Oct 2 19:19:31.109521 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:19:31.109576 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:19:31.109593 kernel: BIOS-provided physical RAM map: Oct 2 19:19:31.109604 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Oct 2 19:19:31.109617 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Oct 2 19:19:31.109630 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Oct 2 19:19:31.109649 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Oct 2 19:19:31.109662 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Oct 2 19:19:31.109675 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Oct 2 19:19:31.109687 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Oct 2 19:19:31.109727 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Oct 2 19:19:31.109739 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Oct 2 19:19:31.109751 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Oct 2 19:19:31.109764 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Oct 2 19:19:31.109784 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Oct 2 19:19:31.109798 kernel: NX (Execute Disable) protection: active Oct 2 19:19:31.109812 kernel: efi: EFI v2.70 by EDK II Oct 2 19:19:31.109827 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe386218 RNG=0xbfb73018 TPMEventLog=0xbe2c8018 Oct 2 19:19:31.109841 kernel: random: crng init done Oct 2 19:19:31.109854 kernel: SMBIOS 2.4 present. Oct 2 19:19:31.109868 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Oct 2 19:19:31.109882 kernel: Hypervisor detected: KVM Oct 2 19:19:31.109900 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:19:31.109914 kernel: kvm-clock: cpu 0, msr 44f8a001, primary cpu clock Oct 2 19:19:31.109928 kernel: kvm-clock: using sched offset of 12467349088 cycles Oct 2 19:19:31.109943 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:19:31.109958 kernel: tsc: Detected 2299.998 MHz processor Oct 2 19:19:31.109972 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:19:31.109987 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:19:31.110002 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Oct 2 19:19:31.110016 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:19:31.110031 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Oct 2 19:19:31.110048 kernel: Using GB pages for direct mapping Oct 2 19:19:31.110062 kernel: Secure boot disabled Oct 2 19:19:31.110076 kernel: ACPI: Early table checksum verification disabled Oct 2 19:19:31.110089 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Oct 2 19:19:31.110103 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Oct 2 19:19:31.110117 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Oct 2 19:19:31.110132 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Oct 2 19:19:31.110147 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Oct 2 19:19:31.110172 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Oct 2 19:19:31.110188 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Oct 2 19:19:31.110203 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Oct 2 19:19:31.110219 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Oct 2 19:19:31.110236 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Oct 2 19:19:31.110252 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Oct 2 19:19:31.110271 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Oct 2 19:19:31.110287 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Oct 2 19:19:31.110302 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Oct 2 19:19:31.110318 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Oct 2 19:19:31.110334 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Oct 2 19:19:31.110348 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Oct 2 19:19:31.110364 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Oct 2 19:19:31.110379 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Oct 2 19:19:31.110395 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Oct 2 19:19:31.110415 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:19:31.110430 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:19:31.110445 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 2 19:19:31.110461 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Oct 2 19:19:31.110477 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Oct 2 19:19:31.110493 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Oct 2 19:19:31.110510 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Oct 2 19:19:31.110526 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Oct 2 19:19:31.110542 kernel: Zone ranges: Oct 2 19:19:31.110562 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:19:31.110585 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:19:31.110601 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:19:31.110616 kernel: Movable zone start for each node Oct 2 19:19:31.110632 kernel: Early memory node ranges Oct 2 19:19:31.110648 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Oct 2 19:19:31.110664 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Oct 2 19:19:31.110680 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Oct 2 19:19:31.110709 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Oct 2 19:19:31.113771 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:19:31.113792 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Oct 2 19:19:31.113808 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:19:31.113825 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Oct 2 19:19:31.113841 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Oct 2 19:19:31.113858 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Oct 2 19:19:31.113874 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Oct 2 19:19:31.113888 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:19:31.113903 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:19:31.113922 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:19:31.113937 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:19:31.113952 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:19:31.113977 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:19:31.113993 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:19:31.114008 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:19:31.114025 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:19:31.114041 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Oct 2 19:19:31.114057 kernel: Booting paravirtualized kernel on KVM Oct 2 19:19:31.114078 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:19:31.114096 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:19:31.114111 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:19:31.114127 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:19:31.114144 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:19:31.114161 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:19:31.114178 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:19:31.114194 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Oct 2 19:19:31.114210 kernel: Policy zone: Normal Oct 2 19:19:31.114232 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:19:31.114248 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:19:31.114264 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:19:31.114280 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:19:31.114296 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:19:31.114312 kernel: Memory: 7536576K/7860584K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 323748K reserved, 0K cma-reserved) Oct 2 19:19:31.114325 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:19:31.114342 kernel: Kernel/User page tables isolation: enabled Oct 2 19:19:31.114361 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:19:31.114377 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:19:31.114392 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:19:31.114407 kernel: rcu: RCU event tracing is enabled. Oct 2 19:19:31.114446 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:19:31.114461 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:19:31.114477 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:19:31.114491 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:19:31.114507 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:19:31.114528 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:19:31.114556 kernel: Console: colour dummy device 80x25 Oct 2 19:19:31.114580 kernel: printk: console [ttyS0] enabled Oct 2 19:19:31.114600 kernel: ACPI: Core revision 20210730 Oct 2 19:19:31.114616 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:19:31.114632 kernel: x2apic enabled Oct 2 19:19:31.114649 kernel: Switched APIC routing to physical x2apic. Oct 2 19:19:31.114664 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Oct 2 19:19:31.114680 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:19:31.114712 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Oct 2 19:19:31.114732 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Oct 2 19:19:31.114749 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Oct 2 19:19:31.114765 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:19:31.114781 kernel: Spectre V2 : Mitigation: IBRS Oct 2 19:19:31.114798 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:19:31.114814 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:19:31.114833 kernel: RETBleed: Mitigation: IBRS Oct 2 19:19:31.114849 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:19:31.114865 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Oct 2 19:19:31.114881 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:19:31.114897 kernel: MDS: Mitigation: Clear CPU buffers Oct 2 19:19:31.114913 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:19:31.114929 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:19:31.114944 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:19:31.114960 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:19:31.114980 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:19:31.114996 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:19:31.115012 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:19:31.115028 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:19:31.115044 kernel: LSM: Security Framework initializing Oct 2 19:19:31.115059 kernel: SELinux: Initializing. Oct 2 19:19:31.115074 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:19:31.115090 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:19:31.115106 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Oct 2 19:19:31.115125 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Oct 2 19:19:31.115141 kernel: signal: max sigframe size: 1776 Oct 2 19:19:31.115158 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:19:31.115173 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:19:31.115189 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:19:31.115205 kernel: x86: Booting SMP configuration: Oct 2 19:19:31.115221 kernel: .... node #0, CPUs: #1 Oct 2 19:19:31.115237 kernel: kvm-clock: cpu 1, msr 44f8a041, secondary cpu clock Oct 2 19:19:31.115253 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:19:31.115275 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:19:31.115291 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:19:31.115306 kernel: smpboot: Max logical packages: 1 Oct 2 19:19:31.115322 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Oct 2 19:19:31.115338 kernel: devtmpfs: initialized Oct 2 19:19:31.115354 kernel: x86/mm: Memory block size: 128MB Oct 2 19:19:31.115370 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Oct 2 19:19:31.115386 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:19:31.115402 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:19:31.115422 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:19:31.115438 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:19:31.115454 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:19:31.115470 kernel: audit: type=2000 audit(1696274369.999:1): state=initialized audit_enabled=0 res=1 Oct 2 19:19:31.115486 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:19:31.115503 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:19:31.115519 kernel: cpuidle: using governor menu Oct 2 19:19:31.115535 kernel: ACPI: bus type PCI registered Oct 2 19:19:31.115550 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:19:31.115575 kernel: dca service started, version 1.12.1 Oct 2 19:19:31.115591 kernel: PCI: Using configuration type 1 for base access Oct 2 19:19:31.115607 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:19:31.115623 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:19:31.115638 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:19:31.115654 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:19:31.115670 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:19:31.115687 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:19:31.115713 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:19:31.115732 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:19:31.115748 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:19:31.115764 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:19:31.115780 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:19:31.115796 kernel: ACPI: Interpreter enabled Oct 2 19:19:31.115812 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:19:31.115828 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:19:31.115844 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:19:31.115860 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:19:31.116762 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:19:31.117007 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:19:31.117174 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:19:31.117198 kernel: PCI host bridge to bus 0000:00 Oct 2 19:19:31.117359 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:19:31.117506 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:19:31.117669 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:19:31.124883 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Oct 2 19:19:31.125134 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:19:31.125323 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:19:31.125490 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Oct 2 19:19:31.125664 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:19:31.125847 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:19:31.126024 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Oct 2 19:19:31.126179 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Oct 2 19:19:31.126339 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Oct 2 19:19:31.126511 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:19:31.126679 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Oct 2 19:19:31.126859 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Oct 2 19:19:31.127026 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:19:31.127184 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:19:31.127337 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Oct 2 19:19:31.127358 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:19:31.127376 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:19:31.127393 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:19:31.127410 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:19:31.127427 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:19:31.127448 kernel: iommu: Default domain type: Translated Oct 2 19:19:31.127465 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:19:31.127482 kernel: vgaarb: loaded Oct 2 19:19:31.127500 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:19:31.127517 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:19:31.127542 kernel: PTP clock support registered Oct 2 19:19:31.127559 kernel: Registered efivars operations Oct 2 19:19:31.127576 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:19:31.127593 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:19:31.127614 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Oct 2 19:19:31.127631 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Oct 2 19:19:31.127647 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Oct 2 19:19:31.127663 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Oct 2 19:19:31.127680 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:19:31.127716 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:19:31.127734 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:19:31.127752 kernel: pnp: PnP ACPI init Oct 2 19:19:31.127769 kernel: pnp: PnP ACPI: found 7 devices Oct 2 19:19:31.127790 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:19:31.127807 kernel: NET: Registered PF_INET protocol family Oct 2 19:19:31.127824 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:19:31.127841 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:19:31.127859 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:19:31.127876 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:19:31.127893 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:19:31.127910 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:19:31.127927 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:19:31.127947 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:19:31.127964 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:19:31.127981 kernel: NET: Registered PF_XDP protocol family Oct 2 19:19:31.128130 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:19:31.128270 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:19:31.128408 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:19:31.128553 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Oct 2 19:19:31.128750 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:19:31.128778 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:19:31.128796 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:19:31.128814 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Oct 2 19:19:31.128832 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:19:31.128849 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:19:31.128866 kernel: clocksource: Switched to clocksource tsc Oct 2 19:19:31.128884 kernel: Initialise system trusted keyrings Oct 2 19:19:31.128901 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:19:31.128921 kernel: Key type asymmetric registered Oct 2 19:19:31.128938 kernel: Asymmetric key parser 'x509' registered Oct 2 19:19:31.128955 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:19:31.128972 kernel: io scheduler mq-deadline registered Oct 2 19:19:31.128989 kernel: io scheduler kyber registered Oct 2 19:19:31.129006 kernel: io scheduler bfq registered Oct 2 19:19:31.129023 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:19:31.129041 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:19:31.129200 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Oct 2 19:19:31.129225 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:19:31.129376 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Oct 2 19:19:31.129397 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:19:31.129558 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Oct 2 19:19:31.129579 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:19:31.129596 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:19:31.129611 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:19:31.129625 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Oct 2 19:19:31.129638 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Oct 2 19:19:31.129849 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Oct 2 19:19:31.129873 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:19:31.129888 kernel: i8042: Warning: Keylock active Oct 2 19:19:31.129904 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:19:31.129919 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:19:31.130077 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:19:31.130218 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:19:31.130364 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:19:30 UTC (1696274370) Oct 2 19:19:31.130501 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:19:31.130528 kernel: intel_pstate: CPU model not supported Oct 2 19:19:31.130546 kernel: pstore: Registered efi as persistent store backend Oct 2 19:19:31.130562 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:19:31.130578 kernel: Segment Routing with IPv6 Oct 2 19:19:31.130594 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:19:31.130611 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:19:31.130627 kernel: Key type dns_resolver registered Oct 2 19:19:31.130647 kernel: IPI shorthand broadcast: enabled Oct 2 19:19:31.130664 kernel: sched_clock: Marking stable (723789353, 152678760)->(913050985, -36582872) Oct 2 19:19:31.130680 kernel: registered taskstats version 1 Oct 2 19:19:31.130709 kernel: Loading compiled-in X.509 certificates Oct 2 19:19:31.130726 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:19:31.130743 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:19:31.130759 kernel: Key type .fscrypt registered Oct 2 19:19:31.130775 kernel: Key type fscrypt-provisioning registered Oct 2 19:19:31.130791 kernel: pstore: Using crash dump compression: deflate Oct 2 19:19:31.130811 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:19:31.130828 kernel: ima: No architecture policies found Oct 2 19:19:31.130844 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:19:31.130859 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:19:31.130876 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:19:31.130892 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:19:31.130908 kernel: Run /init as init process Oct 2 19:19:31.130924 kernel: with arguments: Oct 2 19:19:31.130944 kernel: /init Oct 2 19:19:31.130959 kernel: with environment: Oct 2 19:19:31.130975 kernel: HOME=/ Oct 2 19:19:31.130991 kernel: TERM=linux Oct 2 19:19:31.131007 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:19:31.131027 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:19:31.131047 systemd[1]: Detected virtualization kvm. Oct 2 19:19:31.131064 systemd[1]: Detected architecture x86-64. Oct 2 19:19:31.131084 systemd[1]: Running in initrd. Oct 2 19:19:31.131101 systemd[1]: No hostname configured, using default hostname. Oct 2 19:19:31.131117 systemd[1]: Hostname set to . Oct 2 19:19:31.131135 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:19:31.131151 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:19:31.131168 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:19:31.131185 systemd[1]: Reached target cryptsetup.target. Oct 2 19:19:31.131201 systemd[1]: Reached target paths.target. Oct 2 19:19:31.131220 systemd[1]: Reached target slices.target. Oct 2 19:19:31.131238 systemd[1]: Reached target swap.target. Oct 2 19:19:31.131256 systemd[1]: Reached target timers.target. Oct 2 19:19:31.131274 systemd[1]: Listening on iscsid.socket. Oct 2 19:19:31.131294 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:19:31.131312 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:19:31.131332 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:19:31.131351 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:19:31.131371 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:19:31.131387 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:19:31.131403 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:19:31.131420 systemd[1]: Reached target sockets.target. Oct 2 19:19:31.131436 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:19:31.131453 systemd[1]: Finished network-cleanup.service. Oct 2 19:19:31.131471 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:19:31.131488 systemd[1]: Starting systemd-journald.service... Oct 2 19:19:31.131506 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:19:31.131535 kernel: audit: type=1334 audit(1696274371.093:2): prog-id=6 op=LOAD Oct 2 19:19:31.131554 systemd[1]: Starting systemd-resolved.service... Oct 2 19:19:31.131591 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:19:31.131613 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:19:31.131633 kernel: audit: type=1130 audit(1696274371.119:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.131652 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:19:31.131682 systemd-journald[189]: Journal started Oct 2 19:19:31.132854 systemd-journald[189]: Runtime Journal (/run/log/journal/322d9289fbe8dcc355909f3f44e2e335) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:19:31.132924 kernel: audit: type=1130 audit(1696274371.130:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.093000 audit: BPF prog-id=6 op=LOAD Oct 2 19:19:31.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.137719 systemd[1]: Started systemd-journald.service. Oct 2 19:19:31.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.143728 kernel: audit: type=1130 audit(1696274371.137:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.143846 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:19:31.153849 kernel: audit: type=1130 audit(1696274371.145:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.144088 systemd-modules-load[190]: Inserted module 'overlay' Oct 2 19:19:31.148816 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:19:31.159179 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:19:31.174441 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:19:31.182753 kernel: audit: type=1130 audit(1696274371.173:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.180053 systemd-resolved[191]: Positive Trust Anchors: Oct 2 19:19:31.180066 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:19:31.180124 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:19:31.191918 systemd-resolved[191]: Defaulting to hostname 'linux'. Oct 2 19:19:31.193725 systemd[1]: Started systemd-resolved.service. Oct 2 19:19:31.194150 systemd[1]: Reached target nss-lookup.target. Oct 2 19:19:31.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.199714 kernel: audit: type=1130 audit(1696274371.192:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.208853 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:19:31.208623 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:19:31.227836 kernel: Bridge firewalling registered Oct 2 19:19:31.227875 kernel: audit: type=1130 audit(1696274371.211:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.211881 systemd-modules-load[190]: Inserted module 'br_netfilter' Oct 2 19:19:31.214219 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:19:31.239720 dracut-cmdline[205]: dracut-dracut-053 Oct 2 19:19:31.244712 kernel: SCSI subsystem initialized Oct 2 19:19:31.244871 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:19:31.263487 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:19:31.263565 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:19:31.264387 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:19:31.270663 systemd-modules-load[190]: Inserted module 'dm_multipath' Oct 2 19:19:31.271731 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:19:31.291868 kernel: audit: type=1130 audit(1696274371.279:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.282131 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:19:31.298451 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:19:31.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.340735 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:19:31.353726 kernel: iscsi: registered transport (tcp) Oct 2 19:19:31.378032 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:19:31.378127 kernel: QLogic iSCSI HBA Driver Oct 2 19:19:31.422954 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:19:31.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.425191 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:19:31.482752 kernel: raid6: avx2x4 gen() 18332 MB/s Oct 2 19:19:31.500767 kernel: raid6: avx2x4 xor() 6903 MB/s Oct 2 19:19:31.517759 kernel: raid6: avx2x2 gen() 17998 MB/s Oct 2 19:19:31.534761 kernel: raid6: avx2x2 xor() 18371 MB/s Oct 2 19:19:31.551732 kernel: raid6: avx2x1 gen() 14131 MB/s Oct 2 19:19:31.568735 kernel: raid6: avx2x1 xor() 16159 MB/s Oct 2 19:19:31.585746 kernel: raid6: sse2x4 gen() 11078 MB/s Oct 2 19:19:31.602736 kernel: raid6: sse2x4 xor() 6757 MB/s Oct 2 19:19:31.619734 kernel: raid6: sse2x2 gen() 12137 MB/s Oct 2 19:19:31.636738 kernel: raid6: sse2x2 xor() 7472 MB/s Oct 2 19:19:31.653735 kernel: raid6: sse2x1 gen() 10584 MB/s Oct 2 19:19:31.671207 kernel: raid6: sse2x1 xor() 5191 MB/s Oct 2 19:19:31.671249 kernel: raid6: using algorithm avx2x4 gen() 18332 MB/s Oct 2 19:19:31.671271 kernel: raid6: .... xor() 6903 MB/s, rmw enabled Oct 2 19:19:31.672266 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:19:31.687737 kernel: xor: automatically using best checksumming function avx Oct 2 19:19:31.793734 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:19:31.805715 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:19:31.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.805000 audit: BPF prog-id=7 op=LOAD Oct 2 19:19:31.805000 audit: BPF prog-id=8 op=LOAD Oct 2 19:19:31.807960 systemd[1]: Starting systemd-udevd.service... Oct 2 19:19:31.824213 systemd-udevd[388]: Using default interface naming scheme 'v252'. Oct 2 19:19:31.831236 systemd[1]: Started systemd-udevd.service. Oct 2 19:19:31.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.833913 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:19:31.858074 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Oct 2 19:19:31.897907 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:19:31.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.899349 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:19:31.964607 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:19:31.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:32.048726 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:19:32.063132 kernel: scsi host0: Virtio SCSI HBA Oct 2 19:19:32.081730 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Oct 2 19:19:32.156726 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:19:32.158722 kernel: AES CTR mode by8 optimization enabled Oct 2 19:19:32.167690 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Oct 2 19:19:32.168023 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Oct 2 19:19:32.168268 kernel: sd 0:0:1:0: [sda] Write Protect is off Oct 2 19:19:32.170729 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Oct 2 19:19:32.171022 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:19:32.179142 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:19:32.179214 kernel: GPT:17805311 != 25165823 Oct 2 19:19:32.179236 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:19:32.180937 kernel: GPT:17805311 != 25165823 Oct 2 19:19:32.180996 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:19:32.182871 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:19:32.187674 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Oct 2 19:19:32.237645 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:19:32.241995 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (447) Oct 2 19:19:32.249650 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:19:32.258802 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:19:32.269092 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:19:32.274673 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:19:32.280811 systemd[1]: Starting disk-uuid.service... Oct 2 19:19:32.292947 disk-uuid[507]: Primary Header is updated. Oct 2 19:19:32.292947 disk-uuid[507]: Secondary Entries is updated. Oct 2 19:19:32.292947 disk-uuid[507]: Secondary Header is updated. Oct 2 19:19:32.304805 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:19:32.326726 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:19:32.335738 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:19:33.335187 disk-uuid[508]: The operation has completed successfully. Oct 2 19:19:33.338844 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:19:33.404502 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:19:33.