Oct 2 19:17:54.942684 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:17:54.942705 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:17:54.942716 kernel: BIOS-provided physical RAM map: Oct 2 19:17:54.942723 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:17:54.942730 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:17:54.942736 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:17:54.942744 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Oct 2 19:17:54.942751 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Oct 2 19:17:54.942759 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 2 19:17:54.942766 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:17:54.942772 kernel: NX (Execute Disable) protection: active Oct 2 19:17:54.942779 kernel: SMBIOS 2.8 present. Oct 2 19:17:54.942785 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 2 19:17:54.942792 kernel: Hypervisor detected: KVM Oct 2 19:17:54.942800 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:17:54.942808 kernel: kvm-clock: cpu 0, msr 7df8a001, primary cpu clock Oct 2 19:17:54.942815 kernel: kvm-clock: using sched offset of 5455699441 cycles Oct 2 19:17:54.942823 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:17:54.942831 kernel: tsc: Detected 1996.249 MHz processor Oct 2 19:17:54.942838 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:17:54.942846 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:17:54.942853 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Oct 2 19:17:54.942860 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:17:54.942869 kernel: ACPI: Early table checksum verification disabled Oct 2 19:17:54.942877 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Oct 2 19:17:54.942884 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:17:54.942891 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:17:54.942899 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:17:54.942906 kernel: ACPI: FACS 0x000000007FFE0000 000040 Oct 2 19:17:54.942913 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:17:54.942920 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:17:54.942927 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Oct 2 19:17:54.942936 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Oct 2 19:17:54.942944 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Oct 2 19:17:54.942951 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Oct 2 19:17:54.942958 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Oct 2 19:17:54.942965 kernel: No NUMA configuration found Oct 2 19:17:54.942972 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Oct 2 19:17:54.942979 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Oct 2 19:17:54.942987 kernel: Zone ranges: Oct 2 19:17:54.942998 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:17:54.943005 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Oct 2 19:17:54.943013 kernel: Normal empty Oct 2 19:17:54.943020 kernel: Movable zone start for each node Oct 2 19:17:54.943028 kernel: Early memory node ranges Oct 2 19:17:54.943035 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:17:54.943044 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Oct 2 19:17:54.943052 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Oct 2 19:17:54.943059 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:17:54.943067 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:17:54.943074 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Oct 2 19:17:54.943082 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 2 19:17:54.943089 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:17:54.943097 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:17:54.943104 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:17:54.943114 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:17:54.943122 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:17:54.943129 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:17:54.943137 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:17:54.943144 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:17:54.943152 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:17:54.943159 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Oct 2 19:17:54.943167 kernel: Booting paravirtualized kernel on KVM Oct 2 19:17:54.943174 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:17:54.943183 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:17:54.943191 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:17:54.943199 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:17:54.945232 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:17:54.945245 kernel: kvm-guest: stealtime: cpu 0, msr 7fc1c0c0 Oct 2 19:17:54.945255 kernel: kvm-guest: PV spinlocks disabled, no host support Oct 2 19:17:54.945263 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Oct 2 19:17:54.945271 kernel: Policy zone: DMA32 Oct 2 19:17:54.945281 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:17:54.945293 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:17:54.945301 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:17:54.945309 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:17:54.945318 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:17:54.945326 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121020K reserved, 0K cma-reserved) Oct 2 19:17:54.945335 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:17:54.945343 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:17:54.945351 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:17:54.945361 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:17:54.945369 kernel: rcu: RCU event tracing is enabled. Oct 2 19:17:54.945378 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:17:54.945386 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:17:54.945395 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:17:54.945403 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:17:54.945411 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:17:54.945419 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:17:54.945427 kernel: Console: colour VGA+ 80x25 Oct 2 19:17:54.945437 kernel: printk: console [tty0] enabled Oct 2 19:17:54.945445 kernel: printk: console [ttyS0] enabled Oct 2 19:17:54.945453 kernel: ACPI: Core revision 20210730 Oct 2 19:17:54.945461 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:17:54.945469 kernel: x2apic enabled Oct 2 19:17:54.945478 kernel: Switched APIC routing to physical x2apic. Oct 2 19:17:54.945486 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:17:54.945494 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 2 19:17:54.945502 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Oct 2 19:17:54.945512 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 2 19:17:54.945520 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 2 19:17:54.945529 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:17:54.945537 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:17:54.945545 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:17:54.945553 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:17:54.945561 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:17:54.945569 kernel: x86/fpu: x87 FPU will use FXSAVE Oct 2 19:17:54.945577 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:17:54.945587 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:17:54.945595 kernel: LSM: Security Framework initializing Oct 2 19:17:54.945603 kernel: SELinux: Initializing. Oct 2 19:17:54.945611 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:17:54.945619 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:17:54.945627 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Oct 2 19:17:54.945636 kernel: Performance Events: AMD PMU driver. Oct 2 19:17:54.945644 kernel: ... version: 0 Oct 2 19:17:54.945652 kernel: ... bit width: 48 Oct 2 19:17:54.945662 kernel: ... generic registers: 4 Oct 2 19:17:54.945675 kernel: ... value mask: 0000ffffffffffff Oct 2 19:17:54.945684 kernel: ... max period: 00007fffffffffff Oct 2 19:17:54.945695 kernel: ... fixed-purpose events: 0 Oct 2 19:17:54.945703 kernel: ... event mask: 000000000000000f Oct 2 19:17:54.945712 kernel: signal: max sigframe size: 1440 Oct 2 19:17:54.945720 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:17:54.945728 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:17:54.945737 kernel: x86: Booting SMP configuration: Oct 2 19:17:54.945747 