c1c81c0b44c8706e72927e63\" returns successfully" Oct 2 19:54:38.404426 env[1442]: time="2023-10-02T19:54:38.404188842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6nfww,Uid:bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c,Namespace:calico-system,Attempt:0,}" Oct 2 19:54:38.440012 env[1442]: time="2023-10-02T19:54:38.439949526Z" level=error msg="Failed to destroy network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:54:38.440176 env[1442]: time="2023-10-02T19:54:38.440131117Z" level=error msg="encountered an error cleaning up failed sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:54:38.440176 env[1442]: time="2023-10-02T19:54:38.440159573Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6nfww,Uid:bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:54:38.440358 kubelet[1864]: E1002 19:54:38.440318 1864 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:54:38.440391 kubelet[1864]: E1002 19:54:38.440373 1864 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.440412 kubelet[1864]: E1002 19:54:38.440396 1864 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6nfww" Oct 2 19:54:38.440446 kubelet[1864]: E1002 19:54:38.440441 1864 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6nfww_calico-system(bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6nfww_calico-system(bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6nfww" podUID=bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c Oct 2 19:54:38.440915 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2-shm.mount: Deactivated successfully. Oct 2 19:54:39.027242 kubelet[1864]: E1002 19:54:39.027125 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:39.292943 kubelet[1864]: I1002 19:54:39.292836 1864 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Oct 2 19:54:39.293414 env[1442]: time="2023-10-02T19:54:39.293352452Z" level=info msg="StopPodSandbox for \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\"" Oct 2 19:54:39.313913 env[1442]: time="2023-10-02T19:54:39.313853996Z" level=error msg="StopPodSandbox for \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\" failed" error="failed to destroy network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:54:39.314076 kubelet[1864]: E1002 19:54:39.314031 1864 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Oct 2 19:54:39.314076 kubelet[1864]: E1002 19:54:39.314063 1864 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2} Oct 2 19:54:39.314135 kubelet[1864]: E1002 19:54:39.314084 1864 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:54:39.314135 kubelet[1864]: E1002 19:54:39.314101 1864 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6nfww" podUID=bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c Oct 2 19:54:39.989586 kubelet[1864]: E1002 19:54:39.989484 1864 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:40.027780 kubelet[1864]: E1002 19:54:40.027672 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:41.028050 kubelet[1864]: E1002 19:54:41.028006 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:41.601286 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2749421581.mount: Deactivated successfully. Oct 2 19:54:41.625939 env[1442]: time="2023-10-02T19:54:41.625875438Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:41.626577 env[1442]: time="2023-10-02T19:54:41.626539699Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:41.627292 env[1442]: time="2023-10-02T19:54:41.627251737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:41.627918 env[1442]: time="2023-10-02T19:54:41.627874376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:41.628307 env[1442]: time="2023-10-02T19:54:41.628289980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:54:41.629619 env[1442]: time="2023-10-02T19:54:41.629602322Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:54:41.635239 env[1442]: time="2023-10-02T19:54:41.635196772Z" level=info msg="CreateContainer within sandbox \"766a1164e53c69ba69c2c8d0ec9c34abf3242179eb0c1085a5ed77aadc673fbd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"875fafc7b67e52e5186c716307347eef94f4626085e09a6dd75d65111006968a\"" Oct 2 19:54:41.635471 env[1442]: time="2023-10-02T19:54:41.635434791Z" level=info msg="StartContainer for \"875fafc7b67e52e5186c716307347eef94f4626085e09a6dd75d65111006968a\"" Oct 2 19:54:41.662883 systemd[1]: Started cri-containerd-875fafc7b67e52e5186c716307347eef94f4626085e09a6dd75d65111006968a.scope. Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.698252 kernel: kauditd_printk_skb: 35 callbacks suppressed Oct 2 19:54:41.698322 kernel: audit: type=1400 audit(1696276481.669:671): avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1989 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:41.856979 kernel: audit: type=1300 audit(1696276481.669:671): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1989 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:41.857009 kernel: audit: type=1327 audit(1696276481.669:671): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356661666337623637653532653531383663373136333037333437 Oct 2 19:54:41.