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.404646 systemd[1]: Finished disk-uuid.service. Oct 2 19:19:33.415821 systemd[1]: Starting verity-setup.service... Oct 2 19:19:33.444730 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:19:33.524811 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:19:33.527295 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:19:33.550520 systemd[1]: Finished verity-setup.service. Oct 2 19:19:33.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.634738 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:19:33.635295 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:19:33.635675 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:19:33.693012 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:19:33.693056 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:19:33.693079 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:19:33.693101 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:19:33.636627 systemd[1]: Starting ignition-setup.service... Oct 2 19:19:33.673997 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:19:33.705183 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:19:33.726022 systemd[1]: Finished ignition-setup.service. Oct 2 19:19:33.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.737107 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:19:33.796100 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:19:33.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.795000 audit: BPF prog-id=9 op=LOAD Oct 2 19:19:33.798479 systemd[1]: Starting systemd-networkd.service... Oct 2 19:19:33.834853 systemd-networkd[682]: lo: Link UP Oct 2 19:19:33.834867 systemd-networkd[682]: lo: Gained carrier Oct 2 19:19:33.835758 systemd-networkd[682]: Enumeration completed Oct 2 19:19:33.836161 systemd-networkd[682]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:19:33.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.836392 systemd[1]: Started systemd-networkd.service. Oct 2 19:19:33.838795 systemd-networkd[682]: eth0: Link UP Oct 2 19:19:33.838803 systemd-networkd[682]: eth0: Gained carrier Oct 2 19:19:33.849840 systemd-networkd[682]: eth0: DHCPv4 address 10.128.0.100/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:19:33.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.863060 systemd[1]: Reached target network.target. Oct 2 19:19:33.947976 iscsid[692]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:19:33.947976 iscsid[692]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:19:33.947976 iscsid[692]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:19:33.947976 iscsid[692]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:19:33.947976 iscsid[692]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:19:33.947976 iscsid[692]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:19:33.947976 iscsid[692]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:19:33.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.893114 systemd[1]: Starting iscsiuio.service... Oct 2 19:19:34.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.046272 ignition[628]: Ignition 2.14.0 Oct 2 19:19:34.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.906028 systemd[1]: Started iscsiuio.service. Oct 2 19:19:34.046287 ignition[628]: Stage: fetch-offline Oct 2 19:19:33.921353 systemd[1]: Starting iscsid.service... Oct 2 19:19:34.046383 ignition[628]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:19:33.940036 systemd[1]: Started iscsid.service. Oct 2 19:19:34.046434 ignition[628]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:19:33.956158 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:19:34.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.069747 ignition[628]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:19:34.021211 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:19:34.069954 ignition[628]: parsed url from cmdline: "" Oct 2 19:19:34.021612 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:19:34.069962 ignition[628]: no config URL provided Oct 2 19:19:34.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.044872 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:19:34.069971 ignition[628]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:19:34.063731 systemd[1]: Reached target remote-fs.target. Oct 2 19:19:34.069987 ignition[628]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:19:34.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.072975 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:19:34.069997 ignition[628]: failed to fetch config: resource requires networking Oct 2 19:19:34.093205 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:19:34.070368 ignition[628]: Ignition finished successfully Oct 2 19:19:34.112230 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:19:34.141600 ignition[707]: Ignition 2.14.0 Oct 2 19:19:34.129169 systemd[1]: Starting ignition-fetch.service... Oct 2 19:19:34.141610 ignition[707]: Stage: fetch Oct 2 19:19:34.174618 unknown[707]: fetched base config from "system" Oct 2 19:19:34.141775 ignition[707]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:19:34.174631 unknown[707]: fetched base config from "system" Oct 2 19:19:34.141807 ignition[707]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:19:34.174638 unknown[707]: fetched user config from "gcp" Oct 2 19:19:34.149643 ignition[707]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:19:34.177204 systemd[1]: Finished ignition-fetch.service. Oct 2 19:19:34.149862 ignition[707]: parsed url from cmdline: "" Oct 2 19:19:34.188217 systemd[1]: Starting ignition-kargs.service... Oct 2 19:19:34.149869 ignition[707]: no config URL provided Oct 2 19:19:34.220264 systemd[1]: Finished ignition-kargs.service. Oct 2 19:19:34.149877 ignition[707]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:19:34.237097 systemd[1]: Starting ignition-disks.service... Oct 2 19:19:34.149888 ignition[707]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:19:34.269217 systemd[1]: Finished ignition-disks.service. Oct 2 19:19:34.149927 ignition[707]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Oct 2 19:19:34.284050 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:19:34.156214 ignition[707]: GET result: OK Oct 2 19:19:34.299861 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:19:34.156319 ignition[707]: parsing config with SHA512: 978721fe15384923dd0a85326f54c8a1bd1be5f178787b83804529537cbb36c6c3f3706cd222acc12caecf432393133831a259a3f89051b38268a3eb5cd9ef49 Oct 2 19:19:34.313834 systemd[1]: Reached target local-fs.target. Oct 2 19:19:34.175348 ignition[707]: fetch: fetch complete Oct 2 19:19:34.328858 systemd[1]: Reached target sysinit.target. Oct 2 19:19:34.175355 ignition[707]: fetch: fetch passed Oct 2 19:19:34.342851 systemd[1]: Reached target basic.target. Oct 2 19:19:34.175407 ignition[707]: Ignition finished successfully Oct 2 19:19:34.344142 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:19:34.201451 ignition[713]: Ignition 2.14.0 Oct 2 19:19:34.201460 ignition[713]: Stage: kargs Oct 2 19:19:34.201598 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:19:34.201628 ignition[713]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:19:34.209179 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:19:34.210443 ignition[713]: kargs: kargs passed Oct 2 19:19:34.210492 ignition[713]: Ignition finished successfully Oct 2 19:19:34.249676 ignition[719]: Ignition 2.14.0 Oct 2 19:19:34.249686 ignition[719]: Stage: disks Oct 2 19:19:34.249851 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:19:34.249882 ignition[719]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:19:34.257172 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:19:34.258541 ignition[719]: disks: disks passed Oct 2 19:19:34.258594 ignition[719]: Ignition finished successfully Oct 2 19:19:34.386363 systemd-fsck[727]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:19:34.597686 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:19:34.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.607063 systemd[1]: Mounting sysroot.mount... Oct 2 19:19:34.635898 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:19:34.634912 systemd[1]: Mounted sysroot.mount. Oct 2 19:19:34.643177 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:19:34.661935 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:19:34.674379 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:19:34.674439 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:19:34.674472 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:19:34.760003 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (733) Oct 2 19:19:34.760037 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:19:34.760052 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:19:34.760066 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:19:34.690087 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:19:34.780873 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:19:34.712319 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:19:34.774192 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:19:34.805874 initrd-setup-root[756]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:19:34.801486 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:19:34.833855 initrd-setup-root[764]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:19:34.844828 initrd-setup-root[772]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:19:34.854871 initrd-setup-root[780]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:19:34.859019 systemd-networkd[682]: eth0: Gained IPv6LL Oct 2 19:19:34.876451 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:19:34.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.877717 systemd[1]: Starting ignition-mount.service... Oct 2 19:19:34.898949 systemd[1]: Starting sysroot-boot.service... Oct 2 19:19:34.913017 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:19:34.913170 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:19:34.939840 ignition[799]: INFO : Ignition 2.14.0 Oct 2 19:19:34.939840 ignition[799]: INFO : Stage: mount Oct 2 19:19:34.939840 ignition[799]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:19:34.939840 ignition[799]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:19:34.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:34.942482 systemd[1]: Finished sysroot-boot.service. Oct 2 19:19:35.003238 ignition[799]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:19:35.003238 ignition[799]: INFO : mount: mount passed Oct 2 19:19:35.003238 ignition[799]: INFO : Ignition finished successfully Oct 2 19:19:35.079903 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (808) Oct 2 19:19:35.079949 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:19:35.079975 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:19:35.079999 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:19:35.080024 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:19:34.948282 systemd[1]: Finished ignition-mount.service. Oct 2 19:19:34.961055 systemd[1]: Starting ignition-files.service... Oct 2 19:19:35.094917 ignition[827]: INFO : Ignition 2.14.0 Oct 2 19:19:35.094917 ignition[827]: INFO : Stage: files Oct 2 19:19:35.094917 ignition[827]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:19:35.094917 ignition[827]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:19:35.150836 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (830) Oct 2 19:19:34.987838 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:19:35.159867 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:19:35.159867 ignition[827]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:19:35.159867 ignition[827]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:19:35.159867 ignition[827]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:19:35.159867 ignition[827]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:19:35.159867 ignition[827]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:19:35.159867 ignition[827]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1782076122" Oct 2 19:19:35.159867 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1782076122": device or resource busy Oct 2 19:19:35.159867 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1782076122", trying btrfs: device or resource busy Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1782076122" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1782076122" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1782076122" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1782076122" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Oct 2 19:19:35.159867 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:19:35.059778 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:19:35.426827 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:19:35.110861 unknown[827]: wrote ssh authorized keys file for user: core Oct 2 19:20:05.137913 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET error: Get "https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz": dial tcp 140.82.121.4:443: i/o timeout Oct 2 19:20:05.338406 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #2 Oct 2 19:20:20.888884 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:20:21.146098 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:20:21.169861 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:20:21.169861 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:20:21.169861 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:20:21.284721 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Oct 2 19:20:21.390093 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2370649797" Oct 2 19:20:21.413858 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2370649797": device or resource busy Oct 2 19:20:21.413858 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2370649797", trying btrfs: device or resource busy Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2370649797" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2370649797" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem2370649797" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem2370649797" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:20:21.413858 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:20:21.405588 systemd[1]: mnt-oem2370649797.mount: Deactivated successfully. Oct 2 19:20:21.642838 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Oct 2 19:20:22.008756 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:20:22.032887 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:20:22.032887 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:20:22.032887 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:20:22.107726 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Oct 2 19:20:22.691312 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): op(12): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3386077359" Oct 2 19:20:22.718901 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(11): op(12): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3386077359": device or resource busy Oct 2 19:20:22.718901 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(11): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3386077359", trying btrfs: device or resource busy Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3386077359" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): op(13): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3386077359" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): op(14): [started] unmounting "/mnt/oem3386077359" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): op(14): [finished] unmounting "/mnt/oem3386077359" Oct 2 19:20:22.718901 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:20:23.153061 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 2 19:20:23.153112 kernel: audit: type=1130 audit(1696274422.770:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.153130 kernel: audit: type=1130 audit(1696274422.869:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.153146 kernel: audit: type=1130 audit(1696274422.907:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.153160 kernel: audit: type=1131 audit(1696274422.907:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.153176 kernel: audit: type=1130 audit(1696274423.030:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.153190 kernel: audit: type=1131 audit(1696274423.030:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.711992 systemd[1]: mnt-oem3386077359.mount: Deactivated successfully. Oct 2 19:20:23.203005 kernel: audit: type=1130 audit(1696274423.173:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): op(16): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem680911759" Oct 2 19:20:23.203096 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(15): op(16): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem680911759": device or resource busy Oct 2 19:20:23.203096 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(15): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem680911759", trying btrfs: device or resource busy Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem680911759" Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): op(17): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem680911759" Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): op(18): [started] unmounting "/mnt/oem680911759" Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): op(18): [finished] unmounting "/mnt/oem680911759" Oct 2 19:20:23.203096 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(1a): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(1a): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(1b): [started] processing unit "oem-gce.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(1b): [finished] processing unit "oem-gce.service" Oct 2 19:20:23.203096 ignition[827]: INFO : files: op(1c): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:20:23.561006 kernel: audit: type=1131 audit(1696274423.355:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.733735 systemd[1]: mnt-oem680911759.mount: Deactivated successfully. Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1c): op(1d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1c): op(1d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1c): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1e): [started] processing unit "prepare-critools.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(1e): [finished] processing unit "prepare-critools.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(20): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(20): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(21): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(23): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(24): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: op(24): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:20:23.577082 ignition[827]: INFO : files: createResultFile: createFiles: op(25): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:20:23.577082 ignition[827]: INFO : files: createResultFile: createFiles: op(25): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:20:23.577082 ignition[827]: INFO : files: files passed Oct 2 19:20:23.990888 kernel: audit: type=1131 audit(1696274423.647:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.990939 kernel: audit: type=1131 audit(1696274423.744:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.751485 systemd[1]: Finished ignition-files.service. Oct 2 19:20:23.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.006474 iscsid[692]: iscsid shutting down. Oct 2 19:20:24.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.022060 ignition[827]: INFO : Ignition finished successfully Oct 2 19:20:24.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.039071 initrd-setup-root-after-ignition[850]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:20:24.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.781326 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:20:22.821919 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:20:22.823137 systemd[1]: Starting ignition-quench.service... Oct 2 19:20:22.844223 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:20:24.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.871354 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:20:22.871501 systemd[1]: Finished ignition-quench.service. Oct 2 19:20:24.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.909346 systemd[1]: Reached target ignition-complete.target. Oct 2 19:20:24.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.196081 ignition[865]: INFO : Ignition 2.14.0 Oct 2 19:20:24.196081 ignition[865]: INFO : Stage: umount Oct 2 19:20:24.196081 ignition[865]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:20:24.196081 ignition[865]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:20:24.196081 ignition[865]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:20:24.196081 ignition[865]: INFO : umount: umount passed Oct 2 19:20:24.196081 ignition[865]: INFO : Ignition finished successfully Oct 2 19:20:24.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:22.972144 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:20:24.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.016710 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:20:24.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.324000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:20:23.016845 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:20:23.032222 systemd[1]: Reached target initrd-fs.target. Oct 2 19:20:23.089090 systemd[1]: Reached target initrd.target. Oct 2 19:20:24.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.111146 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:20:24.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.112423 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:20:24.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.132306 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:20:23.176516 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:20:24.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.218207 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:20:23.250148 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:20:23.292268 systemd[1]: Stopped target timers.target. Oct 2 19:20:24.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.313251 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:20:24.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.313451 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:20:24.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.357537 systemd[1]: Stopped target initrd.target. Oct 2 19:20:23.391237 systemd[1]: Stopped target basic.target. Oct 2 19:20:23.411249 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:20:24.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.453191 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:20:24.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.486192 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:20:24.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:24.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:23.507054 systemd[1]: Stopped target remote-fs.target. Oct 2 19:20:23.528112 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:20:23.548130 systemd[1]: Stopped target sysinit.target. Oct 2 19:20:23.569078 systemd[1]: Stopped target local-fs.target. Oct 2 19:20:23.585139 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:20:24.646896 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Oct 2 19:20:23.611177 systemd[1]: Stopped target swap.target. Oct 2 19:20:23.636132 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:20:23.636341 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:20:23.649447 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:20:23.711136 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:20:23.711338 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:20:23.746351 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:20:23.746635 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:20:23.780298 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:20:23.780481 systemd[1]: Stopped ignition-files.service. Oct 2 19:20:23.802757 systemd[1]: Stopping ignition-mount.service... Oct 2 19:20:23.823159 systemd[1]: Stopping iscsid.service... Oct 2 19:20:23.853857 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:20:23.854217 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:20:23.868751 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:20:23.904054 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:20:23.904340 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:20:23.917371 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:20:23.917580 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:20:23.941760 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:20:23.942744 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:20:23.942874 systemd[1]: Stopped iscsid.service. Oct 2 19:20:23.958864 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:20:23.958980 systemd[1]: Stopped ignition-mount.service. Oct 2 19:20:23.978599 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:20:23.978806 systemd[1]: Stopped ignition-disks.service. Oct 2 19:20:23.998995 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:20:23.999090 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:20:24.014983 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:20:24.015066 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:20:24.030002 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:20:24.030092 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:20:24.047001 systemd[1]: Stopped target paths.target. Oct 2 19:20:24.070364 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:20:24.070446 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:20:24.070574 systemd[1]: Stopped target slices.target. Oct 2 19:20:24.070657 systemd[1]: Stopped target sockets.target. Oct 2 19:20:24.100041 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:20:24.100104 systemd[1]: Closed iscsid.socket. Oct 2 19:20:24.124029 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:20:24.124112 systemd[1]: Stopped ignition-setup.service. Oct 2 19:20:24.139285 systemd[1]: Stopping iscsiuio.service... Oct 2 19:20:24.155663 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:20:24.155830 systemd[1]: Stopped iscsiuio.service. Oct 2 19:20:24.171433 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:20:24.171545 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:20:24.187450 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:20:24.187560 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:20:24.204187 systemd[1]: Stopped target network.target. Oct 2 19:20:24.210078 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:20:24.210134 systemd[1]: Closed iscsiuio.socket. Oct 2 19:20:24.223090 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:20:24.223165 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:20:24.240305 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:20:24.244791 systemd-networkd[682]: eth0: DHCPv6 lease lost Oct 2 19:20:24.272087 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:20:24.283420 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:20:24.283554 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:20:24.310518 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:20:24.310647 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:20:24.326781 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:20:24.326831 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:20:24.342974 systemd[1]: Stopping network-cleanup.service... Oct 2 19:20:24.355866 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:20:24.355987 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:20:24.371008 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:20:24.371087 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:20:24.386092 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:20:24.386159 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:20:24.405125 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:20:24.422466 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:20:24.423197 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:20:24.423348 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:20:24.437316 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:20:24.437404 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:20:24.451038 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:20:24.451094 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:20:24.466046 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:20:24.466127 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:20:24.482124 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:20:24.482199 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:20:24.497089 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:20:24.497161 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:20:24.514099 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:20:24.534844 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:20:24.534965 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:20:24.550598 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:20:24.550751 systemd[1]: Stopped network-cleanup.service. Oct 2 19:20:24.566369 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:20:24.566496 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:20:24.582181 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:20:24.598953 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:20:24.613552 systemd[1]: Switching root. Oct 2 19:20:24.658051 systemd-journald[189]: Journal stopped Oct 2 19:20:29.443382 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:20:29.443488 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:20:29.443517 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:20:29.443544 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:20:29.443567 kernel: SELinux: policy capability open_perms=1 Oct 2 19:20:29.443588 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:20:29.443611 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:20:29.443632 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:20:29.443652 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:20:29.443674 