kernel: .... node #0, CPUs: #1 Oct 2 19:17:54.945755 kernel: kvm-clock: cpu 1, msr 7df8a041, secondary cpu clock Oct 2 19:17:54.945763 kernel: kvm-guest: stealtime: cpu 1, msr 7fd1c0c0 Oct 2 19:17:54.945772 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:17:54.945780 kernel: smpboot: Max logical packages: 2 Oct 2 19:17:54.945789 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Oct 2 19:17:54.945797 kernel: devtmpfs: initialized Oct 2 19:17:54.945805 kernel: x86/mm: Memory block size: 128MB Oct 2 19:17:54.945814 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:17:54.945824 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:17:54.945833 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:17:54.945841 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:17:54.945850 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:17:54.945858 kernel: audit: type=2000 audit(1696274274.105:1): state=initialized audit_enabled=0 res=1 Oct 2 19:17:54.945867 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:17:54.945875 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:17:54.945883 kernel: cpuidle: using governor menu Oct 2 19:17:54.945893 kernel: ACPI: bus type PCI registered Oct 2 19:17:54.945902 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:17:54.945910 kernel: dca service started, version 1.12.1 Oct 2 19:17:54.945919 kernel: PCI: Using configuration type 1 for base access Oct 2 19:17:54.945927 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:17:54.945936 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:17:54.945945 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:17:54.945953 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:17:54.945961 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:17:54.945970 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:17:54.945980 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:17:54.945988 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:17:54.945997 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:17:54.946005 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:17:54.946014 kernel: ACPI: Interpreter enabled Oct 2 19:17:54.946022 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:17:54.946030 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:17:54.946039 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:17:54.946048 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 2 19:17:54.946058 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:17:54.946191 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:17:54.951480 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:17:54.951499 kernel: acpiphp: Slot [3] registered Oct 2 19:17:54.951510 kernel: acpiphp: Slot [4] registered Oct 2 19:17:54.951520 kernel: acpiphp: Slot [5] registered Oct 2 19:17:54.951529 kernel: acpiphp: Slot [6] registered Oct 2 19:17:54.951543 kernel: acpiphp: Slot [7] registered Oct 2 19:17:54.951553 kernel: acpiphp: Slot [8] registered Oct 2 19:17:54.951562 kernel: acpiphp: Slot [9] registered Oct 2 19:17:54.951572 kernel: acpiphp: Slot [10] registered Oct 2 19:17:54.951581 kernel: acpiphp: Slot [11] registered Oct 2 19:17:54.951591 kernel: acpiphp: Slot [12] registered Oct 2 19:17:54.951600 kernel: acpiphp: Slot [13] registered Oct 2 19:17:54.951609 kernel: acpiphp: Slot [14] registered Oct 2 19:17:54.951619 kernel: acpiphp: Slot [15] registered Oct 2 19:17:54.951630 kernel: acpiphp: Slot [16] registered Oct 2 19:17:54.951639 kernel: acpiphp: Slot [17] registered Oct 2 19:17:54.951649 kernel: acpiphp: Slot [18] registered Oct 2 19:17:54.951658 kernel: acpiphp: Slot [19] registered Oct 2 19:17:54.951667 kernel: acpiphp: Slot [20] registered Oct 2 19:17:54.951677 kernel: acpiphp: Slot [21] registered Oct 2 19:17:54.951686 kernel: acpiphp: Slot [22] registered Oct 2 19:17:54.951695 kernel: acpiphp: Slot [23] registered Oct 2 19:17:54.951704 kernel: acpiphp: Slot [24] registered Oct 2 19:17:54.951714 kernel: acpiphp: Slot [25] registered Oct 2 19:17:54.951726 kernel: acpiphp: Slot [26] registered Oct 2 19:17:54.951735 kernel: acpiphp: Slot [27] registered Oct 2 19:17:54.951744 kernel: acpiphp: Slot [28] registered Oct 2 19:17:54.951754 kernel: acpiphp: Slot [29] registered Oct 2 19:17:54.951763 kernel: acpiphp: Slot [30] registered Oct 2 19:17:54.951772 kernel: acpiphp: Slot [31] registered Oct 2 19:17:54.951782 kernel: PCI host bridge to bus 0000:00 Oct 2 19:17:54.951911 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:17:54.952003 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:17:54.952095 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:17:54.952192 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:17:54.952316 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Oct 2 19:17:54.952407 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:17:54.952522 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:17:54.952626 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:17:54.952734 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 2 19:17:54.952827 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Oct 2 19:17:54.952952 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:17:54.953048 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:17:54.953138 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:17:54.953249 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:17:54.953348 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:17:54.953446 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 2 19:17:54.953537 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 2 19:17:54.953646 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Oct 2 19:17:54.953732 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Oct 2 19:17:54.953818 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Oct 2 19:17:54.953902 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Oct 2 19:17:54.953991 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Oct 2 19:17:54.954077 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:17:54.954177 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:17:54.954284 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Oct 2 19:17:54.954370 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Oct 2 19:17:54.954456 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Oct 2 19:17:54.954547 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Oct 2 19:17:54.954644 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 2 19:17:54.954731 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 2 19:17:54.954815 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Oct 2 19:17:54.954901 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 2 19:17:54.954992 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Oct 2 19:17:54.955077 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Oct 2 19:17:54.955161 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 2 19:17:54.955277 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:17:54.955363 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Oct 2 19:17:54.955446 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Oct 2 19:17:54.955458 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:17:54.955466 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:17:54.955474 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:17:54.955482 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:17:54.955490 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:17:54.955501 kernel: iommu: Default domain type: Translated Oct 2 19:17:54.955509 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:17:54.955601 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 2 19:17:54.955688 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:17:54.955773 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 2 19:17:54.955784 kernel: vgaarb: loaded Oct 2 19:17:54.955793 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:17:54.955801 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:17:54.955809 kernel: PTP clock support registered Oct 2 19:17:54.955819 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:17:54.955841 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:17:54.955850 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:17:54.955859 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Oct 2 19:17:54.955867 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:17:54.955876 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:17:54.955885 