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356661666337623637653532653531383663373136333037333437 Oct 2 19:54:41.949365 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.012288 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.028456 kubelet[1864]: E1002 19:54:42.028416 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:42.075458 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.138524 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.156834 env[1442]: time="2023-10-02T19:54:42.156809056Z" level=info msg="StartContainer for \"875fafc7b67e52e5186c716307347eef94f4626085e09a6dd75d65111006968a\" returns successfully" Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.266949 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.266975 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:42.393691 kernel: audit: type=1400 audit(1696276481.669:672): avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.669000 audit: BPF prog-id=81 op=LOAD Oct 2 19:54:41.669000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027c380 items=0 ppid=1989 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:41.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356661666337623637653532653531383663373136333037333437 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.760000 audit: BPF prog-id=82 op=LOAD Oct 2 19:54:41.760000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027c3c8 items=0 ppid=1989 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:41.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356661666337623637653532653531383663373136333037333437 Oct 2 19:54:41.947000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:54:41.947000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:41.947000 audit: BPF prog-id=83 op=LOAD Oct 2 19:54:41.947000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027c458 items=0 ppid=1989 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:41.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356661666337623637653532653531383663373136333037333437 Oct 2 19:54:42.394465 kubelet[1864]: I1002 19:54:42.394241 1864 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-cqbnp" podStartSLOduration=-9.223371987460556e+09 pod.CreationTimestamp="2023-10-02 19:53:53 +0000 UTC" firstStartedPulling="2023-10-02 19:53:57.62324167 +0000 UTC m=+17.970524836" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:54:42.393973097 +0000 UTC m=+62.741256272" watchObservedRunningTime="2023-10-02 19:54:42.394219741 +0000 UTC m=+62.741502907" Oct 2 19:54:42.476571 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:54:42.476612 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:54:43.029789 kubelet[1864]: E1002 19:54:43.029664 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:43.816000 audit[2745]: AVC avc: denied { write } for pid=2745 comm="tee" name="fd" dev="proc" ino=22459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.816000 audit[2745]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2307b985 a2=241 a3=1b6 items=1 ppid=2718 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.816000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:54:43.816000 audit: PATH item=0 name="/dev/fd/63" inode=26614 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.816000 audit[2752]: AVC avc: denied { write } for pid=2752 comm="tee" name="fd" dev="proc" ino=23409 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.816000 audit[2752]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe314ff975 a2=241 a3=1b6 items=1 ppid=2716 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.816000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:54:43.816000 audit: PATH item=0 name="/dev/fd/63" inode=23406 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.816000 audit[2751]: AVC avc: denied { write } for pid=2751 comm="tee" name="fd" dev="proc" ino=26617 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.816000 audit[2751]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcfe30986 a2=241 a3=1b6 items=1 ppid=2719 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.816000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:54:43.816000 audit: PATH item=0 name="/dev/fd/63" inode=16086 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.817000 audit[2757]: AVC avc: denied { write } for pid=2757 comm="tee" name="fd" dev="proc" ino=24952 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.817000 audit[2757]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6b9b5974 a2=241 a3=1b6 items=1 ppid=2717 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.817000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:54:43.817000 audit: PATH item=0 name="/dev/fd/63" inode=12819 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.817000 audit[2763]: AVC avc: denied { write } for pid=2763 comm="tee" name="fd" dev="proc" ino=16091 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.817000 audit[2763]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9c5bd984 a2=241 a3=1b6 items=1 ppid=2726 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.817000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:54:43.817000 audit: PATH item=0 name="/dev/fd/63" inode=23411 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.817000 audit[2761]: AVC avc: denied { write } for pid=2761 comm="tee" name="fd" dev="proc" ino=26621 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.817000 audit[2761]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff61f0b984 a2=241 a3=1b6 items=1 ppid=2724 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.817000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:54:43.817000 audit: PATH item=0 name="/dev/fd/63" inode=22461 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.817000 audit[2766]: AVC avc: denied { write } for pid=2766 comm="tee" name="fd" dev="proc" ino=24956 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:54:43.817000 audit[2766]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff38f12984 a2=241 a3=1b6 items=1 ppid=2730 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.817000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:54:43.817000 audit: PATH item=0 name="/dev/fd/63" inode=31972 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:54:43.