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:20:29.443710 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:20:29.443741 systemd[1]: Successfully loaded SELinux policy in 113.638ms. Oct 2 19:20:29.443793 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.777ms. Oct 2 19:20:29.443824 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:20:29.443851 systemd[1]: Detected virtualization kvm. Oct 2 19:20:29.443873 systemd[1]: Detected architecture x86-64. Oct 2 19:20:29.443896 systemd[1]: Detected first boot. Oct 2 19:20:29.443918 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:20:29.443946 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:20:29.443963 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:20:29.443980 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:20:29.443998 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:20:29.444018 kernel: kauditd_printk_skb: 39 callbacks suppressed Oct 2 19:20:29.444033 kernel: audit: type=1334 audit(1696274428.514:87): prog-id=12 op=LOAD Oct 2 19:20:29.444062 kernel: audit: type=1334 audit(1696274428.514:88): prog-id=3 op=UNLOAD Oct 2 19:20:29.444084 kernel: audit: type=1334 audit(1696274428.526:89): prog-id=13 op=LOAD Oct 2 19:20:29.444111 kernel: audit: type=1334 audit(1696274428.533:90): prog-id=14 op=LOAD Oct 2 19:20:29.444134 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:20:29.444162 kernel: audit: type=1334 audit(1696274428.540:91): prog-id=4 op=UNLOAD Oct 2 19:20:29.444184 kernel: audit: type=1334 audit(1696274428.540:92): prog-id=5 op=UNLOAD Oct 2 19:20:29.444207 kernel: audit: type=1131 audit(1696274428.543:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.444230 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:20:29.444251 kernel: audit: type=1334 audit(1696274428.597:94): prog-id=12 op=UNLOAD Oct 2 19:20:29.444273 kernel: audit: type=1130 audit(1696274428.613:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.444300 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:20:29.444326 kernel: audit: type=1131 audit(1696274428.613:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.444348 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:20:29.444373 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:20:29.444390 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:20:29.444406 systemd[1]: Created slice system-getty.slice. Oct 2 19:20:29.444421 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:20:29.444440 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:20:29.444456 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:20:29.444471 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:20:29.444486 systemd[1]: Created slice user.slice. Oct 2 19:20:29.444501 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:20:29.444516 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:20:29.444542 systemd[1]: Set up automount boot.automount. Oct 2 19:20:29.444558 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:20:29.444578 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:20:29.444596 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:20:29.444611 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:20:29.444626 systemd[1]: Reached target integritysetup.target. Oct 2 19:20:29.444644 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:20:29.444659 systemd[1]: Reached target remote-fs.target. Oct 2 19:20:29.444674 systemd[1]: Reached target slices.target. Oct 2 19:20:29.444691 systemd[1]: Reached target swap.target. Oct 2 19:20:29.444750 systemd[1]: Reached target torcx.target. Oct 2 19:20:29.444777 systemd[1]: Reached target veritysetup.target. Oct 2 19:20:29.444806 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:20:29.444831 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:20:29.444854 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:20:29.444878 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:20:29.444900 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:20:29.444924 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:20:29.444945 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:20:29.444960 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:20:29.444975 systemd[1]: Mounting media.mount... Oct 2 19:20:29.444990 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:20:29.445009 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:20:29.445029 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:20:29.445051 systemd[1]: Mounting tmp.mount... Oct 2 19:20:29.445066 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:20:29.445081 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:20:29.445096 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:20:29.445111 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:20:29.445126 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:20:29.445142 systemd[1]: Starting modprobe@drm.service... Oct 2 19:20:29.445161 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:20:29.445175 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:20:29.445190 systemd[1]: Starting modprobe@loop.service... Oct 2 19:20:29.445205 kernel: fuse: init (API version 7.34) Oct 2 19:20:29.445221 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:20:29.445235 kernel: loop: module loaded Oct 2 19:20:29.445250 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:20:29.445264 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:20:29.445283 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:20:29.445310 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:20:29.445334 systemd[1]: Stopped systemd-journald.service. Oct 2 19:20:29.445357 systemd[1]: Starting systemd-journald.service... Oct 2 19:20:29.445381 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:20:29.445403 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:20:29.445431 systemd-journald[989]: Journal started Oct 2 19:20:29.445519 systemd-journald[989]: Runtime Journal (/run/log/journal/322d9289fbe8dcc355909f3f44e2e335) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:20:24.657000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:20:24.967000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:20:25.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:20:25.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:20:25.118000 audit: BPF prog-id=10 op=LOAD Oct 2 19:20:25.118000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:20:25.118000 audit: BPF prog-id=11 op=LOAD Oct 2 19:20:25.118000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:20:28.514000 audit: BPF prog-id=12 op=LOAD Oct 2 19:20:28.514000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:20:28.526000 audit: BPF prog-id=13 op=LOAD Oct 2 19:20:28.533000 audit: BPF prog-id=14 op=LOAD Oct 2 19:20:28.540000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:20:28.540000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:20:28.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:28.597000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:20:28.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:28.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.400000 audit: BPF prog-id=15 op=LOAD Oct 2 19:20:29.400000 audit: BPF prog-id=16 op=LOAD Oct 2 19:20:29.400000 audit: BPF prog-id=17 op=LOAD Oct 2 19:20:29.400000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:20:29.400000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:20:29.432000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:20:29.432000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdd6620ce0 a2=4000 a3=7ffdd6620d7c items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:29.432000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:20:25.298497 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:20:28.513806 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:20:25.299435 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:20:28.544379 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:20:25.299460 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:20:25.299502 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:20:25.299515 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:20:25.299561 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:20:25.299578 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:20:25.299897 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:20:25.299967 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:20:25.299991 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:20:25.301045 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:20:25.301111 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:20:25.301147 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:20:25.301175 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:20:25.301207 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:20:25.301235 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:20:27.917145 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:27.917449 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:27.917603 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:27.917857 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:20:27.917919 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:20:27.917990 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2023-10-02T19:20:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:20:29.458735 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:20:29.473735 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:20:29.487722 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:20:29.494371 systemd[1]: Stopped verity-setup.service. Oct 2 19:20:29.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.512725 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:20:29.521729 systemd[1]: Started systemd-journald.service. Oct 2 19:20:29.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.531292 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:20:29.539059 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:20:29.546100 systemd[1]: Mounted media.mount. Oct 2 19:20:29.553090 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:20:29.562075 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:20:29.572017 systemd[1]: Mounted tmp.mount. Oct 2 19:20:29.580125 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:20:29.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.589238 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:20:29.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.598206 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:20:29.598416 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:20:29.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.607245 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:20:29.607453 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:20:29.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.616255 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:20:29.616466 systemd[1]: Finished modprobe@drm.service. Oct 2 19:20:29.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.626232 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:20:29.626439 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:20:29.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.635352 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:20:29.635593 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:20:29.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.644332 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:20:29.644550 systemd[1]: Finished modprobe@loop.service. Oct 2 19:20:29.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.653286 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:20:29.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.662223 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:20:29.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.671252 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:20:29.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.680221 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:20:29.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.689562 systemd[1]: Reached target network-pre.target. Oct 2 19:20:29.699421 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:20:29.709266 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:20:29.717850 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:20:29.720671 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:20:29.729693 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:20:29.738904 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:20:29.740811 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:20:29.752599 systemd-journald[989]: Time spent on flushing to /var/log/journal/322d9289fbe8dcc355909f3f44e2e335 is 50.813ms for 1146 entries. Oct 2 19:20:29.752599 systemd-journald[989]: System Journal (/var/log/journal/322d9289fbe8dcc355909f3f44e2e335) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:20:29.832957 systemd-journald[989]: Received client request to flush runtime journal. Oct 2 19:20:29.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.748907 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:20:29.750867 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:20:29.767808 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:20:29.778155 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:20:29.788226 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:20:29.798037 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:20:29.808300 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:20:29.817337 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:20:29.829397 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:20:29.838650 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:20:29.848666 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:20:29.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:29.860082 udevadm[1003]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:20:30.446686 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:20:30.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:30.455000 audit: BPF prog-id=18 op=LOAD Oct 2 19:20:30.455000 audit: BPF prog-id=19 op=LOAD Oct 2 19:20:30.455000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:20:30.455000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:20:30.457786 systemd[1]: Starting systemd-udevd.service... Oct 2 19:20:30.480563 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Oct 2 19:20:30.532367 systemd[1]: Started systemd-udevd.service. Oct 2 19:20:30.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:30.542000 audit: BPF prog-id=20 op=LOAD Oct 2 19:20:30.545478 systemd[1]: Starting systemd-networkd.service... Oct 2 19:20:30.556000 audit: BPF prog-id=21 op=LOAD Oct 2 19:20:30.556000 audit: BPF prog-id=22 op=LOAD Oct 2 19:20:30.557000 audit: BPF prog-id=23 op=LOAD Oct 2 19:20:30.559800 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:20:30.613275 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:20:30.635226 systemd[1]: Started systemd-userdbd.service. Oct 2 19:20:30.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:30.720774 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:20:30.738727 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:20:30.767772 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:20:30.776721 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:20:30.795624 systemd-networkd[1018]: lo: Link UP Oct 2 19:20:30.795643 systemd-networkd[1018]: lo: Gained carrier Oct 2 19:20:30.796415 systemd-networkd[1018]: Enumeration completed Oct 2 19:20:30.796576 systemd[1]: Started systemd-networkd.service. Oct 2 19:20:30.796602 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:20:30.798721 systemd-networkd[1018]: eth0: Link UP Oct 2 19:20:30.798732 systemd-networkd[1018]: eth0: Gained carrier Oct 2 19:20:30.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:30.811882 systemd-networkd[1018]: eth0: DHCPv4 address 10.128.0.100/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:20:30.796000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:20:30.796000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d530c3c880 a1=32194 a2=7f30d2bcfbc5 a3=5 items=106 ppid=1007 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:30.796000 audit: CWD cwd="/" Oct 2 19:20:30.796000 audit: PATH item=0 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=1 name=(null) inode=14646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=2 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=3 name=(null) inode=14647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=4 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=5 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=6 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=7 name=(null) inode=14649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=8 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=9 name=(null) inode=14650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=10 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=11 name=(null) inode=14651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=12 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=13 name=(null) inode=14652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=14 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=15 name=(null) inode=14653 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=16 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=17 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=18 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=19 name=(null) inode=14655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=20 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=21 name=(null) inode=14656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=22 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=23 name=(null) inode=14657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=24 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=25 name=(null) inode=14658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=26 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=27 name=(null) inode=14659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=28 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=29 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=30 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=31 name=(null) inode=14661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=32 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=33 name=(null) inode=14662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=34 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=35 name=(null) inode=14663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=36 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=37 name=(null) inode=14664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=38 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=39 name=(null) inode=14665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=40 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=41 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=42 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=43 name=(null) inode=14667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=44 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=45 name=(null) inode=14668 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=46 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=47 name=(null) inode=14669 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=48 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=49 name=(null) inode=14670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=50 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=51 name=(null) inode=14671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=52 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=53 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=54 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=55 name=(null) inode=14673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=56 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=57 name=(null) inode=14674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=58 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=59 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=60 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=61 name=(null) inode=14676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=62 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=63 name=(null) inode=14677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=64 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=65 name=(null) inode=14678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=66 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=67 name=(null) inode=14679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=68 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=69 name=(null) inode=14680 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=70 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=71 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=72 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=73 name=(null) inode=14682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=74 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=75 name=(null) inode=14683 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=76 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=77 name=(null) inode=14684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=78 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=79 name=(null) inode=14685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=80 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=81 name=(null) inode=14686 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=82 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=83 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=84 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=85 name=(null) inode=14688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=86 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=87 name=(null) inode=14689 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=88 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=89 name=(null) inode=14690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=90 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=91 name=(null) inode=14691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=92 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=93 name=(null) inode=14692 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=94 name=(null) inode=14672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=95 name=(null) inode=14693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.856841 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:20:30.796000 audit: PATH item=96 name=(null) inode=14693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=97 name=(null) inode=14694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=98 name=(null) inode=14693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=99 name=(null) inode=14695 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=100 name=(null) inode=14693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=101 name=(null) inode=14696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=102 name=(null) inode=14693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=103 name=(null) inode=14697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=104 name=(null) inode=14693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PATH item=105 name=(null) inode=14698 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:30.796000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:20:30.869778 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1019) Oct 2 19:20:30.889742 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Oct 2 19:20:30.915529 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:20:30.929727 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:20:30.953744 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:20:30.970336 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:20:30.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:30.980626 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:20:31.010916 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:20:31.041056 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:20:31.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.050109 systemd[1]: Reached target cryptsetup.target. Oct 2 19:20:31.060471 systemd[1]: Starting lvm2-activation.service... Oct 2 19:20:31.067171 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:20:31.094119 systemd[1]: Finished lvm2-activation.service. Oct 2 19:20:31.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.103112 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:20:31.111876 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:20:31.111935 systemd[1]: Reached target local-fs.target. Oct 2 19:20:31.119857 systemd[1]: Reached target machines.target. Oct 2 19:20:31.129413 systemd[1]: Starting ldconfig.service... Oct 2 19:20:31.137777 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:20:31.137873 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:20:31.139579 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:20:31.149637 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:20:31.161508 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:20:31.162020 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:20:31.162146 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:20:31.164839 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:20:31.169195 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1047 (bootctl) Oct 2 19:20:31.172290 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:20:31.183044 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:20:31.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.211104 systemd-tmpfiles[1051]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:20:31.221515 systemd-tmpfiles[1051]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:20:31.232489 systemd-tmpfiles[1051]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:20:31.327746 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Oct 2 19:20:31.327746 systemd-fsck[1055]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:20:31.330955 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:20:31.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.343486 systemd[1]: Mounting boot.mount... Oct 2 19:20:31.410883 systemd[1]: Mounted boot.mount. Oct 2 19:20:31.501147 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:20:31.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.593961 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:20:31.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.604872 systemd[1]: Starting audit-rules.service... Oct 2 19:20:31.615045 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:20:31.626462 systemd[1]: Starting oem-gce-enable-oslogin.service... Oct 2 19:20:31.636502 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:20:31.644000 audit: BPF prog-id=24 op=LOAD Oct 2 19:20:31.647268 systemd[1]: Starting systemd-resolved.service... Oct 2 19:20:31.653000 audit: BPF prog-id=25 op=LOAD Oct 2 19:20:31.656379 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:20:31.665501 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:20:31.706000 audit[1067]: SYSTEM_BOOT pid=1067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.717099 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:20:31.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.726325 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:20:31.733399 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:20:31.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.768360 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:20:31.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.778365 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Oct 2 19:20:31.778622 systemd[1]: Finished oem-gce-enable-oslogin.service. Oct 2 19:20:31.