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:17:54.955894 kernel: pnp: PnP ACPI init Oct 2 19:17:54.955991 kernel: pnp 00:03: [dma 2] Oct 2 19:17:54.956008 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:17:54.956018 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:17:54.956027 kernel: NET: Registered PF_INET protocol family Oct 2 19:17:54.956036 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:17:54.956045 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:17:54.956054 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:17:54.956063 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:17:54.956072 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:17:54.956083 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:17:54.956092 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:17:54.956100 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:17:54.956109 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:17:54.956118 kernel: NET: Registered PF_XDP protocol family Oct 2 19:17:54.956200 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:17:54.962006 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:17:54.962087 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:17:54.962171 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:17:54.962269 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Oct 2 19:17:54.962366 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 2 19:17:54.962460 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:17:54.962547 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:17:54.962560 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:17:54.962569 kernel: Initialise system trusted keyrings Oct 2 19:17:54.962578 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:17:54.962590 kernel: Key type asymmetric registered Oct 2 19:17:54.962599 kernel: Asymmetric key parser 'x509' registered Oct 2 19:17:54.962607 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:17:54.962616 kernel: io scheduler mq-deadline registered Oct 2 19:17:54.962624 kernel: io scheduler kyber registered Oct 2 19:17:54.962632 kernel: io scheduler bfq registered Oct 2 19:17:54.962641 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:17:54.962650 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 2 19:17:54.962658 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:17:54.962668 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:17:54.962677 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:17:54.962685 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:17:54.962693 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:17:54.962702 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:17:54.962710 kernel: random: crng init done Oct 2 19:17:54.962719 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:17:54.962727 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:17:54.962736 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:17:54.962839 kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 2 19:17:54.962939 kernel: rtc_cmos 00:04: registered as rtc0 Oct 2 19:17:54.963021 kernel: rtc_cmos 00:04: setting system clock to 2023-10-02T19:17:54 UTC (1696274274) Oct 2 19:17:54.963100 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 2 19:17:54.963112 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:17:54.963121 kernel: Segment Routing with IPv6 Oct 2 19:17:54.963130 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:17:54.963138 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:17:54.963150 kernel: Key type dns_resolver registered Oct 2 19:17:54.963158 kernel: IPI shorthand broadcast: enabled Oct 2 19:17:54.963166 kernel: sched_clock: Marking stable (727406202, 122012707)->(882171412, -32752503) Oct 2 19:17:54.963175 kernel: registered taskstats version 1 Oct 2 19:17:54.963183 kernel: Loading compiled-in X.509 certificates Oct 2 19:17:54.963191 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:17:54.963200 kernel: Key type .fscrypt registered Oct 2 19:17:54.963229 kernel: Key type fscrypt-provisioning registered Oct 2 19:17:54.963237 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:17:54.963248 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:17:54.963256 kernel: ima: No architecture policies found Oct 2 19:17:54.963264 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:17:54.963272 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:17:54.963281 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:17:54.963289 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:17:54.963297 kernel: Run /init as init process Oct 2 19:17:54.963305 kernel: with arguments: Oct 2 19:17:54.963314 kernel: /init Oct 2 19:17:54.963324 kernel: with environment: Oct 2 19:17:54.963332 kernel: HOME=/ Oct 2 19:17:54.963340 kernel: TERM=linux Oct 2 19:17:54.963348 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:17:54.963360 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:17:54.963371 systemd[1]: Detected virtualization kvm. Oct 2 19:17:54.963381 systemd[1]: Detected architecture x86-64. Oct 2 19:17:54.963392 systemd[1]: Running in initrd. Oct 2 19:17:54.963401 systemd[1]: No hostname configured, using default hostname. Oct 2 19:17:54.963410 systemd[1]: Hostname set to . Oct 2 19:17:54.963419 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:17:54.963429 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:17:54.963438 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:17:54.963447 systemd[1]: Reached target cryptsetup.target. Oct 2 19:17:54.963455 systemd[1]: Reached target paths.target. Oct 2 19:17:54.963464 systemd[1]: Reached target slices.target. Oct 2 19:17:54.963474 systemd[1]: Reached target swap.target. Oct 2 19:17:54.963483 systemd[1]: Reached target timers.target. Oct 2 19:17:54.963492 systemd[1]: Listening on iscsid.socket. Oct 2 19:17:54.963502 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:17:54.963511 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:17:54.963521 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:17:54.963529 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:17:54.963540 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:17:54.963548 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:17:54.963558 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:17:54.963567 systemd[1]: Reached target sockets.target. Oct 2 19:17:54.963576 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:17:54.963595 systemd[1]: Finished network-cleanup.service. Oct 2 19:17:54.963605 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:17:54.963616 systemd[1]: Starting systemd-journald.service... Oct 2 19:17:54.963625 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:17:54.963634 systemd[1]: Starting systemd-resolved.service... Oct 2 19:17:54.963643 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:17:54.963653 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:17:54.963662 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:17:54.963677 systemd-journald[185]: Journal started Oct 2 19:17:54.963733 systemd-journald[185]: Runtime Journal (/run/log/journal/5ff2d4941a454cdda9f0562a4c3bf9d7) is 4.9M, max 39.5M, 34.5M free. Oct 2 19:17:54.958027 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:17:54.992686 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:17:54.992716 kernel: Bridge firewalling registered Oct 2 19:17:54.992728 systemd[1]: Started systemd-resolved.service. Oct 2 19:17:54.958038 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:17:54.958074 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:17:55.009287 kernel: audit: type=1130 audit(1696274274.990:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.009310 kernel: audit: type=1130 audit(1696274274.999:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.009322 systemd[1]: Started systemd-journald.service. Oct 2 19:17:55.009334 kernel: audit: type=1130 audit(1696274275.004:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:54.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:54.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:54.960576 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:17:55.014809 kernel: audit: type=1130 audit(1696274275.007:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.014834 kernel: SCSI subsystem initialized Oct 2 19:17:54.960942 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:17:54.989681 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:17:55.007708 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:17:55.008229 systemd[1]: Reached target nss-lookup.target. Oct 2 19:17:55.013692 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:17:55.017695 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:17:55.