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:54:43.910617 kernel: Initializing XFRM netlink socket Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit: BPF prog-id=84 op=LOAD Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d78eb20 a2=70 a3=7f3709e3c000 items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit: BPF prog-id=85 op=LOAD Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d78eb20 a2=70 a3=6e items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6d78ead0 a2=70 a3=7ffd6d78eb20 items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit: BPF prog-id=86 op=LOAD Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd6d78eab0 a2=70 a3=7ffd6d78eb20 items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d78eb90 a2=70 a3=0 items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d78eb80 a2=70 a3=0 items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd6d78ebc0 a2=70 a3=0 items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.956000 audit: BPF prog-id=87 op=LOAD Oct 2 19:54:43.956000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd6d78eae0 a2=70 a3=ffffffff items=0 ppid=2732 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:54:43.957000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.957000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffed0b4d3e0 a2=70 a3=fff80800 items=0 ppid=2732 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.957000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:54:43.958000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:43.958000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffed0b4d2b0 a2=70 a3=3 items=0 ppid=2732 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:43.958000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:54:43.960954 systemd-networkd[1302]: calico_tmp_B: Failed to manage SR-IOV PF and VF ports, ignoring: Invalid argument Oct 2 19:54:43.976000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:54:44.030344 kubelet[1864]: E1002 19:54:44.030252 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:44.115000 audit[2962]: NETFILTER_CFG table=raw:79 family=2 entries=19 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:54:44.115000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffffc377bd0 a2=0 a3=7ffffc377bbc items=0 ppid=2732 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:44.115000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:54:44.117000 audit[2967]: NETFILTER_CFG table=mangle:80 family=2 entries=19 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:54:44.117000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdcbbfe440 a2=0 a3=55f579ae1000 items=0 ppid=2732 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:44.117000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:54:44.129000 audit[2968]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:54:44.129000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffec26bf3f0 a2=0 a3=7ffec26bf3dc items=0 ppid=2732 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:44.129000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:54:44.135000 audit[2971]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:54:44.135000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe35c5e230 a2=0 a3=55deec2cf000 items=0 ppid=2732 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:44.135000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:54:44.931569 systemd-networkd[1302]: vxlan.calico: Link UP Oct 2 19:54:44.931573 systemd-networkd[1302]: vxlan.calico: Gained carrier Oct 2 19:54:45.031438 kubelet[1864]: E1002 19:54:45.031324 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:45.500245 kubelet[1864]: I1002 19:54:45.500144 1864 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:54:45.513336 systemd[1]: Created slice kubepods-besteffort-pod964d760a_5b71_47cc_8a08_26a8162962f9.slice. Oct 2 19:54:45.682280 kubelet[1864]: I1002 19:54:45.682198 1864 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2njv\" (UniqueName: \"kubernetes.io/projected/964d760a-5b71-47cc-8a08-26a8162962f9-kube-api-access-b2njv\") pod \"nginx-deployment-8ffc5cf85-r4gcv\" (UID: \"964d760a-5b71-47cc-8a08-26a8162962f9\") " pod="default/nginx-deployment-8ffc5cf85-r4gcv" Oct 2 19:54:45.817958 env[1442]: time="2023-10-02T19:54:45.817900774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-r4gcv,Uid:964d760a-5b71-47cc-8a08-26a8162962f9,Namespace:default,Attempt:0,}" Oct 2 19:54:46.031769 kubelet[1864]: E1002 19:54:46.031745 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:46.060937 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:54:46.060970 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidae9622afea: link becomes ready Oct 2 19:54:46.077270 systemd-networkd[1302]: calidae9622afea: Link UP Oct 2 19:54:46.077274 systemd-networkd[1302]: calidae9622afea: Gained carrier Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.858 [INFO][2989] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0 nginx-deployment-8ffc5cf85- default 964d760a-5b71-47cc-8a08-26a8162962f9 1746 0 2023-10-02 19:54:45 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.189 nginx-deployment-8ffc5cf85-r4gcv eth0 default [] [] [kns.default ksa.default.default] calidae9622afea [] []}} ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.858 [INFO][2989] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.917 [INFO][3009] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" HandleID="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Workload="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.942 [INFO][3009] ipam_plugin.go 269: Auto assigning IP ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" HandleID="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Workload="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dfc0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.189", "pod":"nginx-deployment-8ffc5cf85-r4gcv", "timestamp":"2023-10-02 19:54:45.917460552 +0000 UTC"}, Hostname:"10.67.124.189", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:54:46.088237 env[1442]: time="2023-10-02T19:54:45Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:54:46.088237 env[1442]: time="2023-10-02T19:54:45Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.942 [INFO][3009] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.189' Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.947 [INFO][3009] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.956 [INFO][3009] ipam.go 372: Looking up existing affinities for host host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.966 [INFO][3009] ipam.go 489: Trying affinity for 192.168.27.192/26 host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.970 [INFO][3009] ipam.go 155: Attempting to load block cidr=192.168.27.192/26 host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.975 [INFO][3009] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.192/26 host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.975 [INFO][3009] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.192/26 handle="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.979 [INFO][3009] ipam.go 1682: Creating new handle: k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.987 [INFO][3009] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.192/26 handle="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.997 [INFO][3009] ipam.go 1216: Successfully claimed IPs: [192.168.27.193/26] block=192.168.27.192/26 handle="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.997 [INFO][3009] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.193/26] handle="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" host="10.67.124.189" Oct 2 19:54:46.088237 env[1442]: time="2023-10-02T19:54:45Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:54:46.088237 env[1442]: 2023-10-02 19:54:45.997 [INFO][3009] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.27.193/26] IPv6=[] ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" HandleID="k8s-pod-network.6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Workload="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.088664 env[1442]: 2023-10-02 19:54:46.003 [INFO][2989] k8s.go 383: Populated endpoint ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"964d760a-5b71-47cc-8a08-26a8162962f9", ResourceVersion:"1746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 54, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.189", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-r4gcv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidae9622afea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:54:46.088664 env[1442]: 2023-10-02 19:54:46.003 [INFO][2989] k8s.go 384: Calico CNI using IPs: [192.168.27.193/32] ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.088664 env[1442]: 2023-10-02 19:54:46.003 [INFO][2989] dataplane_linux.go 68: Setting the host side veth name to calidae9622afea ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.088664 env[1442]: 2023-10-02 19:54:46.061 [INFO][2989] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.088664 env[1442]: 2023-10-02 19:54:46.077 [INFO][2989] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"964d760a-5b71-47cc-8a08-26a8162962f9", ResourceVersion:"1746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 54, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.189", ContainerID:"6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c", Pod:"nginx-deployment-8ffc5cf85-r4gcv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidae9622afea", MAC:"72:16:9d:0b:35:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:54:46.088664 env[1442]: 2023-10-02 19:54:46.087 [INFO][2989] k8s.go 489: Wrote updated endpoint to datastore ContainerID="6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-r4gcv" WorkloadEndpoint="10.67.124.189-k8s-nginx--deployment--8ffc5cf85--r4gcv-eth0" Oct 2 19:54:46.094363 env[1442]: time="2023-10-02T19:54:46.094272072Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:54:46.094363 env[1442]: time="2023-10-02T19:54:46.094293907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:54:46.094363 env[1442]: time="2023-10-02T19:54:46.094300699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:54:46.094478 env[1442]: time="2023-10-02T19:54:46.094364201Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c pid=3053 runtime=io.containerd.runc.v2 Oct 2 19:54:46.093000 audit[3059]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=3059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:54:46.093000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7fffbbc9eac0 a2=0 a3=7fffbbc9eaac items=0 ppid=2732 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:46.093000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:54:46.113766 systemd[1]: Started cri-containerd-6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c.scope. Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit: BPF prog-id=88 op=LOAD Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3053 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:46.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656461363430663362613032346538343034313861313862663530 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3053 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:46.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656461363430663362613032346538343034313861313862663530 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit: BPF prog-id=89 op=LOAD Oct 2 19:54:46.118000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002b0720 items=0 ppid=3053 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:46.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656461363430663362613032346538343034313861313862663530 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit: BPF prog-id=90 op=LOAD Oct 2 19:54:46.118000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002b0768 items=0 ppid=3053 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:46.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656461363430663362613032346538343034313861313862663530 Oct 2 19:54:46.118000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:54:46.118000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:46.118000 audit: BPF prog-id=91 op=LOAD Oct 2 19:54:46.118000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002b0b78 items=0 ppid=3053 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:46.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656461363430663362613032346538343034313861313862663530 Oct 2 19:54:46.154715 env[1442]: time="2023-10-02T19:54:46.154683819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-r4gcv,Uid:964d760a-5b71-47cc-8a08-26a8162962f9,Namespace:default,Attempt:0,} returns sandbox id \"6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c\"" Oct 2 19:54:46.155558 env[1442]: time="2023-10-02T19:54:46.155513094Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:54:46.787178 systemd-networkd[1302]: vxlan.calico: Gained IPv6LL Oct 2 19:54:47.032663 kubelet[1864]: E1002 19:54:47.032631 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:47.938742 systemd-networkd[1302]: calidae9622afea: Gained IPv6LL Oct 2 19:54:48.033204 kubelet[1864]: E1002 19:54:48.033155 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:48.400170 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2478753769.mount: Deactivated successfully. Oct 2 19:54:48.923750 env[1442]: time="2023-10-02T19:54:48.923686439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:48.924345 env[1442]: time="2023-10-02T19:54:48.924311314Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:48.925536 env[1442]: time="2023-10-02T19:54:48.925495786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:48.926348 env[1442]: time="2023-10-02T19:54:48.926299179Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:54:48.927167 env[1442]: time="2023-10-02T19:54:48.927125098Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:54:48.928281 env[1442]: time="2023-10-02T19:54:48.928241015Z" level=info msg="CreateContainer within sandbox \"6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:54:48.932196 env[1442]: time="2023-10-02T19:54:48.932154161Z" level=info msg="CreateContainer within sandbox \"6eeda640f3ba024e840418a18bf50bc6ee518cd16b0a8cd6e1b5080ac98f305c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"dd91f120b7420b1c220119975293e04bac6105187e6ee3bee4e4bb7cd24cf73c\"" Oct 2 19:54:48.932440 env[1442]: time="2023-10-02T19:54:48.932401062Z" level=info msg="StartContainer for \"dd91f120b7420b1c220119975293e04bac6105187e6ee3bee4e4bb7cd24cf73c\"" Oct 2 19:54:48.952581 systemd[1]: Started cri-containerd-dd91f120b7420b1c220119975293e04bac6105187e6ee3bee4e4bb7cd24cf73c.scope. Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.985411 kernel: kauditd_printk_skb: 211 callbacks suppressed Oct 2 19:54:48.985452 kernel: audit: type=1400 audit(1696276488.957:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.033917 kubelet[1864]: E1002 19:54:49.033875 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.109508 kernel: audit: type=1400 audit(1696276488.957:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.109537 kernel: audit: type=1400 audit(1696276488.957:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.171262 kernel: audit: type=1400 audit(1696276488.957:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.233298 kernel: audit: type=1400 audit(1696276488.957:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.295390 kernel: audit: type=1400 audit(1696276488.957:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.358122 kernel: audit: type=1400 audit(1696276488.957:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.420928 kernel: audit: type=1400 audit(1696276488.957:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.484457 kernel: audit: type=1400 audit(1696276488.957:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.547134 kernel: audit: type=1400 audit(1696276489.046:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit: BPF prog-id=92 op=LOAD Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3053 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:49.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393166313230623734323062316332323031313939373532393365 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3053 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:49.