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:31.837000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:20:31.837000 audit[1089]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffeaa48970 a2=420 a3=0 items=0 ppid=1059 pid=1089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:31.837000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:20:31.840554 augenrules[1089]: No rules Oct 2 19:20:31.842720 systemd[1]: Finished audit-rules.service. Oct 2 19:20:31.872972 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:20:31.875260 systemd-resolved[1065]: Positive Trust Anchors: Oct 2 19:20:31.875285 systemd-resolved[1065]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:20:31.875334 systemd-resolved[1065]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:20:31.876410 systemd-timesyncd[1066]: Contacted time server 169.254.169.254:123 (169.254.169.254). Oct 2 19:20:31.876934 systemd-timesyncd[1066]: Initial clock synchronization to Mon 2023-10-02 19:20:32.002341 UTC. Oct 2 19:20:31.882186 systemd[1]: Reached target time-set.target. Oct 2 19:20:31.892259 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:20:31.892986 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:20:31.919271 systemd-resolved[1065]: Defaulting to hostname 'linux'. Oct 2 19:20:31.922357 systemd[1]: Started systemd-resolved.service. Oct 2 19:20:31.930976 systemd[1]: Reached target network.target. Oct 2 19:20:31.939885 systemd[1]: Reached target nss-lookup.target. Oct 2 19:20:31.997834 ldconfig[1046]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:20:32.003660 systemd[1]: Finished ldconfig.service. Oct 2 19:20:32.013705 systemd[1]: Starting systemd-update-done.service... Oct 2 19:20:32.023515 systemd[1]: Finished systemd-update-done.service. Oct 2 19:20:32.032016 systemd[1]: Reached target sysinit.target. Oct 2 19:20:32.041062 systemd[1]: Started motdgen.path. Oct 2 19:20:32.047983 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:20:32.058156 systemd[1]: Started logrotate.timer. Oct 2 19:20:32.065067 systemd[1]: Started mdadm.timer. Oct 2 19:20:32.071938 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:20:32.074896 systemd-networkd[1018]: eth0: Gained IPv6LL Oct 2 19:20:32.080894 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:20:32.080964 systemd[1]: Reached target paths.target. Oct 2 19:20:32.087897 systemd[1]: Reached target timers.target. Oct 2 19:20:32.095301 systemd[1]: Listening on dbus.socket. Oct 2 19:20:32.104270 systemd[1]: Starting docker.socket... Oct 2 19:20:32.115628 systemd[1]: Listening on sshd.socket. Oct 2 19:20:32.122989 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:20:32.123957 systemd[1]: Listening on docker.socket. Oct 2 19:20:32.131061 systemd[1]: Reached target sockets.target. Oct 2 19:20:32.139873 systemd[1]: Reached target basic.target. Oct 2 19:20:32.147039 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:20:32.147110 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:20:32.148740 systemd[1]: Starting containerd.service... Oct 2 19:20:32.157166 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:20:32.169563 systemd[1]: Starting dbus.service... Oct 2 19:20:32.178755 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:20:32.187345 systemd[1]: Starting extend-filesystems.service... Oct 2 19:20:32.194903 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:20:32.201143 jq[1102]: false Oct 2 19:20:32.196934 systemd[1]: Starting motdgen.service... Oct 2 19:20:32.205764 systemd[1]: Starting oem-gce.service... Oct 2 19:20:32.217702 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:20:32.227909 systemd[1]: Starting prepare-critools.service... Oct 2 19:20:32.236900 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:20:32.248008 systemd[1]: Starting sshd-keygen.service... Oct 2 19:20:32.259588 systemd[1]: Starting systemd-logind.service... Oct 2 19:20:32.266906 extend-filesystems[1103]: Found sda Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda1 Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda2 Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda3 Oct 2 19:20:32.279159 extend-filesystems[1103]: Found usr Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda4 Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda6 Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda7 Oct 2 19:20:32.279159 extend-filesystems[1103]: Found sda9 Oct 2 19:20:32.279159 extend-filesystems[1103]: Checking size of /dev/sda9 Oct 2 19:20:32.271862 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:20:32.405372 extend-filesystems[1103]: Resized partition /dev/sda9 Oct 2 19:20:32.272117 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Oct 2 19:20:32.414323 extend-filesystems[1140]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:20:32.430952 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Oct 2 19:20:32.272983 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:20:32.431139 jq[1126]: true Oct 2 19:20:32.417240 dbus-daemon[1101]: [system] SELinux support is enabled Oct 2 19:20:32.274465 systemd[1]: Starting update-engine.service... Oct 2 19:20:32.289153 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:20:32.295827 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:20:32.296251 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:20:32.432853 tar[1131]: ./ Oct 2 19:20:32.432853 tar[1131]: ./loopback Oct 2 19:20:32.296850 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:20:32.433552 jq[1135]: true Oct 2 19:20:32.297099 systemd[1]: Finished motdgen.service. Oct 2 19:20:32.433888 mkfs.ext4[1137]: mke2fs 1.46.5 (30-Dec-2021) Oct 2 19:20:32.433888 mkfs.ext4[1137]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Oct 2 19:20:32.433888 mkfs.ext4[1137]: Creating filesystem with 262144 4k blocks and 65536 inodes Oct 2 19:20:32.433888 mkfs.ext4[1137]: Filesystem UUID: 50c2e544-a1ce-4c77-88f0-d0c5a13ffc3a Oct 2 19:20:32.433888 mkfs.ext4[1137]: Superblock backups stored on blocks: Oct 2 19:20:32.433888 mkfs.ext4[1137]: 32768, 98304, 163840, 229376 Oct 2 19:20:32.433888 mkfs.ext4[1137]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:20:32.433888 mkfs.ext4[1137]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:20:32.433888 mkfs.ext4[1137]: Creating journal (8192 blocks): done Oct 2 19:20:32.433888 mkfs.ext4[1137]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:20:32.336544 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:20:32.337049 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:20:32.417464 systemd[1]: Started dbus.service. Oct 2 19:20:32.443474 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:20:32.443538 systemd[1]: Reached target system-config.target. Oct 2 19:20:32.451967 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:20:32.452032 systemd[1]: Reached target user-config.target. Oct 2 19:20:32.454240 dbus-daemon[1101]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1018 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:20:32.466510 dbus-daemon[1101]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:20:32.472701 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:20:32.509006 umount[1156]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Oct 2 19:20:32.535757 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Oct 2 19:20:32.580105 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:20:32.574024 systemd[1]: Started update-engine.service. Oct 2 19:20:32.580519 update_engine[1124]: I1002 19:20:32.562297 1124 main.cc:92] Flatcar Update Engine starting Oct 2 19:20:32.580519 update_engine[1124]: I1002 19:20:32.574404 1124 update_check_scheduler.cc:74] Next update check in 6m4s Oct 2 19:20:32.581527 tar[1132]: crictl Oct 2 19:20:32.585864 systemd[1]: Started locksmithd.service. Oct 2 19:20:32.587828 extend-filesystems[1140]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 19:20:32.587828 extend-filesystems[1140]: old_desc_blocks = 1, new_desc_blocks = 2 Oct 2 19:20:32.587828 extend-filesystems[1140]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Oct 2 19:20:32.656965 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:20:32.657122 bash[1165]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:20:32.657271 extend-filesystems[1103]: Resized filesystem in /dev/sda9 Oct 2 19:20:32.665907 env[1136]: time="2023-10-02T19:20:32.610671483Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:20:32.593776 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:20:32.594254 systemd[1]: Finished extend-filesystems.service. Oct 2 19:20:32.603426 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:20:32.668878 systemd-logind[1120]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:20:32.668922 systemd-logind[1120]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:20:32.668953 systemd-logind[1120]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:20:32.673527 systemd-logind[1120]: New seat seat0. Oct 2 19:20:32.677001 systemd[1]: Started systemd-logind.service. Oct 2 19:20:32.800282 tar[1131]: ./bandwidth Oct 2 19:20:32.909195 coreos-metadata[1100]: Oct 02 19:20:32.909 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Oct 2 19:20:32.915840 coreos-metadata[1100]: Oct 02 19:20:32.915 INFO Fetch failed with 404: resource not found Oct 2 19:20:32.916106 coreos-metadata[1100]: Oct 02 19:20:32.915 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Oct 2 19:20:32.917330 coreos-metadata[1100]: Oct 02 19:20:32.917 INFO Fetch successful Oct 2 19:20:32.917588 coreos-metadata[1100]: Oct 02 19:20:32.917 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Oct 2 19:20:32.920191 coreos-metadata[1100]: Oct 02 19:20:32.920 INFO Fetch failed with 404: resource not found Oct 2 19:20:32.920429 coreos-metadata[1100]: Oct 02 19:20:32.920 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Oct 2 19:20:32.932806 coreos-metadata[1100]: Oct 02 19:20:32.932 INFO Fetch failed with 404: resource not found Oct 2 19:20:32.933047 coreos-metadata[1100]: Oct 02 19:20:32.932 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Oct 2 19:20:32.936437 coreos-metadata[1100]: Oct 02 19:20:32.936 INFO Fetch successful Oct 2 19:20:32.941021 unknown[1100]: wrote ssh authorized keys file for user: core Oct 2 19:20:32.960857 env[1136]: time="2023-10-02T19:20:32.960770931Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:20:32.970793 update-ssh-keys[1177]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:20:32.971413 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:20:32.973603 env[1136]: time="2023-10-02T19:20:32.973551187Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:32.976963 env[1136]: time="2023-10-02T19:20:32.976913475Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:20:32.977129 env[1136]: time="2023-10-02T19:20:32.977104303Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:32.977601 env[1136]: time="2023-10-02T19:20:32.977565198Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:20:32.977748 env[1136]: time="2023-10-02T19:20:32.977726961Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:32.977895 env[1136]: time="2023-10-02T19:20:32.977869817Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:20:32.978012 env[1136]: time="2023-10-02T19:20:32.977990885Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:32.978246 env[1136]: time="2023-10-02T19:20:32.978224676Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:32.978720 env[1136]: time="2023-10-02T19:20:32.978678757Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:20:32.982066 env[1136]: time="2023-10-02T19:20:32.982028429Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:20:32.984801 env[1136]: time="2023-10-02T19:20:32.984767390Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:20:32.985054 env[1136]: time="2023-10-02T19:20:32.985028097Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:20:32.985169 env[1136]: time="2023-10-02T19:20:32.985149540Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:20:32.990695 env[1136]: time="2023-10-02T19:20:32.990647203Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:20:32.990865 env[1136]: time="2023-10-02T19:20:32.990703825Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:20:32.990865 env[1136]: time="2023-10-02T19:20:32.990761917Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:20:32.990865 env[1136]: time="2023-10-02T19:20:32.990825664Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.990865 env[1136]: time="2023-10-02T19:20:32.990849319Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991058 env[1136]: time="2023-10-02T19:20:32.990930055Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991058 env[1136]: time="2023-10-02T19:20:32.990957608Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991058 env[1136]: time="2023-10-02T19:20:32.990983628Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991058 env[1136]: time="2023-10-02T19:20:32.991007158Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991058 env[1136]: time="2023-10-02T19:20:32.991030014Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991277 env[1136]: time="2023-10-02T19:20:32.991061867Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.991277 env[1136]: time="2023-10-02T19:20:32.991085627Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:20:32.991277 env[1136]: time="2023-10-02T19:20:32.991243945Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:20:32.991420 env[1136]: time="2023-10-02T19:20:32.991370304Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:20:32.991905 env[1136]: time="2023-10-02T19:20:32.991863735Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:20:32.992008 env[1136]: time="2023-10-02T19:20:32.991926677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992008 env[1136]: time="2023-10-02T19:20:32.991952173Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:20:32.992123 env[1136]: time="2023-10-02T19:20:32.992020044Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992123 env[1136]: time="2023-10-02T19:20:32.992044563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992123 env[1136]: time="2023-10-02T19:20:32.992076835Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992123 env[1136]: time="2023-10-02T19:20:32.992096624Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992305 env[1136]: time="2023-10-02T19:20:32.992119779Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992305 env[1136]: time="2023-10-02T19:20:32.992143198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992305 env[1136]: time="2023-10-02T19:20:32.992166195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992305 env[1136]: time="2023-10-02T19:20:32.992186054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992305 env[1136]: time="2023-10-02T19:20:32.992210320Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:20:32.992549 env[1136]: time="2023-10-02T19:20:32.992390629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992549 env[1136]: time="2023-10-02T19:20:32.992417532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992549 env[1136]: time="2023-10-02T19:20:32.992440632Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.992549 env[1136]: time="2023-10-02T19:20:32.992472213Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:20:32.992549 env[1136]: time="2023-10-02T19:20:32.992499322Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:20:32.992549 env[1136]: time="2023-10-02T19:20:32.992519186Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:20:32.992853 env[1136]: time="2023-10-02T19:20:32.992549700Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:20:32.992853 env[1136]: time="2023-10-02T19:20:32.992602085Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:20:32.993052 env[1136]: time="2023-10-02T19:20:32.992944813Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.993053354Z" level=info msg="Connect containerd service" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.993124324Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995271093Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995667546Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995776785Z" level=info msg="Start subscribing containerd event" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995848190Z" level=info msg="Start recovering state" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995936904Z" level=info msg="Start event monitor" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995952144Z" level=info msg="Start snapshots syncer" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995967540Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.995979545Z" level=info msg="Start streaming server" Oct 2 19:20:32.997038 env[1136]: time="2023-10-02T19:20:32.996949394Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:20:32.997197 systemd[1]: Started containerd.service. Oct 2 19:20:33.010560 tar[1131]: ./ptp Oct 2 19:20:33.019440 env[1136]: time="2023-10-02T19:20:33.019378085Z" level=info msg="containerd successfully booted in 0.409687s" Oct 2 19:20:33.022472 dbus-daemon[1101]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:20:33.022702 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:20:33.023434 dbus-daemon[1101]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1160 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:20:33.036653 systemd[1]: Starting polkit.service... Oct 2 19:20:33.109631 polkitd[1180]: Started polkitd version 121 Oct 2 19:20:33.140567 polkitd[1180]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:20:33.140692 polkitd[1180]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:20:33.142808 polkitd[1180]: Finished loading, compiling and executing 2 rules Oct 2 19:20:33.144567 dbus-daemon[1101]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:20:33.144809 systemd[1]: Started polkit.service. Oct 2 19:20:33.146158 polkitd[1180]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:20:33.168523 tar[1131]: ./vlan Oct 2 19:20:33.173662 systemd-hostnamed[1160]: Hostname set to (transient) Oct 2 19:20:33.176659 systemd-resolved[1065]: System hostname changed to 'ci-3510-3-0-5b532764c7976ca8efed.c.flatcar-212911.internal'. Oct 2 19:20:33.296824 tar[1131]: ./host-device Oct 2 19:20:33.410579 tar[1131]: ./tuning Oct 2 19:20:33.513424 tar[1131]: ./vrf Oct 2 19:20:33.620409 tar[1131]: ./sbr Oct 2 19:20:33.721158 tar[1131]: ./tap Oct 2 19:20:33.838475 tar[1131]: ./dhcp Oct 2 19:20:34.123283 tar[1131]: ./static Oct 2 19:20:34.200466 tar[1131]: ./firewall Oct 2 19:20:34.318922 tar[1131]: ./macvlan Oct 2 19:20:34.370283 systemd[1]: Finished prepare-critools.service. Oct 2 19:20:34.440961 tar[1131]: ./dummy Oct 2 19:20:34.470390 sshd_keygen[1128]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:20:34.536063 tar[1131]: ./bridge Oct 2 19:20:34.564942 systemd[1]: Finished sshd-keygen.service. Oct 2 19:20:34.574532 systemd[1]: Starting issuegen.service... Oct 2 19:20:34.589400 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:20:34.589674 systemd[1]: Finished issuegen.service. Oct 2 19:20:34.602128 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:20:34.613703 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:20:34.625835 systemd[1]: Started getty@tty1.service. Oct 2 19:20:34.636143 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:20:34.639502 tar[1131]: ./ipvlan Oct 2 19:20:34.645270 systemd[1]: Reached target getty.target. Oct 2 19:20:34.700317 tar[1131]: ./portmap Oct 2 19:20:34.760441 tar[1131]: ./host-local Oct 2 19:20:34.835653 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:20:35.006014 locksmithd[1168]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:20:37.663507 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Oct 2 19:20:39.928758 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:20:39.953242 systemd-nspawn[1209]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Oct 2 19:20:39.953242 systemd-nspawn[1209]: Press ^] three times within 1s to kill container. Oct 2 19:20:39.971766 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:20:40.060032 systemd[1]: Started oem-gce.service. Oct 2 19:20:40.060492 systemd[1]: Reached target multi-user.target. Oct 2 19:20:40.062721 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:20:40.073512 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:20:40.073808 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:20:40.074104 systemd[1]: Startup finished in 1.017s (kernel) + 54.025s (initrd) + 15.238s (userspace) = 1min 10.282s. Oct 2 19:20:40.176060 systemd-nspawn[1209]: + '[' -e /etc/default/instance_configs.cfg.template ']' Oct 2 19:20:40.176295 systemd-nspawn[1209]: + echo -e '[InstanceSetup]\nset_host_keys = false' Oct 2 19:20:40.176295 systemd-nspawn[1209]: + /usr/bin/google_instance_setup Oct 2 19:20:40.838747 instance-setup[1216]: INFO Running google_set_multiqueue. Oct 2 19:20:40.855011 instance-setup[1216]: INFO Set channels for eth0 to 2. Oct 2 19:20:40.858721 instance-setup[1216]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Oct 2 19:20:40.860139 instance-setup[1216]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Oct 2 19:20:40.860654 instance-setup[1216]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Oct 2 19:20:40.861916 instance-setup[1216]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Oct 2 19:20:40.862316 instance-setup[1216]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Oct 2 19:20:40.863684 instance-setup[1216]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Oct 2 19:20:40.864176 instance-setup[1216]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Oct 2 19:20:40.865642 instance-setup[1216]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Oct 2 19:20:40.878632 instance-setup[1216]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Oct 2 19:20:40.879337 instance-setup[1216]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Oct 2 19:20:40.920895 systemd-nspawn[1209]: + /usr/bin/google_metadata_script_runner --script-type startup Oct 2 19:20:41.256068 startup-script[1247]: INFO Starting startup scripts. Oct 2 19:20:41.269278 startup-script[1247]: INFO No startup scripts found in metadata. Oct 2 19:20:41.269443 startup-script[1247]: INFO Finished running startup scripts. Oct 2 19:20:41.306513 systemd-nspawn[1209]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Oct 2 19:20:41.306513 systemd-nspawn[1209]: + daemon_pids=() Oct 2 19:20:41.307135 systemd-nspawn[1209]: + for d in accounts clock_skew network Oct 2 19:20:41.307135 systemd-nspawn[1209]: + daemon_pids+=($!) Oct 2 19:20:41.307135 systemd-nspawn[1209]: + for d in accounts clock_skew network Oct 2 19:20:41.307468 systemd-nspawn[1209]: + daemon_pids+=($!) Oct 2 19:20:41.307558 systemd-nspawn[1209]: + for d in accounts clock_skew network Oct 2 19:20:41.307879 systemd-nspawn[1209]: + daemon_pids+=($!) Oct 2 19:20:41.307986 systemd-nspawn[1209]: + NOTIFY_SOCKET=/run/systemd/notify Oct 2 19:20:41.308063 systemd-nspawn[1209]: + /usr/bin/systemd-notify --ready Oct 2 19:20:41.308284 systemd-nspawn[1209]: + /usr/bin/google_network_daemon Oct 2 19:20:41.308968 systemd-nspawn[1209]: + /usr/bin/google_clock_skew_daemon Oct 2 19:20:41.309103 systemd-nspawn[1209]: + /usr/bin/google_accounts_daemon Oct 2 19:20:41.361379 systemd-nspawn[1209]: + wait -n 36 37 38 Oct 2 19:20:41.691226 systemd[1]: Created slice system-sshd.slice. Oct 2 19:20:41.693275 systemd[1]: Started sshd@0-10.128.0.100:22-147.75.109.163:56754.service. Oct 2 19:20:41.979850 google-networking[1252]: INFO Starting Google Networking daemon. Oct 2 19:20:42.040666 sshd[1255]: Accepted publickey for core from 147.75.109.163 port 56754 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:42.045017 sshd[1255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:42.066798 systemd[1]: Created slice user-500.slice. Oct 2 19:20:42.070294 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:20:42.078796 systemd-logind[1120]: New session 1 of user core. Oct 2 19:20:42.089381 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:20:42.092040 systemd[1]: Starting user@500.service... Oct 2 19:20:42.114754 (systemd)[1265]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:42.141406 google-clock-skew[1251]: INFO Starting Google Clock Skew daemon. Oct 2 19:20:42.161794 google-clock-skew[1251]: INFO Clock drift token has changed: 0. Oct 2 19:20:42.176869 google-clock-skew[1251]: WARNING Failed to sync system time with hardware clock. Oct 2 19:20:42.177153 systemd-nspawn[1209]: hwclock: Cannot access the Hardware Clock via any known method. Oct 2 19:20:42.177153 systemd-nspawn[1209]: hwclock: Use the --verbose option to see the details of our search for an access method. Oct 2 19:20:42.200850 groupadd[1272]: group added to /etc/group: name=google-sudoers, GID=1000 Oct 2 19:20:42.205347 groupadd[1272]: group added to /etc/gshadow: name=google-sudoers Oct 2 19:20:42.211773 groupadd[1272]: new group: name=google-sudoers, GID=1000 Oct 2 19:20:42.235020 google-accounts[1250]: INFO Starting Google Accounts daemon. Oct 2 19:20:42.268317 google-accounts[1250]: WARNING OS Login not installed. Oct 2 19:20:42.269569 google-accounts[1250]: INFO Creating a new user account for 0. Oct 2 19:20:42.271658 systemd[1265]: Queued start job for default target default.target. Oct 2 19:20:42.272653 systemd[1265]: Reached target paths.target. Oct 2 19:20:42.272696 systemd[1265]: Reached target sockets.target. Oct 2 19:20:42.272737 systemd[1265]: Reached target timers.target. Oct 2 19:20:42.272758 systemd[1265]: Reached target basic.target. Oct 2 19:20:42.272838 systemd[1265]: Reached target default.target. Oct 2 19:20:42.272892 systemd[1265]: Startup finished in 139ms. Oct 2 19:20:42.272932 systemd[1]: Started user@500.service. Oct 2 19:20:42.274660 systemd[1]: Started session-1.scope. Oct 2 19:20:42.286324 systemd-nspawn[1209]: useradd: invalid user name '0': use --badname to ignore Oct 2 19:20:42.287440 google-accounts[1250]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Oct 2 19:20:42.498578 systemd[1]: Started sshd@1-10.128.0.100:22-147.75.109.163:43472.service. Oct 2 19:20:42.787333 sshd[1285]: Accepted publickey for core from 147.75.109.163 port 43472 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:42.789076 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:42.795520 systemd-logind[1120]: New session 2 of user core. Oct 2 19:20:42.796201 systemd[1]: Started session-2.scope. Oct 2 19:20:43.007647 sshd[1285]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:43.012219 systemd-logind[1120]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:20:43.012493 systemd[1]: sshd@1-10.128.0.100:22-147.75.109.163:43472.service: Deactivated successfully. Oct 2 19:20:43.013635 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:20:43.014854 systemd-logind[1120]: Removed session 2. Oct 2 19:20:43.054379 systemd[1]: Started sshd@2-10.128.0.100:22-147.75.109.163:43476.service. Oct 2 19:20:43.343943 sshd[1291]: Accepted publickey for core from 147.75.109.163 port 43476 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:43.345580 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:43.352482 systemd[1]: Started session-3.scope. Oct 2 19:20:43.353135 systemd-logind[1120]: New session 3 of user core. Oct 2 19:20:43.553559 sshd[1291]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:43.557843 systemd[1]: sshd@2-10.128.0.100:22-147.75.109.163:43476.service: Deactivated successfully. Oct 2 19:20:43.558894 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:20:43.559779 systemd-logind[1120]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:20:43.561055 systemd-logind[1120]: Removed session 3. Oct 2 19:20:43.600004 systemd[1]: Started sshd@3-10.128.0.100:22-147.75.109.163:43488.service. Oct 2 19:20:43.889102 sshd[1297]: Accepted publickey for core from 147.75.109.163 port 43488 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:43.890983 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:43.898194 systemd[1]: Started session-4.scope. Oct 2 19:20:43.899209 systemd-logind[1120]: New session 4 of user core. Oct 2 19:20:44.103922 sshd[1297]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:44.108142 systemd[1]: sshd@3-10.128.0.100:22-147.75.109.163:43488.service: Deactivated successfully. Oct 2 19:20:44.109203 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:20:44.110114 systemd-logind[1120]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:20:44.111607 systemd-logind[1120]: Removed session 4. Oct 2 19:20:44.149568 systemd[1]: Started sshd@4-10.128.0.100:22-147.75.109.163:43504.service. Oct 2 19:20:44.439137 sshd[1303]: Accepted publickey for core from 147.75.109.163 port 43504 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:44.441045 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:44.447665 systemd[1]: Started session-5.scope. Oct 2 19:20:44.448490 systemd-logind[1120]: New session 5 of user core. Oct 2 19:20:44.639604 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:20:44.640026 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:20:44.649946 dbus-daemon[1101]: \xd0\xcd3)\xd0U: received setenforce notice (enforcing=-498896752) Oct 2 19:20:44.652113 sudo[1306]: pam_unix(sudo:session): session closed for user root Oct 2 19:20:44.696583 sshd[1303]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:44.701597 systemd[1]: sshd@4-10.128.0.100:22-147.75.109.163:43504.service: Deactivated successfully. Oct 2 19:20:44.702795 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:20:44.703684 systemd-logind[1120]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:20:44.705050 systemd-logind[1120]: Removed session 5. Oct 2 19:20:44.742925 systemd[1]: Started sshd@5-10.128.0.100:22-147.75.109.163:43518.service. Oct 2 19:20:45.032530 sshd[1310]: Accepted publickey for core from 147.75.109.163 port 43518 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:45.034812 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:45.041582 systemd[1]: Started session-6.scope. Oct 2 19:20:45.042556 systemd-logind[1120]: New session 6 of user core. Oct 2 19:20:45.210284 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:20:45.210671 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:20:45.215045 sudo[1314]: pam_unix(sudo:session): session closed for user root Oct 2 19:20:45.227251 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:20:45.227630 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:20:45.240530 systemd[1]: Stopping audit-rules.service... Oct 2 19:20:45.241000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:20:45.248054 kernel: kauditd_printk_skb: 176 callbacks suppressed Oct 2 19:20:45.248138 kernel: audit: type=1305 audit(1696274445.241:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:20:45.262585 auditctl[1317]: No rules Oct 2 19:20:45.241000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc703112e0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:45.293264 kernel: audit: type=1300 audit(1696274445.241:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc703112e0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:45.294641 kernel: audit: type=1327 audit(1696274445.241:160): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:20:45.241000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:20:45.263821 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:20:45.264087 systemd[1]: Stopped audit-rules.service. Oct 2 19:20:45.296107 systemd[1]: Starting audit-rules.service... Oct 2 19:20:45.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.325112 kernel: audit: type=1131 audit(1696274445.262:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.333279 augenrules[1334]: No rules Oct 2 19:20:45.334043 systemd[1]: Finished audit-rules.service. Oct 2 19:20:45.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.335720 sudo[1313]: pam_unix(sudo:session): session closed for user root Oct 2 19:20:45.333000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.381882 kernel: audit: type=1130 audit(1696274445.332:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.382018 kernel: audit: type=1106 audit(1696274445.333:163): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.382060 kernel: audit: type=1104 audit(1696274445.333:164): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.333000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.382375 sshd[1310]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:45.387674 systemd-logind[1120]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:20:45.390089 systemd[1]: sshd@5-10.128.0.100:22-147.75.109.163:43518.service: Deactivated successfully. Oct 2 19:20:45.391197 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:20:45.393382 systemd-logind[1120]: Removed session 6. Oct 2 19:20:45.405749 kernel: audit: type=1106 audit(1696274445.380:165): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.380000 audit[1310]: USER_END pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.435919 systemd[1]: Started sshd@6-10.128.0.100:22-147.75.109.163:43534.service. Oct 2 19:20:45.380000 audit[1310]: CRED_DISP pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.463891 kernel: audit: type=1104 audit(1696274445.380:166): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.463959 kernel: audit: type=1131 audit(1696274445.385:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.100:22-147.75.109.163:43518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.100:22-147.75.109.163:43518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.100:22-147.75.109.163:43534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.727000 audit[1340]: USER_ACCT pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.729078 sshd[1340]: Accepted publickey for core from 147.75.109.163 port 43534 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:45.728000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.728000 audit[1340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe98c89e70 a2=3 a3=0 items=0 ppid=1 pid=1340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:45.728000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:20:45.730876 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:45.736921 systemd-logind[1120]: New session 7 of user core. Oct 2 19:20:45.737616 systemd[1]: Started session-7.scope. Oct 2 19:20:45.743000 audit[1340]: USER_START pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.745000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:45.907000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.908138 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:20:45.907000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:45.908546 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:20:45.910000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:46.552091 systemd[1]: Reloading. Oct 2 19:20:46.645790 /usr/lib/systemd/system-generators/torcx-generator[1372]: time="2023-10-02T19:20:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:20:46.645858 /usr/lib/systemd/system-generators/torcx-generator[1372]: time="2023-10-02T19:20:46Z" level=info msg="torcx already run" Oct 2 19:20:46.754317 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:20:46.754345 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:20:46.777770 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit: BPF prog-id=34 op=LOAD Oct 2 19:20:46.869000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit: BPF prog-id=35 op=LOAD Oct 2 19:20:46.869000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit: BPF prog-id=36 op=LOAD Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.869000 audit: BPF prog-id=37 op=LOAD Oct 2 19:20:46.869000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:20:46.869000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.870000 audit: BPF prog-id=38 op=LOAD Oct 2 19:20:46.870000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit: BPF prog-id=39 op=LOAD Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.871000 audit: BPF prog-id=40 op=LOAD Oct 2 19:20:46.871000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:20:46.871000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.875000 audit: BPF prog-id=41 op=LOAD Oct 2 19:20:46.875000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.877000 audit: BPF prog-id=42 op=LOAD Oct 2 19:20:46.877000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit: BPF prog-id=43 op=LOAD Oct 2 19:20:46.881000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit: BPF prog-id=44 op=LOAD Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.881000 audit: BPF prog-id=45 op=LOAD Oct 2 19:20:46.881000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:20:46.881000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit: BPF prog-id=46 op=LOAD Oct 2 19:20:46.883000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit: BPF prog-id=47 op=LOAD Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.883000 audit: BPF prog-id=48 op=LOAD Oct 2 19:20:46.883000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:20:46.883000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit: BPF prog-id=49 op=LOAD Oct 2 19:20:46.908000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit: BPF prog-id=50 op=LOAD Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.908000 audit: BPF prog-id=51 op=LOAD Oct 2 19:20:46.908000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:20:46.909000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:20:46.925137 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:20:46.933773 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:20:46.