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.026474 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:17:55.031240 kernel: audit: type=1130 audit(1696274275.026:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.035515 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:17:55.038915 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:17:55.038936 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:17:55.038957 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:17:55.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.040163 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:17:55.043274 kernel: audit: type=1130 audit(1696274275.038:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.043584 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:17:55.045530 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:17:55.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.047322 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:17:55.051603 kernel: audit: type=1130 audit(1696274275.046:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.055157 dracut-cmdline[203]: dracut-dracut-053 Oct 2 19:17:55.057786 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:17:55.062389 kernel: audit: type=1130 audit(1696274275.058:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.062449 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:17:55.135259 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:17:55.149229 kernel: iscsi: registered transport (tcp) Oct 2 19:17:55.174302 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:17:55.174354 kernel: QLogic iSCSI HBA Driver Oct 2 19:17:55.228343 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:17:55.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.234380 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:17:55.240757 kernel: audit: type=1130 audit(1696274275.229:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.307355 kernel: raid6: sse2x4 gen() 12329 MB/s Oct 2 19:17:55.324288 kernel: raid6: sse2x4 xor() 6889 MB/s Oct 2 19:17:55.341300 kernel: raid6: sse2x2 gen() 14118 MB/s Oct 2 19:17:55.358321 kernel: raid6: sse2x2 xor() 8523 MB/s Oct 2 19:17:55.375316 kernel: raid6: sse2x1 gen() 11135 MB/s Oct 2 19:17:55.393127 kernel: raid6: sse2x1 xor() 6778 MB/s Oct 2 19:17:55.393198 kernel: raid6: using algorithm sse2x2 gen() 14118 MB/s Oct 2 19:17:55.393266 kernel: raid6: .... xor() 8523 MB/s, rmw enabled Oct 2 19:17:55.394118 kernel: raid6: using ssse3x2 recovery algorithm Oct 2 19:17:55.409301 kernel: xor: measuring software checksum speed Oct 2 19:17:55.411964 kernel: prefetch64-sse : 17536 MB/sec Oct 2 19:17:55.412022 kernel: generic_sse : 16397 MB/sec Oct 2 19:17:55.412049 kernel: xor: using function: prefetch64-sse (17536 MB/sec) Oct 2 19:17:55.529282 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:17:55.545765 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:17:55.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.546000 audit: BPF prog-id=7 op=LOAD Oct 2 19:17:55.546000 audit: BPF prog-id=8 op=LOAD Oct 2 19:17:55.547295 systemd[1]: Starting systemd-udevd.service... Oct 2 19:17:55.578426 systemd-udevd[385]: Using default interface naming scheme 'v252'. Oct 2 19:17:55.585177 systemd[1]: Started systemd-udevd.service. Oct 2 19:17:55.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.586584 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:17:55.599542 dracut-pre-trigger[386]: rd.md=0: removing MD RAID activation Oct 2 19:17:55.646649 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:17:55.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.647970 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:17:55.691507 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:17:55.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:55.773458 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Oct 2 19:17:55.789297 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:17:55.789348 kernel: GPT:17805311 != 41943039 Oct 2 19:17:55.789360 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:17:55.790380 kernel: GPT:17805311 != 41943039 Oct 2 19:17:55.791998 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:17:55.792037 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:17:55.802224 kernel: libata version 3.00 loaded. Oct 2 19:17:55.815263 kernel: ata_piix 0000:00:01.1: version 2.13 Oct 2 19:17:55.821234 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) Oct 2 19:17:55.823971 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:17:55.863238 kernel: scsi host0: ata_piix Oct 2 19:17:55.863427 kernel: scsi host1: ata_piix Oct 2 19:17:55.863529 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Oct 2 19:17:55.863542 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Oct 2 19:17:55.869376 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:17:55.869880 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:17:55.877121 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:17:55.881045 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:17:55.882486 systemd[1]: Starting disk-uuid.service... Oct 2 19:17:55.893694 disk-uuid[457]: Primary Header is updated. Oct 2 19:17:55.893694 disk-uuid[457]: Secondary Entries is updated. Oct 2 19:17:55.893694 disk-uuid[457]: Secondary Header is updated. Oct 2 19:17:55.903236 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:17:55.909232 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:17:56.919249 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:17:56.922013 disk-uuid[458]: The operation has completed successfully. Oct 2 19:17:57.002819 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:17:57.004561 systemd[1]: Finished disk-uuid.service. Oct 2 19:17:57.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.025647 systemd[1]: Starting verity-setup.service... Oct 2 19:17:57.060286 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:17:57.180331 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:17:57.184117 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:17:57.188849 systemd[1]: Finished verity-setup.service. Oct 2 19:17:57.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.329257 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:17:57.329889 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:17:57.330541 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:17:57.331245 systemd[1]: Starting ignition-setup.service... Oct 2 19:17:57.332545 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:17:57.348558 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:17:57.348625 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:17:57.348654 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:17:57.373154 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:17:57.387257 systemd[1]: Finished ignition-setup.service. Oct 2 19:17:57.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.388788 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:17:57.502431 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:17:57.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.503000 audit: BPF prog-id=9 op=LOAD Oct 2 19:17:57.504660 systemd[1]: Starting systemd-networkd.service... Oct 2 19:17:57.539008 systemd-networkd[635]: lo: Link UP Oct 2 19:17:57.539992 systemd-networkd[635]: lo: Gained carrier Oct 2 19:17:57.541216 systemd-networkd[635]: Enumeration completed Oct 2 19:17:57.541831 systemd[1]: Started systemd-networkd.service. Oct 2 19:17:57.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.542412 systemd[1]: Reached target network.target. Oct 2 19:17:57.543032 systemd-networkd[635]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:17:57.544081 systemd[1]: Starting iscsiuio.service... Oct 2 19:17:57.545555 systemd-networkd[635]: eth0: Link UP Oct 2 19:17:57.545559 systemd-networkd[635]: eth0: Gained carrier Oct 2 19:17:57.553261 systemd[1]: Started iscsiuio.service. Oct 2 19:17:57.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.554784 systemd[1]: Starting iscsid.service... Oct 2 19:17:57.559053 iscsid[640]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:17:57.559053 iscsid[640]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:17:57.559053 iscsid[640]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:17:57.559053 iscsid[640]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:17:57.559053 iscsid[640]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:17:57.559053 iscsid[640]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:17:57.