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393166313230623734323062316332323031313939373532393365 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.046000 audit: BPF prog-id=93 op=LOAD Oct 2 19:54:49.046000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca0a0 items=0 ppid=3053 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:49.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393166313230623734323062316332323031313939373532393365 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.169000 audit: BPF prog-id=94 op=LOAD Oct 2 19:54:49.169000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca0e8 items=0 ppid=3053 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:49.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393166313230623734323062316332323031313939373532393365 Oct 2 19:54:49.293000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:54:49.293000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:49.293000 audit: BPF prog-id=95 op=LOAD Oct 2 19:54:49.293000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca4f8 items=0 ppid=3053 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:49.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393166313230623734323062316332323031313939373532393365 Oct 2 19:54:49.626443 env[1442]: time="2023-10-02T19:54:49.626395141Z" level=info msg="StartContainer for \"dd91f120b7420b1c220119975293e04bac6105187e6ee3bee4e4bb7cd24cf73c\" returns successfully" Oct 2 19:54:50.034795 kubelet[1864]: E1002 19:54:50.034746 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:50.335539 kubelet[1864]: I1002 19:54:50.335347 1864 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-r4gcv" podStartSLOduration=-9.223372031519506e+09 pod.CreationTimestamp="2023-10-02 19:54:45 +0000 UTC" firstStartedPulling="2023-10-02 19:54:46.155360884 +0000 UTC m=+66.502644053" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:54:50.334837813 +0000 UTC m=+70.682121094" watchObservedRunningTime="2023-10-02 19:54:50.335269803 +0000 UTC m=+70.682553014" Oct 2 19:54:51.036021 kubelet[1864]: E1002 19:54:51.035910 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:52.036228 kubelet[1864]: E1002 19:54:52.036119 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:53.037154 kubelet[1864]: E1002 19:54:53.037047 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:53.128834 env[1442]: time="2023-10-02T19:54:53.128701679Z" level=info msg="StopPodSandbox for \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\"" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.169 [INFO][3226] k8s.go 576: Cleaning up netns ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.169 [INFO][3226] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" iface="eth0" netns="/var/run/netns/cni-f2bb95d9-f71f-1e9f-725b-488fbdb17272" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.169 [INFO][3226] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" iface="eth0" netns="/var/run/netns/cni-f2bb95d9-f71f-1e9f-725b-488fbdb17272" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.169 [INFO][3226] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" iface="eth0" netns="/var/run/netns/cni-f2bb95d9-f71f-1e9f-725b-488fbdb17272" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.169 [INFO][3226] k8s.go 583: Releasing IP address(es) ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.169 [INFO][3226] utils.go 196: Calico CNI releasing IP address ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.180 [INFO][3242] ipam_plugin.go 416: Releasing address using handleID ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" HandleID="k8s-pod-network.9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Workload="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.188471 env[1442]: time="2023-10-02T19:54:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:54:53.188471 env[1442]: time="2023-10-02T19:54:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.185 [WARNING][3242] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" HandleID="k8s-pod-network.9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Workload="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.185 [INFO][3242] ipam_plugin.go 444: Releasing address using workloadID ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" HandleID="k8s-pod-network.9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Workload="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.188471 env[1442]: time="2023-10-02T19:54:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:54:53.188471 env[1442]: 2023-10-02 19:54:53.187 [INFO][3226] k8s.go 589: Teardown processing complete. ContainerID="9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2" Oct 2 19:54:53.188793 env[1442]: time="2023-10-02T19:54:53.188502503Z" level=info msg="TearDown network for sandbox \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\" successfully" Oct 2 19:54:53.188793 env[1442]: time="2023-10-02T19:54:53.188525952Z" level=info msg="StopPodSandbox for \"9b058135b6cd9efa7d39dc95ccf2b3e77fe7a2020b50c1fedf149011e996ede2\" returns successfully" Oct 2 19:54:53.189049 env[1442]: time="2023-10-02T19:54:53.188998751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6nfww,Uid:bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c,Namespace:calico-system,Attempt:1,}" Oct 2 19:54:53.189445 systemd[1]: run-netns-cni\x2df2bb95d9\x2df71f\x2d1e9f\x2d725b\x2d488fbdb17272.mount: Deactivated successfully. Oct 2 19:54:53.382691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:54:53.382753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0157e9ef1cb: link becomes ready Oct 2 19:54:53.397379 systemd-networkd[1302]: cali0157e9ef1cb: Link UP Oct 2 19:54:53.397399 systemd-networkd[1302]: cali0157e9ef1cb: Gained carrier Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.214 [INFO][3255] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.189-k8s-csi--node--driver--6nfww-eth0 csi-node-driver- calico-system bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c 1780 0 2023-10-02 19:54:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.189 csi-node-driver-6nfww eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0157e9ef1cb [] []}} ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.214 [INFO][3255] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.234 [INFO][3274] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" HandleID="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Workload="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.252 [INFO][3274] ipam_plugin.go 269: Auto assigning IP ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" HandleID="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Workload="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00014b150), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.189", "pod":"csi-node-driver-6nfww", "timestamp":"2023-10-02 19:54:53.234119385 +0000 UTC"}, Hostname:"10.67.124.189", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:54:53.414869 env[1442]: time="2023-10-02T19:54:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:54:53.414869 env[1442]: time="2023-10-02T19:54:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.252 [INFO][3274] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.189' Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.255 [INFO][3274] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.262 [INFO][3274] ipam.go 372: Looking up existing affinities for host host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.271 [INFO][3274] ipam.go 489: Trying affinity for 192.168.27.192/26 host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.276 [INFO][3274] ipam.go 155: Attempting to load block cidr=192.168.27.192/26 host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.281 [INFO][3274] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.192/26 host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.282 [INFO][3274] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.192/26 handle="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.285 [INFO][3274] ipam.go 1682: Creating new handle: k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94 Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.294 [INFO][3274] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.192/26 handle="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.306 [INFO][3274] ipam.go 1216: Successfully claimed IPs: [192.168.27.194/26] block=192.168.27.192/26 handle="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.306 [INFO][3274] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.194/26] handle="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" host="10.67.124.189" Oct 2 19:54:53.414869 env[1442]: time="2023-10-02T19:54:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:54:53.414869 env[1442]: 2023-10-02 19:54:53.306 [INFO][3274] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.27.194/26] IPv6=[] ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" HandleID="k8s-pod-network.bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Workload="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.415229 env[1442]: 2023-10-02 19:54:53.310 [INFO][3255] k8s.go 383: Populated endpoint ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189-k8s-csi--node--driver--6nfww-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c", ResourceVersion:"1780", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 54, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.189", ContainerID:"", Pod:"csi-node-driver-6nfww", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0157e9ef1cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:54:53.415229 env[1442]: 2023-10-02 19:54:53.310 [INFO][3255] k8s.go 384: Calico CNI using IPs: [192.168.27.194/32] ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.415229 env[1442]: 2023-10-02 19:54:53.310 [INFO][3255] dataplane_linux.go 68: Setting the host side veth name to cali0157e9ef1cb ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.415229 env[1442]: 2023-10-02 19:54:53.382 [INFO][3255] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.415229 env[1442]: 2023-10-02 19:54:53.397 [INFO][3255] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.189-k8s-csi--node--driver--6nfww-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c", ResourceVersion:"1780", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 54, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.189", ContainerID:"bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94", Pod:"csi-node-driver-6nfww", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0157e9ef1cb", MAC:"56:45:c3:1a:b4:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:54:53.415229 env[1442]: 2023-10-02 19:54:53.414 [INFO][3255] k8s.go 489: Wrote updated endpoint to datastore ContainerID="bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94" Namespace="calico-system" Pod="csi-node-driver-6nfww" WorkloadEndpoint="10.67.124.189-k8s-csi--node--driver--6nfww-eth0" Oct 2 19:54:53.420287 env[1442]: time="2023-10-02T19:54:53.420250146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:54:53.420287 