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:46.934711 systemd[1]: Reached target network-online.target. Oct 2 19:20:46.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:46.937281 systemd[1]: Started kubelet.service. Oct 2 19:20:46.955808 systemd[1]: Starting coreos-metadata.service... Oct 2 19:20:47.041447 coreos-metadata[1424]: Oct 02 19:20:47.041 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Oct 2 19:20:47.046817 coreos-metadata[1424]: Oct 02 19:20:47.046 INFO Fetch successful Oct 2 19:20:47.046817 coreos-metadata[1424]: Oct 02 19:20:47.046 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Oct 2 19:20:47.047618 coreos-metadata[1424]: Oct 02 19:20:47.047 INFO Fetch successful Oct 2 19:20:47.047618 coreos-metadata[1424]: Oct 02 19:20:47.047 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Oct 2 19:20:47.048267 coreos-metadata[1424]: Oct 02 19:20:47.048 INFO Fetch successful Oct 2 19:20:47.048267 coreos-metadata[1424]: Oct 02 19:20:47.048 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Oct 2 19:20:47.049012 coreos-metadata[1424]: Oct 02 19:20:47.048 INFO Fetch successful Oct 2 19:20:47.049915 kubelet[1416]: E1002 19:20:47.049863 1416 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:20:47.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:20:47.055891 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:20:47.056102 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:20:47.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:47.061602 systemd[1]: Finished coreos-metadata.service. Oct 2 19:20:47.524972 systemd[1]: Stopped kubelet.service. Oct 2 19:20:47.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:47.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:47.548348 systemd[1]: Reloading. Oct 2 19:20:47.643662 /usr/lib/systemd/system-generators/torcx-generator[1481]: time="2023-10-02T19:20:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:20:47.646362 /usr/lib/systemd/system-generators/torcx-generator[1481]: time="2023-10-02T19:20:47Z" level=info msg="torcx already run" Oct 2 19:20:47.755742 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:20:47.755769 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:20:47.779344 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.871000 audit: BPF prog-id=52 op=LOAD Oct 2 19:20:47.871000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit: BPF prog-id=53 op=LOAD Oct 2 19:20:47.872000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit: BPF prog-id=54 op=LOAD Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.873000 audit: BPF prog-id=55 op=LOAD Oct 2 19:20:47.873000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:20:47.873000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.874000 audit: BPF prog-id=56 op=LOAD Oct 2 19:20:47.874000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit: BPF prog-id=57 op=LOAD Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.875000 audit: BPF prog-id=58 op=LOAD Oct 2 19:20:47.875000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:20:47.875000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.878000 audit: BPF prog-id=59 op=LOAD Oct 2 19:20:47.878000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:20:47.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.880000 audit: BPF prog-id=60 op=LOAD Oct 2 19:20:47.880000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.883000 audit: BPF prog-id=61 op=LOAD Oct 2 19:20:47.883000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit: BPF prog-id=62 op=LOAD Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.884000 audit: BPF prog-id=63 op=LOAD Oct 2 19:20:47.884000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:20:47.884000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.885000 audit: BPF prog-id=64 op=LOAD Oct 2 19:20:47.885000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit: BPF prog-id=65 op=LOAD Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.886000 audit: BPF prog-id=66 op=LOAD Oct 2 19:20:47.886000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:20:47.886000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit: BPF prog-id=67 op=LOAD Oct 2 19:20:47.888000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit: BPF prog-id=68 op=LOAD Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.888000 audit: BPF prog-id=69 op=LOAD Oct 2 19:20:47.888000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:20:47.888000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:20:47.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:47.919107 systemd[1]: Started kubelet.service. Oct 2 19:20:47.979041 kubelet[1524]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:20:47.979041 kubelet[1524]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:20:47.979041 kubelet[1524]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:20:47.979602 kubelet[1524]: I1002 19:20:47.979115 1524 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:20:48.653592 kubelet[1524]: I1002 19:20:48.653528 1524 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:20:48.653592 kubelet[1524]: I1002 19:20:48.653568 1524 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:20:48.653994 kubelet[1524]: I1002 19:20:48.653954 1524 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:20:48.657246 kubelet[1524]: I1002 19:20:48.657214 1524 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:20:48.671569 kubelet[1524]: I1002 19:20:48.671517 1524 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:20:48.671909 kubelet[1524]: I1002 19:20:48.671872 1524 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:20:48.672147 kubelet[1524]: I1002 19:20:48.672110 1524 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:20:48.672147 kubelet[1524]: I1002 19:20:48.672146 1524 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:20:48.672409 kubelet[1524]: I1002 19:20:48.672162 1524 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:20:48.672409 kubelet[1524]: I1002 19:20:48.672310 1524 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:20:48.672513 kubelet[1524]: I1002 19:20:48.672434 1524 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:20:48.672513 kubelet[1524]: I1002 19:20:48.672465 1524 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:20:48.672600 kubelet[1524]: I1002 19:20:48.672514 1524 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:20:48.672600 kubelet[1524]: I1002 19:20:48.672545 1524 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:20:48.673254 kubelet[1524]: E1002 19:20:48.673207 1524 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:48.673377 kubelet[1524]: E1002 19:20:48.673278 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:48.674301 kubelet[1524]: I1002 19:20:48.674266 1524 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:20:48.677683 kubelet[1524]: W1002 19:20:48.677648 1524 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:20:48.678430 kubelet[1524]: I1002 19:20:48.678403 1524 server.go:1232] "Started kubelet" Oct 2 19:20:48.680064 kubelet[1524]: E1002 19:20:48.680038 1524 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:20:48.679000 audit[1524]: AVC avc: denied { mac_admin } for pid=1524 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.679000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:20:48.679000 audit[1524]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004a7320 a1=c000c33668 a2=c0004a72f0 a3=25 items=0 ppid=1 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.679000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:20:48.680605 kubelet[1524]: E1002 19:20:48.680586 1524 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:20:48.680746 kubelet[1524]: I1002 19:20:48.680209 1524 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:20:48.680000 audit[1524]: AVC avc: denied { mac_admin } for pid=1524 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.680000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:20:48.681153 kubelet[1524]: I1002 19:20:48.680269 1524 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:20:48.680000 audit[1524]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00047c660 a1=c0001385e8 a2=c0000e9080 a3=25 items=0 ppid=1 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.680000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:20:48.681858 kubelet[1524]: I1002 19:20:48.681840 1524 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:20:48.682054 kubelet[1524]: I1002 19:20:48.682029 1524 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:20:48.682180 kubelet[1524]: I1002 19:20:48.682164 1524 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:20:48.683335 kubelet[1524]: I1002 19:20:48.680326 1524 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:20:48.683651 kubelet[1524]: I1002 19:20:48.683539 1524 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:20:48.689862 kubelet[1524]: E1002 19:20:48.689746 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb30bc183", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 678371715, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 678371715, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.690141 kubelet[1524]: W1002 19:20:48.690117 1524 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:20:48.690227 kubelet[1524]: E1002 19:20:48.690173 1524 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:20:48.690227 kubelet[1524]: W1002 19:20:48.690219 1524 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:20:48.690363 kubelet[1524]: E1002 19:20:48.690234 1524 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:20:48.693578 kubelet[1524]: E1002 19:20:48.692759 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb32d4803", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 680568835, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 680568835, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.695279 kubelet[1524]: E1002 19:20:48.694943 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:48.695279 kubelet[1524]: I1002 19:20:48.694978 1524 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:20:48.695279 kubelet[1524]: I1002 19:20:48.695088 1524 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:20:48.695279 kubelet[1524]: I1002 19:20:48.695156 1524 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:20:48.697180 kubelet[1524]: W1002 19:20:48.697138 1524 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:20:48.697180 kubelet[1524]: E1002 19:20:48.697175 1524 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:20:48.697350 kubelet[1524]: E1002 19:20:48.697270 1524 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.100\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 2 19:20:48.728579 kubelet[1524]: E1002 19:20:48.728440 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4c2d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727196373, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727196373, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.729802 kubelet[1524]: I1002 19:20:48.729776 1524 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:20:48.730020 kubelet[1524]: I1002 19:20:48.729978 1524 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:20:48.730020 kubelet[1524]: I1002 19:20:48.730012 1524 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:20:48.731716 kubelet[1524]: E1002 19:20:48.731587 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4d6b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727201457, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727201457, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.733088 kubelet[1524]: E1002 19:20:48.732895 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4e26b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727204459, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727204459, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.733661 kubelet[1524]: I1002 19:20:48.733620 1524 policy_none.go:49] "None policy: Start" Oct 2 19:20:48.735522 kubelet[1524]: I1002 19:20:48.735497 1524 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:20:48.735626 kubelet[1524]: I1002 19:20:48.735536 1524 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:20:48.746161 systemd[1]: Created slice kubepods.slice. Oct 2 19:20:48.755182 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:20:48.761909 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:20:48.762000 audit[1540]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.762000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3a240300 a2=0 a3=7ffe3a2402ec items=0 ppid=1524 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:20:48.765000 audit[1543]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.765000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffee9d1c2b0 a2=0 a3=7ffee9d1c29c items=0 ppid=1524 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:20:48.770017 kubelet[1524]: I1002 19:20:48.769983 1524 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:20:48.769000 audit[1524]: AVC avc: denied { mac_admin } for pid=1524 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.769000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:20:48.769000 audit[1524]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f0a6f0 a1=c000f22c90 a2=c000f0a6c0 a3=25 items=0 ppid=1 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.769000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:20:48.770903 kubelet[1524]: I1002 19:20:48.770883 1524 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:20:48.772566 kubelet[1524]: I1002 19:20:48.772544 1524 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:20:48.773939 kubelet[1524]: E1002 19:20:48.773908 1524 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.100\" not found" Oct 2 19:20:48.775882 kubelet[1524]: E1002 19:20:48.775767 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb8bd2375", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 773882741, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 773882741, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.775000 audit[1545]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.775000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd85eb55a0 a2=0 a3=7ffd85eb558c items=0 ppid=1524 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:20:48.796520 kubelet[1524]: I1002 19:20:48.796484 1524 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.100" Oct 2 19:20:48.798155 kubelet[1524]: E1002 19:20:48.798111 1524 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.100" Oct 2 19:20:48.797000 audit[1550]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.797000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6277c120 a2=0 a3=7ffc6277c10c items=0 ppid=1524 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:20:48.799017 kubelet[1524]: E1002 19:20:48.798920 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4c2d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727196373, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 796411081, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4c2d5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.800141 kubelet[1524]: E1002 19:20:48.800043 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4d6b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727201457, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 796419108, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4d6b1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.801434 kubelet[1524]: E1002 19:20:48.801359 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4e26b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727204459, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 796423400, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4e26b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:48.852000 audit[1555]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.852000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc9ed8e310 a2=0 a3=7ffc9ed8e2fc items=0 ppid=1524 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:20:48.854591 kubelet[1524]: I1002 19:20:48.854560 1524 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:20:48.854000 audit[1556]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:48.854000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc127bf50 a2=0 a3=7ffcc127bf3c items=0 ppid=1524 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:20:48.856750 kubelet[1524]: I1002 19:20:48.856571 1524 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:20:48.856750 kubelet[1524]: I1002 19:20:48.856603 1524 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:20:48.856750 kubelet[1524]: I1002 19:20:48.856640 1524 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:20:48.856750 kubelet[1524]: E1002 19:20:48.856745 1524 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:20:48.857000 audit[1558]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:48.857000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2d8f5ff0 a2=0 a3=7ffd2d8f5fdc items=0 ppid=1524 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:20:48.858000 audit[1557]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.859885 kubelet[1524]: W1002 19:20:48.859754 1524 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:20:48.859885 kubelet[1524]: E1002 19:20:48.859793 1524 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:20:48.858000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9a8a91f0 a2=0 a3=7ffe9a8a91dc items=0 ppid=1524 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:20:48.859000 audit[1559]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1559 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:48.859000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc933106f0 a2=0 a3=7ffc933106dc items=0 ppid=1524 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:20:48.861000 audit[1561]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1561 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:48.861000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc79997140 a2=0 a3=7ffc7999712c items=0 ppid=1524 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:20:48.861000 audit[1560]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.861000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd0a76fd80 a2=0 a3=7ffd0a76fd6c items=0 ppid=1524 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:20:48.863000 audit[1562]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:48.863000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc05a658a0 a2=0 a3=7ffc05a6588c items=0 ppid=1524 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:20:48.899398 kubelet[1524]: E1002 19:20:48.899343 1524 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.100\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 2 19:20:48.999933 kubelet[1524]: I1002 19:20:48.999803 1524 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.100" Oct 2 19:20:49.005627 kubelet[1524]: E1002 19:20:49.005590 1524 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.100" Oct 2 19:20:49.005878 kubelet[1524]: E1002 19:20:49.005663 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4c2d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727196373, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 999681685, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4c2d5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:49.007477 kubelet[1524]: E1002 19:20:49.007377 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4d6b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727201457, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 999717127, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4d6b1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:49.008840 kubelet[1524]: E1002 19:20:49.008759 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4e26b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727204459, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 999748069, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4e26b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:49.301968 kubelet[1524]: E1002 19:20:49.301828 1524 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.100\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 2 19:20:49.407579 kubelet[1524]: I1002 19:20:49.407530 1524 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.100" Oct 2 19:20:49.409023 kubelet[1524]: E1002 19:20:49.408985 1524 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.100" Oct 2 19:20:49.409181 kubelet[1524]: E1002 19:20:49.408998 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4c2d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727196373, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 49, 407469268, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4c2d5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:49.410338 kubelet[1524]: E1002 19:20:49.410246 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4d6b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727201457, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 49, 407484596, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4d6b1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:49.411386 kubelet[1524]: E1002 19:20:49.411296 1524 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100.178a609fb5f4e26b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.100", UID:"10.128.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 20, 48, 727204459, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 20, 49, 407489444, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.128.0.100"}': 'events "10.128.0.100.178a609fb5f4e26b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:20:49.529594 kubelet[1524]: W1002 19:20:49.529543 1524 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:20:49.529594 kubelet[1524]: E1002 19:20:49.529589 1524 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:20:49.656242 kubelet[1524]: I1002 19:20:49.656176 1524 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:20:49.673668 kubelet[1524]: E1002 19:20:49.673603 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:50.043012 kubelet[1524]: E1002 19:20:50.042876 1524 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.128.0.100" not found Oct 2 19:20:50.107359 kubelet[1524]: E1002 19:20:50.107313 1524 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.100\" not found" node="10.128.0.100" Oct 2 19:20:50.211132 kubelet[1524]: I1002 19:20:50.211075 1524 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.100" Oct 2 19:20:50.216899 kubelet[1524]: I1002 19:20:50.216846 1524 kubelet_node_status.go:73] "Successfully registered node" node="10.128.0.100" Oct 2 19:20:50.240192 kubelet[1524]: E1002 19:20:50.240135 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.340802 kubelet[1524]: E1002 19:20:50.340658 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.441226 kubelet[1524]: E1002 19:20:50.441178 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.445037 sudo[1343]: pam_unix(sudo:session): session closed for user root Oct 2 19:20:50.444000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.451386 kernel: kauditd_printk_skb: 478 callbacks suppressed Oct 2 19:20:50.451499 kernel: audit: type=1106 audit(1696274450.444:611): pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.445000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.498545 kernel: audit: type=1104 audit(1696274450.445:612): pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.499402 sshd[1340]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:50.500000 audit[1340]: USER_END pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.504224 systemd[1]: sshd@6-10.128.0.100:22-147.75.109.163:43534.service: Deactivated successfully. Oct 2 19:20:50.505338 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:20:50.508942 systemd-logind[1120]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:20:50.510777 systemd-logind[1120]: Removed session 7. Oct 2 19:20:50.500000 audit[1340]: CRED_DISP pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.542182 kubelet[1524]: E1002 19:20:50.542124 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.559052 kernel: audit: type=1106 audit(1696274450.500:613): pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.559166 kernel: audit: type=1104 audit(1696274450.500:614): pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.559233 kernel: audit: type=1131 audit(1696274450.501:615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.100:22-147.75.109.163:43534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.100:22-147.75.109.163:43534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.643163 kubelet[1524]: E1002 19:20:50.643098 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.674520 kubelet[1524]: E1002 19:20:50.674471 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:50.744374 kubelet[1524]: E1002 19:20:50.744317 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.845406 kubelet[1524]: E1002 19:20:50.845346 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:50.945739 kubelet[1524]: E1002 19:20:50.945578 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.046531 kubelet[1524]: E1002 19:20:51.046467 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.147536 kubelet[1524]: E1002 19:20:51.147464 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.248720 kubelet[1524]: E1002 19:20:51.248551 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.349597 kubelet[1524]: E1002 19:20:51.349528 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.450681 kubelet[1524]: E1002 19:20:51.450614 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.551575 kubelet[1524]: E1002 19:20:51.551429 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.652238 kubelet[1524]: E1002 19:20:51.652161 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.675616 kubelet[1524]: E1002 19:20:51.675548 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:51.752461 kubelet[1524]: E1002 19:20:51.752399 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.853636 kubelet[1524]: E1002 19:20:51.853490 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:51.954263 kubelet[1524]: E1002 19:20:51.954196 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:52.055186 kubelet[1524]: E1002 19:20:52.055118 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:52.156099 kubelet[1524]: E1002 19:20:52.156040 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:52.257147 kubelet[1524]: E1002 19:20:52.257037 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:52.357828 kubelet[1524]: E1002 19:20:52.357764 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:52.458600 kubelet[1524]: E1002 19:20:52.458462 1524 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.100\" not found" Oct 2 19:20:52.559833 kubelet[1524]: I1002 19:20:52.559682 1524 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:20:52.560290 env[1136]: time="2023-10-02T19:20:52.560232816Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:20:52.560843 kubelet[1524]: I1002 19:20:52.560518 1524 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:20:52.675809 kubelet[1524]: E1002 19:20:52.675764 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:52.675809 kubelet[1524]: I1002 19:20:52.675770 1524 apiserver.go:52] "Watching apiserver" Oct 2 19:20:52.678548 kubelet[1524]: I1002 19:20:52.678505 1524 topology_manager.go:215] "Topology Admit Handler" podUID="b408c8c2-1820-4836-b651-391dd5d1a76e" podNamespace="calico-system" podName="calico-node-zp5mv" Oct 2 19:20:52.678691 kubelet[1524]: I1002 19:20:52.678661 1524 topology_manager.go:215] "Topology Admit Handler" podUID="1c0fbef3-348c-445b-bd67-486353f6f517" podNamespace="kube-system" podName="kube-proxy-nhz2g" Oct 2 19:20:52.687490 systemd[1]: Created slice kubepods-besteffort-pod1c0fbef3_348c_445b_bd67_486353f6f517.slice. Oct 2 19:20:52.696167 kubelet[1524]: I1002 19:20:52.696119 1524 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:20:52.701206 systemd[1]: Created slice kubepods-besteffort-podb408c8c2_1820_4836_b651_391dd5d1a76e.slice. Oct 2 19:20:52.727234 kubelet[1524]: I1002 19:20:52.726570 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-var-lib-calico\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727234 kubelet[1524]: I1002 19:20:52.726625 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-cni-bin-dir\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727234 kubelet[1524]: I1002 19:20:52.726660 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-cni-net-dir\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727234 