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.560434 systemd[1]: Started iscsid.service. Oct 2 19:17:57.562604 systemd-networkd[635]: eth0: DHCPv4 address 172.24.4.211/24, gateway 172.24.4.1 acquired from 172.24.4.1 Oct 2 19:17:57.566225 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:17:57.579084 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:17:57.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.580770 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:17:57.582088 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:17:57.583388 systemd[1]: Reached target remote-fs.target. Oct 2 19:17:57.585249 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:17:57.597012 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:17:57.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.690544 ignition[548]: Ignition 2.14.0 Oct 2 19:17:57.692411 ignition[548]: Stage: fetch-offline Oct 2 19:17:57.692671 ignition[548]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:57.692730 ignition[548]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:17:57.694959 ignition[548]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:17:57.695193 ignition[548]: parsed url from cmdline: "" Oct 2 19:17:57.695202 ignition[548]: no config URL provided Oct 2 19:17:57.698282 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:17:57.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:57.695252 ignition[548]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:17:57.695274 ignition[548]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:17:57.702303 systemd[1]: Starting ignition-fetch.service... Oct 2 19:17:57.695290 ignition[548]: failed to fetch config: resource requires networking Oct 2 19:17:57.695899 ignition[548]: Ignition finished successfully Oct 2 19:17:57.723157 ignition[654]: Ignition 2.14.0 Oct 2 19:17:57.723185 ignition[654]: Stage: fetch Oct 2 19:17:57.723489 ignition[654]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:57.723535 ignition[654]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:17:57.725790 ignition[654]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:17:57.726020 ignition[654]: parsed url from cmdline: "" Oct 2 19:17:57.726030 ignition[654]: no config URL provided Oct 2 19:17:57.726044 ignition[654]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:17:57.726064 ignition[654]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:17:57.729062 ignition[654]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 2 19:17:57.729122 ignition[654]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 2 19:17:57.730732 ignition[654]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 2 19:17:58.062178 ignition[654]: GET result: OK Oct 2 19:17:58.062397 ignition[654]: parsing config with SHA512: 1ccd6abd7406079dc3a4a2313eb73d76c524fe47e86e289940691a510363171109393871a69698302430312256d5274037622465b27dae16f7e4fd1b2f256b59 Oct 2 19:17:58.135035 unknown[654]: fetched base config from "system" Oct 2 19:17:58.135069 unknown[654]: fetched base config from "system" Oct 2 19:17:58.135085 unknown[654]: fetched user config from "openstack" Oct 2 19:17:58.137162 ignition[654]: fetch: fetch complete Oct 2 19:17:58.137184 ignition[654]: fetch: fetch passed Oct 2 19:17:58.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.140514 systemd[1]: Finished ignition-fetch.service. Oct 2 19:17:58.137379 ignition[654]: Ignition finished successfully Oct 2 19:17:58.144039 systemd[1]: Starting ignition-kargs.service... Oct 2 19:17:58.168875 ignition[660]: Ignition 2.14.0 Oct 2 19:17:58.170846 ignition[660]: Stage: kargs Oct 2 19:17:58.172556 ignition[660]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:58.174673 ignition[660]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:17:58.177451 ignition[660]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:17:58.190905 ignition[660]: kargs: kargs passed Oct 2 19:17:58.191031 ignition[660]: Ignition finished successfully Oct 2 19:17:58.193005 systemd[1]: Finished ignition-kargs.service. Oct 2 19:17:58.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.197482 systemd[1]: Starting ignition-disks.service... Oct 2 19:17:58.213860 ignition[665]: Ignition 2.14.0 Oct 2 19:17:58.213874 ignition[665]: Stage: disks Oct 2 19:17:58.213999 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:58.214022 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:17:58.214909 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:17:58.215926 ignition[665]: disks: disks passed Oct 2 19:17:58.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.218474 systemd[1]: Finished ignition-disks.service. Oct 2 19:17:58.215969 ignition[665]: Ignition finished successfully Oct 2 19:17:58.220399 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:17:58.221718 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:17:58.223180 systemd[1]: Reached target local-fs.target. Oct 2 19:17:58.224581 systemd[1]: Reached target sysinit.target. Oct 2 19:17:58.225855 systemd[1]: Reached target basic.target. Oct 2 19:17:58.228857 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:17:58.252728 systemd-fsck[673]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:17:58.262064 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:17:58.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.263633 systemd[1]: Mounting sysroot.mount... Oct 2 19:17:58.283277 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:17:58.283566 systemd[1]: Mounted sysroot.mount. Oct 2 19:17:58.284127 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:17:58.287337 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:17:58.288190 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:17:58.288884 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 2 19:17:58.291142 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:17:58.291172 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:17:58.299098 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:17:58.306653 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:17:58.308647 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:17:58.328955 initrd-setup-root[685]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:17:58.337235 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (680) Oct 2 19:17:58.345562 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:17:58.345600 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:17:58.345612 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:17:58.349396 initrd-setup-root[709]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:17:58.357729 initrd-setup-root[719]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:17:58.363481 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:17:58.368427 initrd-setup-root[727]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:17:58.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.478681 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:17:58.481061 systemd[1]: Starting ignition-mount.service... Oct 2 19:17:58.483514 systemd[1]: Starting sysroot-boot.service... Oct 2 19:17:58.494461 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:17:58.495481 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:17:58.510282 ignition[747]: INFO : Ignition 2.14.0 Oct 2 19:17:58.511030 ignition[747]: INFO : Stage: mount Oct 2 19:17:58.511807 ignition[747]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:58.512661 ignition[747]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:17:58.514796 ignition[747]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:17:58.518684 ignition[747]: INFO : mount: mount passed Oct 2 19:17:58.521294 ignition[747]: INFO : Ignition finished successfully Oct 2 19:17:58.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.525307 systemd[1]: Finished ignition-mount.service. Oct 2 19:17:58.541890 systemd[1]: Finished sysroot-boot.service. Oct 2 19:17:58.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.560617 coreos-metadata[679]: Oct 02 19:17:58.560 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 2 19:17:58.583288 coreos-metadata[679]: Oct 02 19:17:58.582 INFO Fetch successful Oct 2 19:17:58.584315 coreos-metadata[679]: Oct 02 19:17:58.583 INFO wrote hostname ci-3510-3-0-9-74d01cdc4c.novalocal to /sysroot/etc/hostname Oct 2 19:17:58.589478 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 2 19:17:58.589606 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 2 19:17:58.