env[1442]: time="2023-10-02T19:54:53.420270664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:54:53.420287 env[1442]: time="2023-10-02T19:54:53.420277412Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:54:53.420401 env[1442]: time="2023-10-02T19:54:53.420351137Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94 pid=3318 runtime=io.containerd.runc.v2 Oct 2 19:54:53.420000 audit[3327]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=3327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:54:53.420000 audit[3327]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd8bdcf0b0 a2=0 a3=7ffd8bdcf09c items=0 ppid=2732 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:53.420000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:54:53.439313 systemd[1]: Started cri-containerd-bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94.scope. Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit: BPF prog-id=96 op=LOAD Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3318 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:53.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333766653232343561393537316363393635376233333133353763 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3318 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:53.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333766653232343561393537316363393635376233333133353763 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit: BPF prog-id=97 op=LOAD Oct 2 19:54:53.442000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000983e0 items=0 ppid=3318 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:53.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333766653232343561393537316363393635376233333133353763 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit: BPF prog-id=98 op=LOAD Oct 2 19:54:53.442000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098428 items=0 ppid=3318 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:53.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333766653232343561393537316363393635376233333133353763 Oct 2 19:54:53.442000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:54:53.442000 audit: BPF prog-id=97 op=UNLOAD Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:54:53.442000 audit: BPF prog-id=99 op=LOAD Oct 2 19:54:53.442000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098838 items=0 ppid=3318 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:53.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333766653232343561393537316363393635376233333133353763 Oct 2 19:54:53.461944 env[1442]: time="2023-10-02T19:54:53.461877169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6nfww,Uid:bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c,Namespace:calico-system,Attempt:1,} returns sandbox id \"bf37fe2245a9571cc9657b331357c329fcf009faa0336e60a0c3818e4aafad94\"" Oct 2 19:54:53.462791 env[1442]: time="2023-10-02T19:54:53.462744242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:54:53.711310 env[1442]: time="2023-10-02T19:54:53.711077943Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:54:53.712122 env[1442]: time="2023-10-02T19:54:53.712015660Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:54:53.712624 kubelet[1864]: E1002 19:54:53.712539 1864 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:54:53.712786 kubelet[1864]: E1002 19:54:53.712676 1864 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:54:53.712957 kubelet[1864]: E1002 19:54:53.712899 1864 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-wm5k8,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-6nfww_calico-system(bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:54:53.714642 env[1442]: time="2023-10-02T19:54:53.714542531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:54:53.990703 env[1442]: time="2023-10-02T19:54:53.990409193Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:54:53.991768 env[1442]: time="2023-10-02T19:54:53.991636150Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:54:53.992178 kubelet[1864]: E1002 19:54:53.992120 1864 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:54:53.992333 kubelet[1864]: E1002 19:54:53.992219 1864 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:54:53.992439 kubelet[1864]: E1002 19:54:53.992413 1864 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wm5k8,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-6nfww_calico-system(bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:54:53.992798 kubelet[1864]: E1002 19:54:53.992591 1864 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-6nfww" podUID=bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c Oct 2 19:54:54.038115 kubelet[1864]: E1002 19:54:54.037998 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:54.335939 kubelet[1864]: E1002 19:54:54.335886 1864 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-6nfww" podUID=bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c Oct 2 19:54:55.038335 kubelet[1864]: E1002 19:54:55.038236 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:55.298942 systemd-networkd[1302]: cali0157e9ef1cb: Gained IPv6LL Oct 2 19:54:55.338430 kubelet[1864]: E1002 19:54:55.338339 1864 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-6nfww" podUID=bfbec99e-3f87-4a0b-8ebd-b49b4c276d1c Oct 2 19:54:56.039219 kubelet[1864]: E1002 19:54:56.039114 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:54:57.040002 kubelet[1864]: E1002 19:54:57.039937 1864 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"