kubelet[1524]: I1002 19:20:52.726706 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-xtables-lock\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727234 kubelet[1524]: I1002 19:20:52.726743 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b408c8c2-1820-4836-b651-391dd5d1a76e-tigera-ca-bundle\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727611 kubelet[1524]: I1002 19:20:52.726774 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b408c8c2-1820-4836-b651-391dd5d1a76e-node-certs\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727611 kubelet[1524]: I1002 19:20:52.726817 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c0fbef3-348c-445b-bd67-486353f6f517-xtables-lock\") pod \"kube-proxy-nhz2g\" (UID: \"1c0fbef3-348c-445b-bd67-486353f6f517\") " pod="kube-system/kube-proxy-nhz2g" Oct 2 19:20:52.727611 kubelet[1524]: I1002 19:20:52.726852 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-var-run-calico\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727611 kubelet[1524]: I1002 19:20:52.726893 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-cni-log-dir\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727611 kubelet[1524]: I1002 19:20:52.726931 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-flexvol-driver-host\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727868 kubelet[1524]: I1002 19:20:52.727127 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-lib-modules\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727868 kubelet[1524]: I1002 19:20:52.727255 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1c0fbef3-348c-445b-bd67-486353f6f517-kube-proxy\") pod \"kube-proxy-nhz2g\" (UID: \"1c0fbef3-348c-445b-bd67-486353f6f517\") " pod="kube-system/kube-proxy-nhz2g" Oct 2 19:20:52.727868 kubelet[1524]: I1002 19:20:52.727304 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c0fbef3-348c-445b-bd67-486353f6f517-lib-modules\") pod \"kube-proxy-nhz2g\" (UID: \"1c0fbef3-348c-445b-bd67-486353f6f517\") " pod="kube-system/kube-proxy-nhz2g" Oct 2 19:20:52.727868 kubelet[1524]: I1002 19:20:52.727337 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b408c8c2-1820-4836-b651-391dd5d1a76e-policysync\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.727868 kubelet[1524]: I1002 19:20:52.727377 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w9hmj\" (UniqueName: \"kubernetes.io/projected/b408c8c2-1820-4836-b651-391dd5d1a76e-kube-api-access-w9hmj\") pod \"calico-node-zp5mv\" (UID: \"b408c8c2-1820-4836-b651-391dd5d1a76e\") " pod="calico-system/calico-node-zp5mv" Oct 2 19:20:52.728022 kubelet[1524]: I1002 19:20:52.727412 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s5c8h\" (UniqueName: \"kubernetes.io/projected/1c0fbef3-348c-445b-bd67-486353f6f517-kube-api-access-s5c8h\") pod \"kube-proxy-nhz2g\" (UID: \"1c0fbef3-348c-445b-bd67-486353f6f517\") " pod="kube-system/kube-proxy-nhz2g" Oct 2 19:20:52.829974 kubelet[1524]: E1002 19:20:52.829922 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.829974 kubelet[1524]: W1002 19:20:52.829953 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.829974 kubelet[1524]: E1002 19:20:52.829984 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.830510 kubelet[1524]: E1002 19:20:52.830476 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.830510 kubelet[1524]: W1002 19:20:52.830495 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.830816 kubelet[1524]: E1002 19:20:52.830795 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.830816 kubelet[1524]: W1002 19:20:52.830816 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.830988 kubelet[1524]: E1002 19:20:52.830893 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.830988 kubelet[1524]: E1002 19:20:52.830912 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.831486 kubelet[1524]: E1002 19:20:52.831455 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.831632 kubelet[1524]: W1002 19:20:52.831612 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.831796 kubelet[1524]: E1002 19:20:52.831779 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.832289 kubelet[1524]: E1002 19:20:52.832262 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.832430 kubelet[1524]: W1002 19:20:52.832412 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.832585 kubelet[1524]: E1002 19:20:52.832567 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.833130 kubelet[1524]: E1002 19:20:52.833113 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.833269 kubelet[1524]: W1002 19:20:52.833252 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.833399 kubelet[1524]: E1002 19:20:52.833387 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.833872 kubelet[1524]: E1002 19:20:52.833854 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.834015 kubelet[1524]: W1002 19:20:52.833988 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.834153 kubelet[1524]: E1002 19:20:52.834140 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.834620 kubelet[1524]: E1002 19:20:52.834590 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.834773 kubelet[1524]: W1002 19:20:52.834755 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.839607 kubelet[1524]: E1002 19:20:52.839589 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.840587 kubelet[1524]: E1002 19:20:52.840527 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.840790 kubelet[1524]: W1002 19:20:52.840771 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.840992 kubelet[1524]: E1002 19:20:52.840977 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.841539 kubelet[1524]: E1002 19:20:52.841521 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.841665 kubelet[1524]: W1002 19:20:52.841649 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.841828 kubelet[1524]: E1002 19:20:52.841813 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.842250 kubelet[1524]: E1002 19:20:52.842229 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.842250 kubelet[1524]: W1002 19:20:52.842246 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.842403 kubelet[1524]: E1002 19:20:52.842274 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.842631 kubelet[1524]: E1002 19:20:52.842610 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.842631 kubelet[1524]: W1002 19:20:52.842627 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.842778 kubelet[1524]: E1002 19:20:52.842652 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.843253 kubelet[1524]: E1002 19:20:52.843225 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.843253 kubelet[1524]: W1002 19:20:52.843252 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.843394 kubelet[1524]: E1002 19:20:52.843277 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.843626 kubelet[1524]: E1002 19:20:52.843605 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.843626 kubelet[1524]: W1002 19:20:52.843623 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.843825 kubelet[1524]: E1002 19:20:52.843649 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.843996 kubelet[1524]: E1002 19:20:52.843968 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.844112 kubelet[1524]: W1002 19:20:52.844088 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.844240 kubelet[1524]: E1002 19:20:52.844220 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.844391 kubelet[1524]: E1002 19:20:52.844372 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.844391 kubelet[1524]: W1002 19:20:52.844391 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.844581 kubelet[1524]: E1002 19:20:52.844535 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.844785 kubelet[1524]: E1002 19:20:52.844766 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.844785 kubelet[1524]: W1002 19:20:52.844782 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.844921 kubelet[1524]: E1002 19:20:52.844897 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.845122 kubelet[1524]: E1002 19:20:52.845103 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.845122 kubelet[1524]: W1002 19:20:52.845119 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.845296 kubelet[1524]: E1002 19:20:52.845277 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.845418 kubelet[1524]: E1002 19:20:52.845398 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.845418 kubelet[1524]: W1002 19:20:52.845415 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.845545 kubelet[1524]: E1002 19:20:52.845532 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.845771 kubelet[1524]: E1002 19:20:52.845752 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.845771 kubelet[1524]: W1002 19:20:52.845772 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.845976 kubelet[1524]: E1002 19:20:52.845958 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.846166 kubelet[1524]: E1002 19:20:52.846036 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.846242 kubelet[1524]: W1002 19:20:52.846167 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.846483 kubelet[1524]: E1002 19:20:52.846460 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.846483 kubelet[1524]: W1002 19:20:52.846482 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.846629 kubelet[1524]: E1002 19:20:52.846503 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.846826 kubelet[1524]: E1002 19:20:52.846804 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.846826 kubelet[1524]: W1002 19:20:52.846826 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.846966 kubelet[1524]: E1002 19:20:52.846845 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.847156 kubelet[1524]: E1002 19:20:52.847133 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.847156 kubelet[1524]: W1002 19:20:52.847155 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.847284 kubelet[1524]: E1002 19:20:52.847174 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.847430 kubelet[1524]: E1002 19:20:52.847406 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.847781 kubelet[1524]: E1002 19:20:52.847759 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.847781 kubelet[1524]: W1002 19:20:52.847780 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.847908 kubelet[1524]: E1002 19:20:52.847799 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.848264 kubelet[1524]: E1002 19:20:52.848242 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.848264 kubelet[1524]: W1002 19:20:52.848259 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.848387 kubelet[1524]: E1002 19:20:52.848278 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.868753 kubelet[1524]: E1002 19:20:52.868726 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.868937 kubelet[1524]: W1002 19:20:52.868914 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.869074 kubelet[1524]: E1002 19:20:52.869057 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:52.870422 kubelet[1524]: E1002 19:20:52.870395 1524 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:52.870422 kubelet[1524]: W1002 19:20:52.870415 1524 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:52.870553 kubelet[1524]: E1002 19:20:52.870437 1524 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:53.000014 env[1136]: time="2023-10-02T19:20:52.998929223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nhz2g,Uid:1c0fbef3-348c-445b-bd67-486353f6f517,Namespace:kube-system,Attempt:0,}" Oct 2 19:20:53.006224 env[1136]: time="2023-10-02T19:20:53.006179006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zp5mv,Uid:b408c8c2-1820-4836-b651-391dd5d1a76e,Namespace:calico-system,Attempt:0,}" Oct 2 19:20:53.474062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount271608367.mount: Deactivated successfully. Oct 2 19:20:53.487240 env[1136]: time="2023-10-02T19:20:53.487174258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.488835 env[1136]: time="2023-10-02T19:20:53.488755771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.493146 env[1136]: time="2023-10-02T19:20:53.493050083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.494372 env[1136]: time="2023-10-02T19:20:53.494313589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.495286 env[1136]: time="2023-10-02T19:20:53.495244465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.497906 env[1136]: time="2023-10-02T19:20:53.497846276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.504381 env[1136]: time="2023-10-02T19:20:53.504308833Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.507402 env[1136]: time="2023-10-02T19:20:53.507341919Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:53.535854 env[1136]: time="2023-10-02T19:20:53.535458321Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:53.535854 env[1136]: time="2023-10-02T19:20:53.535520249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:53.535854 env[1136]: time="2023-10-02T19:20:53.535539941Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:53.536271 env[1136]: time="2023-10-02T19:20:53.536045991Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f pid=1607 runtime=io.containerd.runc.v2 Oct 2 19:20:53.542974 env[1136]: time="2023-10-02T19:20:53.542601280Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:53.542974 env[1136]: time="2023-10-02T19:20:53.542667570Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:53.542974 env[1136]: time="2023-10-02T19:20:53.542684687Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:53.543417 env[1136]: time="2023-10-02T19:20:53.543336107Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aafce95e047c13b75d7182befba91f200edfaf595e51dd1bd0e8f1d63dfdf526 pid=1609 runtime=io.containerd.runc.v2 Oct 2 19:20:53.557992 systemd[1]: Started cri-containerd-ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f.scope. Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604803 kernel: audit: type=1400 audit(1696274453.581:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.613405 systemd[1]: Started cri-containerd-aafce95e047c13b75d7182befba91f200edfaf595e51dd1bd0e8f1d63dfdf526.scope. Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.638981 kernel: audit: type=1400 audit(1696274453.581:617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.647253 env[1136]: time="2023-10-02T19:20:53.647194128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zp5mv,Uid:b408c8c2-1820-4836-b651-391dd5d1a76e,Namespace:calico-system,Attempt:0,} returns sandbox id \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\"" Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.673745 kernel: audit: type=1400 audit(1696274453.581:618): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.685937 kubelet[1524]: E1002 19:20:53.680523 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:53.701320 kernel: audit: type=1400 audit(1696274453.581:619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.701433 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.602000 audit: BPF prog-id=70 op=LOAD Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1607 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561323430656330346163363636333631333765643732643865623130 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1607 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561323430656330346163363636333631333765643732643865623130 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.603000 audit: BPF prog-id=71 op=LOAD Oct 2 19:20:53.603000 audit[1624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002024f0 items=0 ppid=1607 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561323430656330346163363636333631333765643732643865623130 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit: BPF prog-id=72 op=LOAD Oct 2 19:20:53.604000 audit[1624]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000202538 items=0 ppid=1607 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561323430656330346163363636333631333765643732643865623130 Oct 2 19:20:53.604000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:20:53.604000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { perfmon } for pid=1624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit[1624]: AVC avc: denied { bpf } for pid=1624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.604000 audit: BPF prog-id=73 op=LOAD Oct 2 19:20:53.604000 audit[1624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000202948 items=0 ppid=1607 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561323430656330346163363636333631333765643732643865623130 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.702000 audit: BPF prog-id=74 op=LOAD Oct 2 19:20:53.705292 kubelet[1524]: E1002 19:20:53.704819 1524 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:20:53.705874 env[1136]: time="2023-10-02T19:20:53.705463571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1609 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666365393565303437633133623735643731383262656662613931 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1609 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666365393565303437633133623735643731383262656662613931 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit: BPF prog-id=75 op=LOAD Oct 2 19:20:53.705000 audit[1636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003cc880 items=0 ppid=1609 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666365393565303437633133623735643731383262656662613931 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.705000 audit: BPF prog-id=76 op=LOAD Oct 2 19:20:53.705000 audit[1636]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003cc8c8 items=0 ppid=1609 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666365393565303437633133623735643731383262656662613931 Oct 2 19:20:53.706000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:20:53.707000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { perfmon } for pid=1636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit[1636]: AVC avc: denied { bpf } for pid=1636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.707000 audit: BPF prog-id=77 op=LOAD Oct 2 19:20:53.707000 audit[1636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003cccd8 items=0 ppid=1609 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:53.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666365393565303437633133623735643731383262656662613931 Oct 2 19:20:53.725675 env[1136]: time="2023-10-02T19:20:53.725538197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nhz2g,Uid:1c0fbef3-348c-445b-bd67-486353f6f517,Namespace:kube-system,Attempt:0,} returns sandbox id \"aafce95e047c13b75d7182befba91f200edfaf595e51dd1bd0e8f1d63dfdf526\"" Oct 2 19:20:54.681123 kubelet[1524]: E1002 19:20:54.681070 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:54.696959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1791066431.mount: Deactivated successfully. Oct 2 19:20:55.567384 env[1136]: time="2023-10-02T19:20:55.567297170Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:55.570470 env[1136]: time="2023-10-02T19:20:55.570399458Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:55.574316 env[1136]: time="2023-10-02T19:20:55.574267340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:55.578662 env[1136]: time="2023-10-02T19:20:55.578612722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:55.580156 env[1136]: time="2023-10-02T19:20:55.580096472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:20:55.582981 env[1136]: time="2023-10-02T19:20:55.582927763Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:20:55.584343 env[1136]: time="2023-10-02T19:20:55.584285871Z" level=info msg="CreateContainer within sandbox \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:20:55.604029 env[1136]: time="2023-10-02T19:20:55.603944441Z" level=info msg="CreateContainer within sandbox \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2\"" Oct 2 19:20:55.604982 env[1136]: time="2023-10-02T19:20:55.604907738Z" level=info msg="StartContainer for \"516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2\"" Oct 2 19:20:55.637218 systemd[1]: Started cri-containerd-516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2.scope. Oct 2 19:20:55.676756 kernel: kauditd_printk_skb: 111 callbacks suppressed Oct 2 19:20:55.676900 kernel: audit: type=1400 audit(1696274455.666:651): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.666000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693399 kubelet[1524]: E1002 19:20:55.693289 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:55.666000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1607 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:55.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366539633538313034353966643034326462386337613339303533 Oct 2 19:20:55.755183 kernel: audit: type=1300 audit(1696274455.666:651): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1607 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:55.755335 kernel: audit: type=1327 audit(1696274455.666:651): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366539633538313034353966643034326462386337613339303533 Oct 2 19:20:55.755463 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.760168 systemd[1]: cri-containerd-516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2.scope: Deactivated successfully. Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.796608 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.796742 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.837926 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.838076 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.858761 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.859239 env[1136]: time="2023-10-02T19:20:55.859180743Z" level=info msg="StartContainer for \"516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2\" returns successfully" Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.901837 kernel: audit: type=1400 audit(1696274455.676:652): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.676000 audit: BPF prog-id=78 op=LOAD Oct 2 19:20:55.676000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000336280 items=0 ppid=1607 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:55.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366539633538313034353966643034326462386337613339303533 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit: BPF prog-id=79 op=LOAD Oct 2 19:20:55.693000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003362c8 items=0 ppid=1607 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:55.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366539633538313034353966643034326462386337613339303533 Oct 2 19:20:55.693000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:20:55.693000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:55.693000 audit: BPF prog-id=80 op=LOAD Oct 2 19:20:55.693000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000336358 items=0 ppid=1607 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:55.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366539633538313034353966643034326462386337613339303533 Oct 2 19:20:55.816000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:20:55.921384 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2-rootfs.mount: Deactivated successfully. Oct 2 19:20:55.982905 env[1136]: time="2023-10-02T19:20:55.982815257Z" level=info msg="shim disconnected" id=516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2 Oct 2 19:20:55.982905 env[1136]: time="2023-10-02T19:20:55.982881206Z" level=warning msg="cleaning up after shim disconnected" id=516e9c5810459fd042db8c7a39053cf11fc5cecd4a421b5b54e229ecdf85c8b2 namespace=k8s.io Oct 2 19:20:55.982905 env[1136]: time="2023-10-02T19:20:55.982897152Z" level=info msg="cleaning up dead shim" Oct 2 19:20:55.996727 env[1136]: time="2023-10-02T19:20:55.996654269Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:20:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1731 runtime=io.containerd.runc.v2\n" Oct 2 19:20:56.694243 kubelet[1524]: E1002 19:20:56.694163 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:56.850164 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2612975331.mount: Deactivated successfully. Oct 2 19:20:57.539963 env[1136]: time="2023-10-02T19:20:57.539881203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:57.543795 env[1136]: time="2023-10-02T19:20:57.543736723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:57.546384 env[1136]: time="2023-10-02T19:20:57.546331930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:57.548686 env[1136]: time="2023-10-02T19:20:57.548629503Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:57.549370 env[1136]: time="2023-10-02T19:20:57.549321510Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:20:57.551071 env[1136]: time="2023-10-02T19:20:57.551016193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:20:57.552472 env[1136]: time="2023-10-02T19:20:57.552434082Z" level=info msg="CreateContainer within sandbox \"aafce95e047c13b75d7182befba91f200edfaf595e51dd1bd0e8f1d63dfdf526\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:20:57.570952 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2492361937.mount: Deactivated successfully. Oct 2 19:20:57.583557 env[1136]: time="2023-10-02T19:20:57.583494589Z" level=info msg="CreateContainer within sandbox \"aafce95e047c13b75d7182befba91f200edfaf595e51dd1bd0e8f1d63dfdf526\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"501cf0d99937fd109526649a972134ecab6d2aaf558fe605c66781b69d89a3ff\"" Oct 2 19:20:57.584603 env[1136]: time="2023-10-02T19:20:57.584556640Z" level=info msg="StartContainer for \"501cf0d99937fd109526649a972134ecab6d2aaf558fe605c66781b69d89a3ff\"" Oct 2 19:20:57.600496 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2560250307.mount: Deactivated successfully. Oct 2 19:20:57.618551 systemd[1]: Started cri-containerd-501cf0d99937fd109526649a972134ecab6d2aaf558fe605c66781b69d89a3ff.scope. Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1609 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316366306439393933376664313039353236363439613937323133 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit: BPF prog-id=81 op=LOAD Oct 2 19:20:57.640000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000392df0 items=0 ppid=1609 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316366306439393933376664313039353236363439613937323133 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit: BPF prog-id=82 op=LOAD Oct 2 19:20:57.640000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000392e38 items=0 ppid=1609 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316366306439393933376664313039353236363439613937323133 Oct 2 19:20:57.640000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:20:57.640000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:57.640000 audit: BPF prog-id=83 op=LOAD Oct 2 19:20:57.640000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000392ec8 items=0 ppid=1609 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530316366306439393933376664313039353236363439613937323133 Oct 2 19:20:57.663735 env[1136]: time="2023-10-02T19:20:57.663107256Z" level=info msg="StartContainer for \"501cf0d99937fd109526649a972134ecab6d2aaf558fe605c66781b69d89a3ff\" returns successfully" Oct 2 19:20:57.695300 kubelet[1524]: E1002 19:20:57.695192 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:57.743000 audit[1803]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.743000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc220b5310 a2=0 a3=7ffc220b52fc items=0 ppid=1762 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:20:57.744000 audit[1804]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:57.744000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef702f960 a2=0 a3=7ffef702f94c items=0 ppid=1762 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:20:57.749000 audit[1805]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.749000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9100d750 a2=0 a3=7ffc9100d73c items=0 ppid=1762 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:20:57.750000 audit[1806]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:57.750000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd8bcf050 a2=0 a3=7fffd8bcf03c items=0 ppid=1762 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:20:57.752000 audit[1807]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.752000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc87c2dd0 a2=0 a3=7fffc87c2dbc items=0 ppid=1762 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:20:57.753000 audit[1808]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:57.753000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc1f501a0 a2=0 a3=7fffc1f5018c items=0 ppid=1762 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:20:57.845000 audit[1809]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.845000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffea36f1ee0 a2=0 a3=7ffea36f1ecc items=0 ppid=1762 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:20:57.850000 audit[1811]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.850000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcd1a99ce0 a2=0 a3=7ffcd1a99ccc items=0 ppid=1762 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:20:57.855000 audit[1814]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.855000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffede68b060 a2=0 a3=7ffede68b04c items=0 ppid=1762 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:20:57.857000 audit[1815]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.857000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7eefff60 a2=0 a3=7ffc7eefff4c items=0 ppid=1762 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:20:57.860000 audit[1817]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.860000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8f0a3720 a2=0 a3=7ffc8f0a370c items=0 ppid=1762 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:20:57.862000 audit[1818]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.862000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f962a40 a2=0 a3=7fff9f962a2c items=0 ppid=1762 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:20:57.866000 audit[1820]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.866000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffede86f2c0 a2=0 a3=7ffede86f2ac items=0 ppid=1762 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:20:57.872000 audit[1823]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.872000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe5b37f5a0 a2=0 a3=7ffe5b37f58c items=0 ppid=1762 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:20:57.874000 audit[1824]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.874000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdac415760 a2=0 a3=7ffdac41574c items=0 ppid=1762 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:20:57.877000 audit[1826]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.877000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdaedc0ea0 a2=0 a3=7ffdaedc0e8c items=0 ppid=1762 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:20:57.879000 audit[1827]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.879000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca50ff070 a2=0 