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:58.592294 systemd[1]: Starting ignition-files.service... Oct 2 19:17:58.603510 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:17:58.616596 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (757) Oct 2 19:17:58.620616 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:17:58.620681 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:17:58.620707 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:17:58.634394 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:17:58.656758 ignition[776]: INFO : Ignition 2.14.0 Oct 2 19:17:58.656758 ignition[776]: INFO : Stage: files Oct 2 19:17:58.659300 ignition[776]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:58.659300 ignition[776]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:17:58.659300 ignition[776]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:17:58.666567 ignition[776]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:17:58.670601 ignition[776]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:17:58.670601 ignition[776]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:17:58.680482 ignition[776]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:17:58.681536 ignition[776]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:17:58.682482 ignition[776]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:17:58.682463 unknown[776]: wrote ssh authorized keys file for user: core Oct 2 19:17:58.686170 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:17:58.686170 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:17:58.928142 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:17:59.175467 systemd-networkd[635]: eth0: Gained IPv6LL Oct 2 19:17:59.311254 ignition[776]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:17:59.313078 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:17:59.314111 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:17:59.315272 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:17:59.910399 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:18:00.615431 ignition[776]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:18:00.615431 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:18:00.641086 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:18:00.643404 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:18:00.804245 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:18:02.384468 ignition[776]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:18:02.397116 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:18:02.397116 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:18:02.397116 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:18:02.528799 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:18:05.384885 ignition[776]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:18:05.388852 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:18:05.388852 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:18:05.393583 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:18:05.393583 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:18:05.393583 ignition[776]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:18:05.393583 ignition[776]: INFO : files: op(9): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:18:05.454019 ignition[776]: INFO : files: op(9): op(a): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Oct 2 19:18:05.454019 ignition[776]: INFO : files: op(9): op(a): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Oct 2 19:18:05.454019 ignition[776]: INFO : files: op(9): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:18:05.454019 ignition[776]: INFO : files: op(b): [started] processing unit "coreos-metadata.service" Oct 2 19:18:05.454019 ignition[776]: INFO : files: op(b): op(c): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(b): op(c): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(b): [finished] processing unit "coreos-metadata.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(d): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(d): op(e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(d): op(e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(d): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(f): [started] processing unit "prepare-critools.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(f): op(10): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(f): op(10): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(f): [finished] processing unit "prepare-critools.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(12): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:18:05.469023 ignition[776]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:18:05.545879 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 2 19:18:05.545942 kernel: audit: type=1130 audit(1696274285.475:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.545974 kernel: audit: type=1130 audit(1696274285.527:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.546003 kernel: audit: type=1131 audit(1696274285.527:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.471882 systemd[1]: Finished ignition-files.service. Oct 2 19:18:05.547716 ignition[776]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:18:05.547716 ignition[776]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:18:05.547716 ignition[776]: INFO : files: files passed Oct 2 19:18:05.547716 ignition[776]: INFO : Ignition finished successfully Oct 2 19:18:05.480126 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:18:05.489104 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:18:05.490967 systemd[1]: Starting ignition-quench.service... Oct 2 19:18:05.525991 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:18:05.526250 systemd[1]: Finished ignition-quench.service. Oct 2 19:18:05.693451 initrd-setup-root-after-ignition[801]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:18:05.695103 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:18:05.709867 kernel: audit: type=1130 audit(1696274285.697:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.697815 systemd[1]: Reached target ignition-complete.target. Oct 2 19:18:05.712738 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:18:05.744848 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:18:05.745093 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:18:05.763410 kernel: audit: type=1130 audit(1696274285.747:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.763458 kernel: audit: type=1131 audit(1696274285.747:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.747498 systemd[1]: Reached target initrd-fs.target. Oct 2 19:18:05.764400 systemd[1]: Reached target initrd.target. Oct 2 19:18:05.766417 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:18:05.768031 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:18:05.793054 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:18:05.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.801305 kernel: audit: type=1130 audit(1696274285.794:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.801553 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:18:05.823330 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:18:05.825902 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:18:05.827625 systemd[1]: Stopped target timers.target. Oct 2 19:18:05.829487 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:18:05.829842 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:18:05.835276 kernel: audit: type=1131 audit(1696274285.831:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.831947 systemd[1]: Stopped target initrd.target. Oct 2 19:18:05.836610 systemd[1]: Stopped target basic.target. Oct 2 19:18:05.838084 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:18:05.839621 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:18:05.841455 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:18:05.842970 systemd[1]: Stopped target remote-fs.target. Oct 2 19:18:05.844514 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:18:05.846064 systemd[1]: Stopped target sysinit.target. Oct 2 19:18:05.847489 systemd[1]: Stopped target local-fs.target. Oct 2 19:18:05.849110 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:18:05.850626 systemd[1]: Stopped target swap.target. Oct 2 19:18:05.852037 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:18:05.852484 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:18:05.861751 kernel: audit: type=1131 audit(1696274285.853:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.854358 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:18:05.862847 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:18:05.868217 kernel: audit: type=1131 audit(1696274285.864:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.863118 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:18:05.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.864708 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:18:05.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.865004 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:18:05.869589 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:18:05.869837 systemd[1]: Stopped ignition-files.service. Oct 2 19:18:05.872669 systemd[1]: Stopping ignition-mount.service... Oct 2 19:18:05.877562 iscsid[640]: iscsid shutting down. Oct 2 19:18:05.874151 systemd[1]: Stopping iscsid.service... Oct 2 19:18:05.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.880623 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:18:05.881110 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:18:05.881345 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:18:05.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.882053 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:18:05.882274 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:18:05.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.886510 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:18:05.886604 systemd[1]: Stopped iscsid.service. Oct 2 19:18:05.889456 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:18:05.889537 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:18:05.892363 systemd[1]: Stopping iscsiuio.service... Oct 2 19:18:05.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.896957 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:18:05.897045 systemd[1]: Stopped iscsiuio.service. Oct 2 19:18:05.903882 ignition[814]: INFO : Ignition 2.14.0 Oct 2 19:18:05.903882 ignition[814]: INFO : Stage: umount Oct 2 19:18:05.905124 ignition[814]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:05.905124 ignition[814]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:18:05.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.913548 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:18:05.913548 ignition[814]: INFO : umount: umount passed Oct 2 19:18:05.913548 ignition[814]: INFO : Ignition finished successfully Oct 2 19:18:05.909613 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:18:05.909704 systemd[1]: Stopped ignition-mount.service. Oct 2 19:18:05.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.910299 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:18:05.910342 systemd[1]: Stopped ignition-disks.service. Oct 2 19:18:05.910815 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:18:05.910853 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:18:05.911341 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:18:05.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.911377 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:18:05.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.911858 systemd[1]: Stopped target network.target. Oct 2 19:18:05.912342 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:18:05.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.931000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:18:05.912385 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:18:05.912907 systemd[1]: Stopped target paths.target. Oct 2 19:18:05.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.913370 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:18:05.916364 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:18:05.917066 systemd[1]: Stopped target slices.target. Oct 2 19:18:05.917490 systemd[1]: Stopped target sockets.target. Oct 2 19:18:05.917960 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:18:05.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.917994 systemd[1]: Closed iscsid.socket. Oct 2 19:18:05.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.918428 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:18:05.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.918459 systemd[1]: Closed iscsiuio.socket. Oct 2 19:18:05.918872 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:18:05.918910 systemd[1]: Stopped ignition-setup.service. Oct 2 19:18:05.919470 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:18:05.920061 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:18:05.923063 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:18:05.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.923255 systemd-networkd[635]: eth0: DHCPv6 lease lost Oct 2 19:18:05.944000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:18:05.925159 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:18:05.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.925837 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:18:05.928394 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:18:05.928509 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:18:05.930997 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:18:05.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.931089 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:18:05.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.932114 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:18:05.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.932159 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:18:05.932976 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:18:05.933031 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:18:05.934845 systemd[1]: Stopping network-cleanup.service... Oct 2 19:18:05.936803 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:18:05.936859 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:18:05.937793 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:18:05.937842 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:18:05.938953 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:18:05.938993 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:18:05.939763 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:18:05.941878 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:18:05.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.944397 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:18:05.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.944486 systemd[1]: Stopped network-cleanup.service. Oct 2 19:18:05.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.945265 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:18:05.945391 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:18:05.947391 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:18:05.947443 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:18:05.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.948542 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:18:05.948582 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:18:05.949506 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:18:05.949554 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:18:05.950543 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:18:05.950588 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:18:05.951461 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:18:05.951497 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:18:05.953183 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:18:05.953995 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:18:05.954044 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:18:05.961583 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:18:05.961655 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:18:05.962319 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:18:05.962360 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:18:05.964452 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 19:18:05.964962 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:18:05.965058 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:18:05.966021 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:18:05.967431 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:18:05.986729 