a3=7ffca50ff05c items=0 ppid=1762 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:20:57.883000 audit[1829]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.883000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb5534ac0 a2=0 a3=7ffdb5534aac items=0 ppid=1762 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:20:57.888000 audit[1832]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.888000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0b66b940 a2=0 a3=7ffc0b66b92c items=0 ppid=1762 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:20:57.893000 audit[1835]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.893000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff81eba6b0 a2=0 a3=7fff81eba69c items=0 ppid=1762 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:20:57.894000 audit[1836]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.894000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5b6a30c0 a2=0 a3=7ffc5b6a30ac items=0 ppid=1762 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:20:57.898000 audit[1838]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.898000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd0750d4d0 a2=0 a3=7ffd0750d4bc items=0 ppid=1762 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:57.934000 audit[1843]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.934000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda6c23390 a2=0 a3=7ffda6c2337c items=0 ppid=1762 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:57.936000 audit[1844]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.936000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc57b275f0 a2=0 a3=7ffc57b275dc items=0 ppid=1762 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:20:57.939000 audit[1846]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:57.939000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffbc5d85a0 a2=0 a3=7fffbc5d858c items=0 ppid=1762 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:20:57.959000 audit[1852]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:57.959000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc779b6d60 a2=0 a3=7ffc779b6d4c items=0 ppid=1762 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:57.986000 audit[1852]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:57.986000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc779b6d60 a2=0 a3=7ffc779b6d4c items=0 ppid=1762 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:58.009000 audit[1861]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.009000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff10258ab0 a2=0 a3=7fff10258a9c items=0 ppid=1762 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:20:58.014000 audit[1863]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.014000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc44e4580 a2=0 a3=7ffdc44e456c items=0 ppid=1762 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:20:58.021000 audit[1866]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.021000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9c8da200 a2=0 a3=7ffd9c8da1ec items=0 ppid=1762 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:20:58.023000 audit[1867]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.023000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd82af6a0 a2=0 a3=7fffd82af68c items=0 ppid=1762 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:20:58.027000 audit[1869]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.027000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefc33ac00 a2=0 a3=7ffefc33abec items=0 ppid=1762 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:20:58.029000 audit[1870]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.029000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff38da8fe0 a2=0 a3=7fff38da8fcc items=0 ppid=1762 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:20:58.033000 audit[1872]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.033000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde765c1e0 a2=0 a3=7ffde765c1cc items=0 ppid=1762 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:20:58.038000 audit[1875]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.038000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff0092b690 a2=0 a3=7fff0092b67c items=0 ppid=1762 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:20:58.040000 audit[1876]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.040000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9c9e5a00 a2=0 a3=7ffe9c9e59ec items=0 ppid=1762 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:20:58.043000 audit[1878]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.043000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6b87afd0 a2=0 a3=7ffc6b87afbc items=0 ppid=1762 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:20:58.045000 audit[1879]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.045000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd62e221c0 a2=0 a3=7ffd62e221ac items=0 ppid=1762 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:20:58.050000 audit[1881]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.050000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebd300bc0 a2=0 a3=7ffebd300bac items=0 ppid=1762 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:20:58.055000 audit[1884]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.055000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff1939f80 a2=0 a3=7ffff1939f6c items=0 ppid=1762 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:20:58.060000 audit[1887]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.060000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd67e5760 a2=0 a3=7fffd67e574c items=0 ppid=1762 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:20:58.061000 audit[1888]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.061000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc4f05fe10 a2=0 a3=7ffc4f05fdfc items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:20:58.065000 audit[1890]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.065000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffec605f540 a2=0 a3=7ffec605f52c items=0 ppid=1762 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:58.069000 audit[1893]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.069000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdc0107f60 a2=0 a3=7ffdc0107f4c items=0 ppid=1762 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:58.071000 audit[1894]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.071000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff461b2020 a2=0 a3=7fff461b200c items=0 ppid=1762 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:20:58.075000 audit[1896]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.075000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd56593500 a2=0 a3=7ffd565934ec items=0 ppid=1762 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:20:58.077000 audit[1897]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.077000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8bdbf5a0 a2=0 a3=7ffe8bdbf58c items=0 ppid=1762 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:20:58.082000 audit[1899]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.082000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe349c9c90 a2=0 a3=7ffe349c9c7c items=0 ppid=1762 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:20:58.088000 audit[1902]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:58.088000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9d181f30 a2=0 a3=7fff9d181f1c items=0 ppid=1762 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:20:58.092000 audit[1904]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:20:58.092000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc09426800 a2=0 a3=7ffc094267ec items=0 ppid=1762 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.092000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:58.093000 audit[1904]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:20:58.093000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc09426800 a2=0 a3=7ffc094267ec items=0 ppid=1762 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.093000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:58.486332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1528521197.mount: Deactivated successfully. Oct 2 19:20:58.695759 kubelet[1524]: E1002 19:20:58.695683 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:20:59.696969 kubelet[1524]: E1002 19:20:59.696888 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:00.697930 kubelet[1524]: E1002 19:21:00.697885 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:01.698877 kubelet[1524]: E1002 19:21:01.698788 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:01.820213 env[1136]: time="2023-10-02T19:21:01.820137650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:01.823153 env[1136]: time="2023-10-02T19:21:01.823103000Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:01.825529 env[1136]: time="2023-10-02T19:21:01.825486146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:01.827814 env[1136]: time="2023-10-02T19:21:01.827746924Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:01.828803 env[1136]: time="2023-10-02T19:21:01.828746583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:21:01.832267 env[1136]: time="2023-10-02T19:21:01.832215962Z" level=info msg="CreateContainer within sandbox \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:21:01.852554 env[1136]: time="2023-10-02T19:21:01.852489586Z" level=info msg="CreateContainer within sandbox \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06\"" Oct 2 19:21:01.853285 env[1136]: time="2023-10-02T19:21:01.853242185Z" level=info msg="StartContainer for \"d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06\"" Oct 2 19:21:01.891953 systemd[1]: Started cri-containerd-d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06.scope. Oct 2 19:21:01.921000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.928095 kernel: kauditd_printk_skb: 230 callbacks suppressed Oct 2 19:21:01.928262 kernel: audit: type=1400 audit(1696274461.921:715): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.921000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1607 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:01.980735 kernel: audit: type=1300 audit(1696274461.921:715): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1607 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:01.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333636373562653839333465333437373636326138316236656635 Oct 2 19:21:02.009723 kernel: audit: type=1327 audit(1696274461.921:715): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333636373562653839333465333437373636326138316236656635 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.030723 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.093256 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.093399 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.093460 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.114357 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.138734 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.140976 env[1136]: time="2023-10-02T19:21:02.140922904Z" level=info msg="StartContainer for \"d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06\" returns successfully" Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit: BPF prog-id=84 op=LOAD Oct 2 19:21:01.922000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000300690 items=0 ppid=1607 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:02.163748 kernel: audit: type=1400 audit(1696274461.922:716): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333636373562653839333465333437373636326138316236656635 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:01.947000 audit: BPF prog-id=85 op=LOAD Oct 2 19:21:01.947000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003006d8 items=0 ppid=1607 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:01.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333636373562653839333465333437373636326138316236656635 Oct 2 19:21:02.028000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:21:02.029000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:02.029000 audit: BPF prog-id=86 op=LOAD Oct 2 19:21:02.029000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000300768 items=0 ppid=1607 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:02.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333636373562653839333465333437373636326138316236656635 Oct 2 19:21:02.698954 kubelet[1524]: E1002 19:21:02.698895 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:02.844276 systemd[1]: run-containerd-runc-k8s.io-d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06-runc.T4efvB.mount: Deactivated successfully. Oct 2 19:21:02.945316 kubelet[1524]: I1002 19:21:02.945264 1524 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-nhz2g" podStartSLOduration=9.126593119 podCreationTimestamp="2023-10-02 19:20:50 +0000 UTC" firstStartedPulling="2023-10-02 19:20:53.731160039 +0000 UTC m=+5.806958295" lastFinishedPulling="2023-10-02 19:20:57.549759736 +0000 UTC m=+9.625557989" observedRunningTime="2023-10-02 19:20:57.922497006 +0000 UTC m=+9.998295280" watchObservedRunningTime="2023-10-02 19:21:02.945192813 +0000 UTC m=+15.020991086" Oct 2 19:21:02.970591 systemd[1]: cri-containerd-d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06.scope: Deactivated successfully. Oct 2 19:21:02.974000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:21:03.000141 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06-rootfs.mount: Deactivated successfully. Oct 2 19:21:03.061083 kubelet[1524]: I1002 19:21:03.061025 1524 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:21:03.096631 kubelet[1524]: I1002 19:21:03.096579 1524 topology_manager.go:215] "Topology Admit Handler" podUID="b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10" podNamespace="calico-system" podName="csi-node-driver-tmtth" Oct 2 19:21:03.104445 systemd[1]: Created slice kubepods-besteffort-podb8d675b2_5b4a_4ae4_8ab5_298b2ca70e10.slice. Oct 2 19:21:03.123083 kubelet[1524]: I1002 19:21:03.122951 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10-etccalico\") pod \"csi-node-driver-tmtth\" (UID: \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\") " pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:03.123502 kubelet[1524]: I1002 19:21:03.123466 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10-socket-dir\") pod \"csi-node-driver-tmtth\" (UID: \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\") " pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:03.123769 kubelet[1524]: I1002 19:21:03.123688 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10-varrun\") pod \"csi-node-driver-tmtth\" (UID: \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\") " pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:03.123960 kubelet[1524]: I1002 19:21:03.123935 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10-kubelet-dir\") pod \"csi-node-driver-tmtth\" (UID: \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\") " pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:03.124212 kubelet[1524]: I1002 19:21:03.124187 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10-registration-dir\") pod \"csi-node-driver-tmtth\" (UID: \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\") " pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:03.124395 kubelet[1524]: I1002 19:21:03.124372 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-24vlh\" (UniqueName: \"kubernetes.io/projected/b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10-kube-api-access-24vlh\") pod \"csi-node-driver-tmtth\" (UID: \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\") " pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:03.177907 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:21:03.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:03.197000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:21:03.197000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:21:03.197000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:21:03.409859 env[1136]: time="2023-10-02T19:21:03.409799387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tmtth,Uid:b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10,Namespace:calico-system,Attempt:0,}" Oct 2 19:21:03.699918 kubelet[1524]: E1002 19:21:03.699753 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:04.041099 env[1136]: time="2023-10-02T19:21:04.040948730Z" level=info msg="shim disconnected" id=d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06 Oct 2 19:21:04.041379 env[1136]: time="2023-10-02T19:21:04.041343757Z" level=warning msg="cleaning up after shim disconnected" id=d136675be8934e3477662a81b6ef512965af45ba4ccbd4966cc08b0965628d06 namespace=k8s.io Oct 2 19:21:04.041553 env[1136]: time="2023-10-02T19:21:04.041486099Z" level=info msg="cleaning up dead shim" Oct 2 19:21:04.069970 env[1136]: time="2023-10-02T19:21:04.069915734Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:21:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1960 runtime=io.containerd.runc.v2\n" Oct 2 19:21:04.130986 env[1136]: time="2023-10-02T19:21:04.130891622Z" level=error msg="Failed to destroy network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:21:04.133175 env[1136]: time="2023-10-02T19:21:04.133108821Z" level=error msg="encountered an error cleaning up failed sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:21:04.133470 env[1136]: time="2023-10-02T19:21:04.133410597Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tmtth,Uid:b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:21:04.134527 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91-shm.mount: Deactivated successfully. Oct 2 19:21:04.135657 kubelet[1524]: E1002 19:21:04.135617 1524 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:21:04.135824 kubelet[1524]: E1002 19:21:04.135735 1524 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:04.135824 kubelet[1524]: E1002 19:21:04.135773 1524 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tmtth" Oct 2 19:21:04.136155 kubelet[1524]: E1002 19:21:04.136113 1524 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tmtth_calico-system(b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tmtth_calico-system(b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tmtth" podUID="b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10" Oct 2 19:21:04.700265 kubelet[1524]: E1002 19:21:04.700193 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:04.935484 env[1136]: time="2023-10-02T19:21:04.935431418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:21:04.936813 kubelet[1524]: I1002 19:21:04.936765 1524 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Oct 2 19:21:04.938731 env[1136]: time="2023-10-02T19:21:04.937542398Z" level=info msg="StopPodSandbox for \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\"" Oct 2 19:21:04.974907 env[1136]: time="2023-10-02T19:21:04.974731578Z" level=error msg="StopPodSandbox for \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\" failed" error="failed to destroy network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:21:04.975474 kubelet[1524]: E1002 19:21:04.975418 1524 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Oct 2 19:21:04.975639 kubelet[1524]: E1002 19:21:04.975530 1524 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91"} Oct 2 19:21:04.975639 kubelet[1524]: E1002 19:21:04.975587 1524 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:21:04.975639 kubelet[1524]: E1002 19:21:04.975629 1524 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tmtth" podUID="b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10" Oct 2 19:21:05.701287 kubelet[1524]: E1002 19:21:05.701213 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:06.701804 kubelet[1524]: E1002 19:21:06.701735 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:07.702019 kubelet[1524]: E1002 19:21:07.701925 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:08.673494 kubelet[1524]: E1002 19:21:08.673418 1524 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:08.702842 kubelet[1524]: E1002 19:21:08.702752 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:09.703462 kubelet[1524]: E1002 19:21:09.703408 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:09.816585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1546037635.mount: Deactivated successfully. Oct 2 19:21:09.869400 env[1136]: time="2023-10-02T19:21:09.869315505Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:09.872201 env[1136]: time="2023-10-02T19:21:09.872143932Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:09.874444 env[1136]: time="2023-10-02T19:21:09.874393118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:09.876511 env[1136]: time="2023-10-02T19:21:09.876465025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:09.877291 env[1136]: time="2023-10-02T19:21:09.877234645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:21:09.880851 env[1136]: time="2023-10-02T19:21:09.880796040Z" level=info msg="CreateContainer within sandbox \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:21:09.904216 env[1136]: time="2023-10-02T19:21:09.904097828Z" level=info msg="CreateContainer within sandbox \"ea240ec04ac66636137ed72d8eb101bea5ccb23c900c19acb179168d358acc8f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f\"" Oct 2 19:21:09.905131 env[1136]: time="2023-10-02T19:21:09.905050228Z" level=info msg="StartContainer for \"86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f\"" Oct 2 19:21:09.933865 systemd[1]: Started cri-containerd-86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f.scope. Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.977541 kernel: kauditd_printk_skb: 38 callbacks suppressed Oct 2 19:21:09.977757 kernel: audit: type=1400 audit(1696274469.970:726): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1607 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:10.029913 kernel: audit: type=1300 audit(1696274469.970:726): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1607 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:10.030065 kernel: audit: type=1327 audit(1696274469.970:726): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383635613663636432613663656639316436653534393936393934 Oct 2 19:21:09.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383635613663636432613663656639316436653534393936393934 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.099733 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.100155 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.100235 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.141169 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.156988 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.183048 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.204043 kernel: audit: type=1400 audit(1696274469.970:727): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.970000 audit: BPF prog-id=87 op=LOAD Oct 2 19:21:09.970000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003beac0 items=0 ppid=1607 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:09.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383635613663636432613663656639316436653534393936393934 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:09.997000 audit: BPF prog-id=88 op=LOAD Oct 2 19:21:09.997000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003beb08 items=0 ppid=1607 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:09.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383635613663636432613663656639316436653534393936393934 Oct 2 19:21:10.058000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:21:10.058000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:10.058000 audit: BPF prog-id=89 op=LOAD Oct 2 19:21:10.058000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003beb98 items=0 ppid=1607 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:10.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383635613663636432613663656639316436653534393936393934 Oct 2 19:21:10.207928 env[1136]: time="2023-10-02T19:21:10.206960276Z" level=info msg="StartContainer for \"86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f\" returns successfully" Oct 2 19:21:10.295903 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:21:10.296102 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:21:10.704366 kubelet[1524]: E1002 19:21:10.704296 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:10.816869 systemd[1]: run-containerd-runc-k8s.io-86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f-runc.LOypUf.mount: Deactivated successfully. Oct 2 19:21:10.975832 kubelet[1524]: I1002 19:21:10.974545 1524 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zp5mv" podStartSLOduration=4.77066607 podCreationTimestamp="2023-10-02 19:20:50 +0000 UTC" firstStartedPulling="2023-10-02 19:20:53.673884414 +0000 UTC m=+5.749682678" lastFinishedPulling="2023-10-02 19:21:09.877708898 +0000 UTC m=+21.953507152" observedRunningTime="2023-10-02 19:21:10.974142544 +0000 UTC m=+23.049940814" watchObservedRunningTime="2023-10-02 19:21:10.974490544 +0000 UTC m=+23.050288817" Oct 2 19:21:10.987430 systemd[1]: run-containerd-runc-k8s.io-86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f-runc.g4WnrY.mount: Deactivated successfully. Oct 2 19:21:11.642000 audit[2153]: AVC avc: denied { write } for pid=2153 comm="tee" name="fd" dev="proc" ino=18344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.642000 audit[2153]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0dd5795f a2=241 a3=1b6 items=1 ppid=2121 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.642000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:21:11.642000 audit: PATH item=0 name="/dev/fd/63" inode=18335 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.643000 audit[2147]: AVC avc: denied { write } for pid=2147 comm="tee" name="fd" dev="proc" ino=19321 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.643000 audit[2147]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcffb78950 a2=241 a3=1b6 items=1 ppid=2118 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.643000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:21:11.643000 audit: PATH item=0 name="/dev/fd/63" inode=19314 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.646000 audit[2155]: AVC avc: denied { write } for pid=2155 comm="tee" name="fd" dev="proc" ino=18349 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.646000 audit[2155]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4d28495f a2=241 a3=1b6 items=1 ppid=2126 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.646000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:21:11.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.646000 audit: PATH item=0 name="/dev/fd/63" inode=19317 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.646000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.663000 audit[2157]: AVC avc: denied { write } for pid=2157 comm="tee" name="fd" dev="proc" ino=18358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.663000 audit[2157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5953194f a2=241 a3=1b6 items=1 ppid=2125 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.663000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:21:11.663000 audit: PATH item=0 name="/dev/fd/63" inode=19320 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.667000 audit[2181]: AVC avc: denied { write } for pid=2181 comm="tee" name="fd" dev="proc" ino=18362 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.670000 audit[2179]: AVC avc: denied { write } for pid=2179 comm="tee" name="fd" dev="proc" ino=18366 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.672000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=19336 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:21:11.672000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd827d1961 a2=241 a3=1b6 items=1 ppid=2130 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.672000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:21:11.672000 audit: PATH item=0 name="/dev/fd/63" inode=18346 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.672000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.667000 audit[2181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1515f95f a2=241 a3=1b6 items=1 ppid=2129 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.667000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:21:11.667000 audit: PATH item=0 name="/dev/fd/63" inode=18352 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.667000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.670000 audit[2179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca4130960 a2=241 a3=1b6 items=1 ppid=2122 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:11.670000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:21:11.670000 audit: PATH item=0 name="/dev/fd/63" inode=18351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:21:11.670000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:21:11.705016 kubelet[1524]: E1002 19:21:11.704958 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:11.996148 systemd[1]: run-containerd-runc-k8s.io-86865a6ccd2a6cef91d6e549969944d3eddcd266fc8fd7bc18abbb22a5668d5f-runc.fLIUb6.mount: Deactivated successfully. Oct 2 19:21:12.105760 kernel: Initializing XFRM netlink socket Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.299000 audit: BPF prog-id=90 op=LOAD Oct 2 19:21:12.299000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdee31a710 a2=70 a3=7f9cdceb4000 items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.299000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.303000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit: BPF prog-id=91 op=LOAD Oct 2 19:21:12.303000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdee31a710 a2=70 a3=6e items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.303000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdee31a6c0 a2=70 a3=7ffdee31a710 items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit: BPF prog-id=92 op=LOAD Oct 2 19:21:12.303000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdee31a6a0 a2=70 a3=7ffdee31a710 items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.303000 audit: BPF prog-id=92 op=UNLOAD Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee31a780 a2=70 a3=0 items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdee31a770 a2=70 a3=0 items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.303000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.303000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdee31a7b0 a2=70 a3=0 items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.304000 audit: BPF prog-id=93 op=LOAD Oct 2 19:21:12.304000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdee31a6d0 a2=70 a3=ffffffff items=0 ppid=2123 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.304000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:21:12.319000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.319000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8e3dbee0 a2=70 a3=fff80800 items=0 ppid=2123 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:21:12.319000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:12.319000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8e3dbdb0 a2=70 a3=3 items=0 ppid=2123 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:21:12.328000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:21:12.421000 audit[2305]: NETFILTER_CFG table=raw:65 family=2 entries=19 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:12.421000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc465cbfa0 a2=0 a3=7ffc465cbf8c items=0 ppid=2123 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:12.422000 audit[2307]: NETFILTER_CFG table=mangle:66 family=2 entries=19 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:12.422000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff4266d680 a2=0 a3=5644eea92000 items=0 ppid=2123 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.422000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:12.429000 audit[2306]: NETFILTER_CFG table=nat:67 family=2 entries=16 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:12.429000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc974d88a0 a2=0 a3=5567c3d98000 items=0 ppid=2123 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.429000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:12.431000 audit[2309]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:12.431000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffcd9ed6660 a2=0 a3=560c5c86d000 items=0 ppid=2123 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.431000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:12.705939 kubelet[1524]: E1002 19:21:12.705857 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:13.126648 systemd-networkd[1018]: vxlan.calico: Link UP Oct 2 19:21:13.126664 systemd-networkd[1018]: vxlan.calico: Gained carrier Oct 2 19:21:13.544660 kubelet[1524]: I1002 19:21:13.544605 1524 topology_manager.go:215] "Topology Admit Handler" podUID="d4840c4b-4ec4-4c68-b19d-a9c634178aea" podNamespace="default" podName="nginx-deployment-6d5f899847-xrnth" Oct 2 19:21:13.552289 systemd[1]: Created slice kubepods-besteffort-podd4840c4b_4ec4_4c68_b19d_a9c634178aea.slice. Oct 2 19:21:13.620512 kubelet[1524]: I1002 19:21:13.620455 1524 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dd5nk\" (UniqueName: \"kubernetes.io/projected/d4840c4b-4ec4-4c68-b19d-a9c634178aea-kube-api-access-dd5nk\") pod \"nginx-deployment-6d5f899847-xrnth\" (UID: \"d4840c4b-4ec4-4c68-b19d-a9c634178aea\") " pod="default/nginx-deployment-6d5f899847-xrnth" Oct 2 19:21:13.706322 kubelet[1524]: E1002 19:21:13.706251 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:13.858067 env[1136]: time="2023-10-02T19:21:13.857928113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-xrnth,Uid:d4840c4b-4ec4-4c68-b19d-a9c634178aea,Namespace:default,Attempt:0,}" Oct 2 19:21:14.022785 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:21:14.022964 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5661a8c82e: link becomes ready Oct 2 19:21:14.031248 systemd-networkd[1018]: calie5661a8c82e: Link UP Oct 2 19:21:14.031259 systemd-networkd[1018]: calie5661a8c82e: Gained carrier Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.926 [INFO][2332] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0 nginx-deployment-6d5f899847- default d4840c4b-4ec4-4c68-b19d-a9c634178aea 1148 0 2023-10-02 19:21:13 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.100 nginx-deployment-6d5f899847-xrnth eth0 default [] [] [kns.default ksa.default.default] calie5661a8c82e [] []}} ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.926 [INFO][2332] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.962 [INFO][2343] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" HandleID="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Workload="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.973 [INFO][2343] ipam_plugin.go 269: Auto assigning IP ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" HandleID="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Workload="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010d060), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.100", "pod":"nginx-deployment-6d5f899847-xrnth", "timestamp":"2023-10-02 19:21:13.962724376 +0000 UTC"}, Hostname:"10.128.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:21:14.050756 env[1136]: time="2023-10-02T19:21:13Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:21:14.050756 env[1136]: time="2023-10-02T19:21:13Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.974 [INFO][2343] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.100' Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.976 [INFO][2343] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.981 [INFO][2343] ipam.go 372: Looking up existing affinities for host host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.987 [INFO][2343] ipam.go 489: Trying affinity for 192.168.36.128/26 host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.990 [INFO][2343] ipam.go 155: Attempting to load block cidr=192.168.36.128/26 host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.992 [INFO][2343] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.993 [INFO][2343] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.995 [INFO][2343] ipam.go 1682: Creating new handle: k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7 Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:13.999 [INFO][2343] ipam.go 1203: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:14.005 [INFO][2343] ipam.go 1216: Successfully claimed IPs: [192.168.36.129/26] block=192.168.36.128/26 handle="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:14.005 [INFO][2343] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.36.129/26] handle="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" host="10.128.0.100" Oct 2 19:21:14.050756 env[1136]: time="2023-10-02T19:21:14Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:21:14.050756 env[1136]: 2023-10-02 19:21:14.005 [INFO][2343] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.36.129/26] IPv6=[] ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" HandleID="k8s-pod-network.35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Workload="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.052005 env[1136]: 2023-10-02 19:21:14.007 [INFO][2332] k8s.go 383: Populated endpoint ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"d4840c4b-4ec4-4c68-b19d-a9c634178aea", ResourceVersion:"1148", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 21, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.100", ContainerID:"", Pod:"nginx-deployment-6d5f899847-xrnth", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie5661a8c82e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:21:14.052005 env[1136]: 2023-10-02 19:21:14.007 [INFO][2332] k8s.go 384: Calico CNI using IPs: [192.168.36.129/32] ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.052005 env[1136]: 2023-10-02 19:21:14.007 [INFO][2332] dataplane_linux.go 68: Setting the host side veth name to calie5661a8c82e ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.052005 env[1136]: 2023-10-02 19:21:14.023 [INFO][2332] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.052005 env[1136]: 2023-10-02 19:21:14.032 [INFO][2332] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"d4840c4b-4ec4-4c68-b19d-a9c634178aea", ResourceVersion:"1148", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 21, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.100", ContainerID:"35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7", Pod:"nginx-deployment-6d5f899847-xrnth", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie5661a8c82e", MAC:"d6:02:1d:14:4b:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:21:14.052005 env[1136]: 2023-10-02 19:21:14.040 [INFO][2332] k8s.go 489: Wrote updated endpoint to datastore ContainerID="35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7" Namespace="default" Pod="nginx-deployment-6d5f899847-xrnth" WorkloadEndpoint="10.128.0.100-k8s-nginx--deployment--6d5f899847--xrnth-eth0" Oct 2 19:21:14.074000 audit[2363]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:14.074000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7ffe5958f500 a2=0 a3=7ffe5958f4ec items=0 ppid=2123 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:14.074000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:14.080840 env[1136]: time="2023-10-02T19:21:14.078540350Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:21:14.080840 env[1136]: time="2023-10-02T19:21:14.078598244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:21:14.080840 env[1136]: time="2023-10-02T19:21:14.078616660Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:21:14.080840 env[1136]: time="2023-10-02T19:21:14.078823031Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7 pid=2370 runtime=io.containerd.runc.v2 Oct 2 19:21:14.112775 systemd[1]: run-containerd-runc-k8s.io-35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7-runc.fqC9HR.mount: Deactivated successfully. Oct 2 19:21:14.121920 systemd[1]: Started cri-containerd-35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7.scope. Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.138000 audit: BPF prog-id=94 op=LOAD Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2370 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:14.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633463643736623136353162363330643037323464616161333366 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2370 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:14.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633463643736623136353162363330643037323464616161333366 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit: BPF prog-id=95 op=LOAD Oct 2 19:21:14.140000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a3450 items=0 ppid=2370 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:14.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633463643736623136353162363330643037323464616161333366 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit: BPF prog-id=96 op=LOAD Oct 2 19:21:14.140000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a3498 items=0 ppid=2370 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:14.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633463643736623136353162363330643037323464616161333366 Oct 2 19:21:14.140000 audit: BPF prog-id=96 op=UNLOAD Oct 2 19:21:14.140000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:14.140000 audit: BPF prog-id=97 op=LOAD Oct 2 19:21:14.140000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a38a8 items=0 ppid=2370 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:14.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335633463643736623136353162363330643037323464616161333366 Oct 2 19:21:14.183223 env[1136]: time="2023-10-02T19:21:14.183146613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-xrnth,Uid:d4840c4b-4ec4-4c68-b19d-a9c634178aea,Namespace:default,Attempt:0,} returns sandbox id \"35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7\"" Oct 2 19:21:14.185962 env[1136]: time="2023-10-02T19:21:14.185916506Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:21:14.707113 kubelet[1524]: E1002 19:21:14.707044 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:14.827423 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL Oct 2 19:21:15.708048 kubelet[1524]: E1002 19:21:15.708003 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:15.852275 systemd-networkd[1018]: calie5661a8c82e: Gained IPv6LL Oct 2 19:21:16.708618 kubelet[1524]: E1002 19:21:16.708461 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:17.015336 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount361841731.mount: Deactivated successfully. Oct 2 19:21:17.709312 kubelet[1524]: E1002 19:21:17.709232 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:17.796035 update_engine[1124]: I1002 19:21:17.795979 1124 update_attempter.cc:505] Updating boot flags... Oct 2 19:21:17.858608 env[1136]: time="2023-10-02T19:21:17.858144886Z" level=info msg="StopPodSandbox for \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\"" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.029 [INFO][2453] k8s.go 576: Cleaning up netns ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.029 [INFO][2453] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" iface="eth0" netns="/var/run/netns/cni-6fd3fed1-758c-20eb-5338-c00f5aa8275d" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.029 [INFO][2453] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" iface="eth0" netns="/var/run/netns/cni-6fd3fed1-758c-20eb-5338-c00f5aa8275d" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.029 [INFO][2453] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" iface="eth0" netns="/var/run/netns/cni-6fd3fed1-758c-20eb-5338-c00f5aa8275d" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.030 [INFO][2453] k8s.go 583: Releasing IP address(es) ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.030 [INFO][2453] utils.go 196: Calico CNI releasing IP address ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.080 [INFO][2459] ipam_plugin.go 416: Releasing address using handleID ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" HandleID="k8s-pod-network.e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Workload="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.095221 env[1136]: time="2023-10-02T19:21:18Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:21:18.095221 env[1136]: time="2023-10-02T19:21:18Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.088 [WARNING][2459] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" HandleID="k8s-pod-network.e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Workload="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.088 [INFO][2459] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" HandleID="k8s-pod-network.e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Workload="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.095221 env[1136]: time="2023-10-02T19:21:18Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:21:18.095221 env[1136]: 2023-10-02 19:21:18.093 [INFO][2453] k8s.go 589: Teardown processing complete. ContainerID="e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91" Oct 2 19:21:18.098418 systemd[1]: run-netns-cni\x2d6fd3fed1\x2d758c\x2d20eb\x2d5338\x2dc00f5aa8275d.mount: Deactivated successfully. Oct 2 19:21:18.100140 env[1136]: time="2023-10-02T19:21:18.100087560Z" level=info msg="TearDown network for sandbox \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\" successfully" Oct 2 19:21:18.100270 env[1136]: time="2023-10-02T19:21:18.100244313Z" level=info msg="StopPodSandbox for \"e0ae24e4f99878f4d0365409b72a61fc380dd6e71415cb66ee6b5da97044ae91\" returns successfully" Oct 2 19:21:18.101469 env[1136]: time="2023-10-02T19:21:18.101431622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tmtth,Uid:b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10,Namespace:calico-system,Attempt:1,}" Oct 2 19:21:18.313423 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:21:18.313576 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1d9b5ad9167: link becomes ready Oct 2 19:21:18.320289 systemd-networkd[1018]: cali1d9b5ad9167: Link UP Oct 2 19:21:18.320300 systemd-networkd[1018]: cali1d9b5ad9167: Gained carrier Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.186 [INFO][2467] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.100-k8s-csi--node--driver--tmtth-eth0 csi-node-driver- calico-system b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10 1167 0 2023-10-02 19:21:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.100 csi-node-driver-tmtth eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali1d9b5ad9167 [] []}} ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.187 [INFO][2467] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.247 [INFO][2478] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" HandleID="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Workload="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.262 [INFO][2478] ipam_plugin.go 269: Auto assigning IP ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" HandleID="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Workload="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004157b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.100", "pod":"csi-node-driver-tmtth", "timestamp":"2023-10-02 19:21:18.247269552 +0000 UTC"}, Hostname:"10.128.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:21:18.337690 env[1136]: time="2023-10-02T19:21:18Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:21:18.337690 env[1136]: time="2023-10-02T19:21:18Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.262 [INFO][2478] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.100' Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.265 [INFO][2478] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.271 [INFO][2478] ipam.go 372: Looking up existing affinities for host host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.277 [INFO][2478] ipam.go 489: Trying affinity for 192.168.36.128/26 host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.279 [INFO][2478] ipam.go 155: Attempting to load block cidr=192.168.36.128/26 host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.282 [INFO][2478] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.36.128/26 host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.282 [INFO][2478] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.36.128/26 handle="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.284 [INFO][2478] ipam.go 1682: Creating new handle: k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146 Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.289 [INFO][2478] ipam.go 1203: Writing block in order to claim IPs block=192.168.36.128/26 handle="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.295 [INFO][2478] ipam.go 1216: Successfully claimed IPs: [192.168.36.130/26] block=192.168.36.128/26 handle="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.295 [INFO][2478] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.36.130/26] handle="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" host="10.128.0.100" Oct 2 19:21:18.337690 env[1136]: time="2023-10-02T19:21:18Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:21:18.337690 env[1136]: 2023-10-02 19:21:18.295 [INFO][2478] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.36.130/26] IPv6=[] ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" HandleID="k8s-pod-network.1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Workload="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.347814 env[1136]: 2023-10-02 19:21:18.297 [INFO][2467] k8s.go 383: Populated endpoint ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100-k8s-csi--node--driver--tmtth-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 21, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.100", ContainerID:"", Pod:"csi-node-driver-tmtth", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1d9b5ad9167", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:21:18.347814 env[1136]: 2023-10-02 19:21:18.298 [INFO][2467] k8s.go 384: Calico CNI using IPs: [192.168.36.130/32] ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.347814 env[1136]: 2023-10-02 19:21:18.298 [INFO][2467] dataplane_linux.go 68: Setting the host side veth name to cali1d9b5ad9167 ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.347814 env[1136]: 2023-10-02 19:21:18.313 [INFO][2467] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.347814 env[1136]: 2023-10-02 19:21:18.322 [INFO][2467] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.100-k8s-csi--node--driver--tmtth-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 21, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.100", ContainerID:"1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146", Pod:"csi-node-driver-tmtth", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.36.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1d9b5ad9167", MAC:"5e:ca:ef:30:f0:b2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:21:18.347814 env[1136]: 2023-10-02 19:21:18.336 [INFO][2467] k8s.go 489: Wrote updated endpoint to datastore ContainerID="1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146" Namespace="calico-system" Pod="csi-node-driver-tmtth" WorkloadEndpoint="10.128.0.100-k8s-csi--node--driver--tmtth-eth0" Oct 2 19:21:18.353127 env[1136]: time="2023-10-02T19:21:18.352958790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:18.360232 env[1136]: time="2023-10-02T19:21:18.360168650Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:18.369577 env[1136]: time="2023-10-02T19:21:18.369523816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:18.372920 env[1136]: time="2023-10-02T19:21:18.372872456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:21:18.376633 env[1136]: time="2023-10-02T19:21:18.374685240Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:21:18.381158 env[1136]: time="2023-10-02T19:21:18.380871057Z" level=info msg="CreateContainer within sandbox \"35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:21:18.384000 audit[2503]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:18.392627 kernel: kauditd_printk_skb: 211 callbacks suppressed Oct 2 19:21:18.392777 kernel: audit: type=1325 audit(1696274478.384:776): table=filter:70 family=2 entries=40 op=nft_register_chain pid=2503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:21:18.384000 audit[2503]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff3fcc00d0 a2=0 a3=7fff3fcc00bc items=0 ppid=2123 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.422581 env[1136]: time="2023-10-02T19:21:18.418029974Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:21:18.422581 env[1136]: time="2023-10-02T19:21:18.418091775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:21:18.422581 env[1136]: time="2023-10-02T19:21:18.418112077Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:21:18.422581 env[1136]: time="2023-10-02T19:21:18.418390730Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146 pid=2507 runtime=io.containerd.runc.v2 Oct 2 19:21:18.440945 env[1136]: time="2023-10-02T19:21:18.440867119Z" level=info msg="CreateContainer within sandbox \"35c4cd76b1651b630d0724daaa33f6d7775192148cd9240725f280f4095efdc7\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"d867bbbcb1ff53327be3be516fd02fdd72c68540dc3276f95af18cac69511887\"" Oct 2 19:21:18.442627 env[1136]: time="2023-10-02T19:21:18.442534268Z" level=info msg="StartContainer for \"d867bbbcb1ff53327be3be516fd02fdd72c68540dc3276f95af18cac69511887\"" Oct 2 19:21:18.451811 kernel: audit: type=1300 audit(1696274478.384:776): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff3fcc00d0 a2=0 a3=7fff3fcc00bc items=0 ppid=2123 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.384000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:18.472856 kernel: audit: type=1327 audit(1696274478.384:776): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:21:18.477877 systemd[1]: Started cri-containerd-d867bbbcb1ff53327be3be516fd02fdd72c68540dc3276f95af18cac69511887.scope. Oct 2 19:21:18.505187 systemd[1]: Started cri-containerd-1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146.scope. Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.552479 kernel: audit: type=1400 audit(1696274478.509:777): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.552637 kernel: audit: type=1400 audit(1696274478.509:778): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.574811 kernel: audit: type=1400 audit(1696274478.509:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.596765 kernel: audit: type=1400 audit(1696274478.509:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.641275 kernel: audit: type=1400 audit(1696274478.509:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.645831 kernel: audit: type=1400 audit(1696274478.509:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.645922 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.551000 audit: BPF prog-id=98 op=LOAD Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2370 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363762626263623166663533333237626533626535313666643032 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2370 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363762626263623166663533333237626533626535313666643032 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.553000 audit: BPF prog-id=99 op=LOAD Oct 2 19:21:18.553000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000296600 items=0 ppid=2370 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363762626263623166663533333237626533626535313666643032 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.616000 audit: BPF prog-id=100 op=LOAD Oct 2 19:21:18.616000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000296648 items=0 ppid=2370 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363762626263623166663533333237626533626535313666643032 Oct 2 19:21:18.637000 audit: BPF prog-id=100 op=UNLOAD Oct 2 19:21:18.637000 audit: BPF prog-id=99 op=UNLOAD Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.637000 audit: BPF prog-id=101 op=LOAD Oct 2 19:21:18.637000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000296a58 items=0 ppid=2370 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438363762626263623166663533333237626533626535313666643032 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2507 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138333366393836643831366230363963356537633238306662346565 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2507 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138333366393836643831366230363963356537633238306662346565 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.648000 audit: BPF prog-id=103 op=LOAD Oct 2 19:21:18.648000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f9f0 items=0 ppid=2507 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138333366393836643831366230363963356537633238306662346565 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit: BPF prog-id=104 op=LOAD Oct 2 19:21:18.649000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028fa38 items=0 ppid=2507 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138333366393836643831366230363963356537633238306662346565 Oct 2 19:21:18.649000 audit: BPF prog-id=104 op=UNLOAD Oct 2 19:21:18.649000 audit: BPF prog-id=103 op=UNLOAD Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:21:18.649000 audit: BPF prog-id=105 op=LOAD Oct 2 19:21:18.649000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028fe48 items=0 ppid=2507 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:18.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138333366393836643831366230363963356537633238306662346565 Oct 2 19:21:18.680529 env[1136]: time="2023-10-02T19:21:18.680461380Z" level=info msg="StartContainer for \"d867bbbcb1ff53327be3be516fd02fdd72c68540dc3276f95af18cac69511887\" returns successfully" Oct 2 19:21:18.687181 env[1136]: time="2023-10-02T19:21:18.687111989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tmtth,Uid:b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10,Namespace:calico-system,Attempt:1,} returns sandbox id \"1833f986d816b069c5e7c280fb4ee54791d3c1351d46d218b864fdf3624c7146\"" Oct 2 19:21:18.690477 env[1136]: time="2023-10-02T19:21:18.690434266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:21:18.710124 kubelet[1524]: E1002 19:21:18.710066 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:18.816414 env[1136]: time="2023-10-02T19:21:18.816342471Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:18.820975 env[1136]: time="2023-10-02T19:21:18.820870879Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:18.821938 kubelet[1524]: E1002 19:21:18.821319 1524 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:18.821938 kubelet[1524]: E1002 19:21:18.821380 1524 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:18.822219 kubelet[1524]: E1002 19:21:18.821538 1524 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-24vlh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-tmtth_calico-system(b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:18.823493 env[1136]: time="2023-10-02T19:21:18.823449096Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:21:18.949409 env[1136]: time="2023-10-02T19:21:18.949125845Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:18.951304 env[1136]: time="2023-10-02T19:21:18.951225172Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:18.952144 kubelet[1524]: E1002 19:21:18.952117 1524 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:18.952437 kubelet[1524]: E1002 19:21:18.952420 1524 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:18.952852 kubelet[1524]: E1002 19:21:18.952827 1524 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-24vlh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-tmtth_calico-system(b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:18.953236 kubelet[1524]: E1002 19:21:18.953200 1524 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-tmtth" podUID="b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10" Oct 2 19:21:18.982679 kubelet[1524]: E1002 19:21:18.982640 1524 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-tmtth" podUID="b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10" Oct 2 19:21:19.710487 kubelet[1524]: E1002 19:21:19.710418 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:19.987439 kubelet[1524]: E1002 19:21:19.987313 1524 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-tmtth" podUID="b8d675b2-5b4a-4ae4-8ab5-298b2ca70e10" Oct 2 19:21:19.999796 kubelet[1524]: I1002 19:21:19.999736 1524 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-xrnth" podStartSLOduration=2.807631629 podCreationTimestamp="2023-10-02 19:21:13 +0000 UTC" firstStartedPulling="2023-10-02 19:21:14.185179813 +0000 UTC m=+26.260978068" lastFinishedPulling="2023-10-02 19:21:18.37721444 +0000 UTC m=+30.453012686" observedRunningTime="2023-10-02 19:21:19.007277398 +0000 UTC m=+31.083075672" watchObservedRunningTime="2023-10-02 19:21:19.999666247 +0000 UTC m=+32.075464517" Oct 2 19:21:20.267583 systemd-networkd[1018]: cali1d9b5ad9167: Gained IPv6LL Oct 2 19:21:20.710846 kubelet[1524]: E1002 19:21:20.710758 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:21.711401 kubelet[1524]: E1002 19:21:21.711335 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:22.712029 kubelet[1524]: E1002 19:21:22.711960 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:23.712593 kubelet[1524]: E1002 19:21:23.712523 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:24.713761 kubelet[1524]: E1002 19:21:24.713691 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:25.714859 kubelet[1524]: E1002 19:21:25.714791 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:21:26.715845 kubelet[1524]: E1002 19:21:26.715793 1524 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"