systemd[1]: Switching root. Oct 2 19:18:06.007042 systemd-journald[185]: Journal stopped Oct 2 19:18:11.524645 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Oct 2 19:18:11.524694 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:18:11.524709 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:18:11.524721 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:18:11.524733 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:18:11.524747 kernel: SELinux: policy capability open_perms=1 Oct 2 19:18:11.524759 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:18:11.524770 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:18:11.524781 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:18:11.524792 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:18:11.524803 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:18:11.524814 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:18:11.524827 systemd[1]: Successfully loaded SELinux policy in 100.124ms. Oct 2 19:18:11.524849 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.332ms. Oct 2 19:18:11.524863 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:18:11.524880 systemd[1]: Detected virtualization kvm. Oct 2 19:18:11.524891 systemd[1]: Detected architecture x86-64. Oct 2 19:18:11.524902 systemd[1]: Detected first boot. Oct 2 19:18:11.524914 systemd[1]: Hostname set to . Oct 2 19:18:11.524925 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:18:11.524939 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:18:11.524951 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:11.524963 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:11.524976 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:11.524988 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 2 19:18:11.524998 kernel: audit: type=1334 audit(1696274291.303:88): prog-id=12 op=LOAD Oct 2 19:18:11.525009 kernel: audit: type=1334 audit(1696274291.304:89): prog-id=3 op=UNLOAD Oct 2 19:18:11.525021 kernel: audit: type=1334 audit(1696274291.306:90): prog-id=13 op=LOAD Oct 2 19:18:11.525031 kernel: audit: type=1334 audit(1696274291.309:91): prog-id=14 op=LOAD Oct 2 19:18:11.525042 kernel: audit: type=1334 audit(1696274291.309:92): prog-id=4 op=UNLOAD Oct 2 19:18:11.525052 kernel: audit: type=1334 audit(1696274291.309:93): prog-id=5 op=UNLOAD Oct 2 19:18:11.525067 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:18:11.525080 kernel: audit: type=1131 audit(1696274291.310:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.525092 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:18:11.525103 kernel: audit: type=1334 audit(1696274291.333:95): prog-id=12 op=UNLOAD Oct 2 19:18:11.525116 kernel: audit: type=1130 audit(1696274291.336:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.525128 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:18:11.525140 kernel: audit: type=1131 audit(1696274291.336:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.525151 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:18:11.525162 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:18:11.525175 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:18:11.525188 systemd[1]: Created slice system-getty.slice. Oct 2 19:18:11.525216 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:18:11.525230 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:18:11.525242 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:18:11.525253 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:18:11.525264 systemd[1]: Created slice user.slice. Oct 2 19:18:11.525280 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:18:11.525291 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:18:11.525302 systemd[1]: Set up automount boot.automount. Oct 2 19:18:11.525316 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:18:11.525327 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:18:11.525339 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:18:11.525352 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:18:11.525363 systemd[1]: Reached target integritysetup.target. Oct 2 19:18:11.525375 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:18:11.525386 systemd[1]: Reached target remote-fs.target. Oct 2 19:18:11.525397 systemd[1]: Reached target slices.target. Oct 2 19:18:11.525408 systemd[1]: Reached target swap.target. Oct 2 19:18:11.525421 systemd[1]: Reached target torcx.target. Oct 2 19:18:11.525432 systemd[1]: Reached target veritysetup.target. Oct 2 19:18:11.525444 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:18:11.525455 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:18:11.525466 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:18:11.525478 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:18:11.525489 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:18:11.525500 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:18:11.526263 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:18:11.526287 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:18:11.526302 systemd[1]: Mounting media.mount... Oct 2 19:18:11.526314 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:18:11.526325 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:18:11.526337 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:18:11.526348 systemd[1]: Mounting tmp.mount... Oct 2 19:18:11.526359 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:18:11.526372 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:18:11.526384 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:18:11.526395 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:18:11.526409 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:18:11.526420 systemd[1]: Starting modprobe@drm.service... Oct 2 19:18:11.526431 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:18:11.526443 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:18:11.526454 systemd[1]: Starting modprobe@loop.service... Oct 2 19:18:11.526466 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:18:11.526478 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:18:11.526490 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:18:11.526503 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:18:11.526514 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:18:11.526526 systemd[1]: Stopped systemd-journald.service. Oct 2 19:18:11.526537 systemd[1]: Starting systemd-journald.service... Oct 2 19:18:11.526549 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:18:11.526560 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:18:11.526571 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:18:11.526583 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:18:11.526594 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:18:11.526606 systemd[1]: Stopped verity-setup.service. Oct 2 19:18:11.526621 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:18:11.526633 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:18:11.526644 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:18:11.526656 systemd[1]: Mounted media.mount. Oct 2 19:18:11.526667 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:18:11.526678 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:18:11.526692 systemd-journald[915]: Journal started Oct 2 19:18:11.526733 systemd-journald[915]: Runtime Journal (/run/log/journal/5ff2d4941a454cdda9f0562a4c3bf9d7) is 4.9M, max 39.5M, 34.5M free. Oct 2 19:18:06.342000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:18:06.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:06.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:06.425000 audit: BPF prog-id=10 op=LOAD Oct 2 19:18:06.425000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:18:06.425000 audit: BPF prog-id=11 op=LOAD Oct 2 19:18:06.425000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:18:11.303000 audit: BPF prog-id=12 op=LOAD Oct 2 19:18:11.304000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:18:11.306000 audit: BPF prog-id=13 op=LOAD Oct 2 19:18:11.309000 audit: BPF prog-id=14 op=LOAD Oct 2 19:18:11.309000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:18:11.309000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:18:11.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.333000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:18:11.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.481000 audit: BPF prog-id=15 op=LOAD Oct 2 19:18:11.481000 audit: BPF prog-id=16 op=LOAD Oct 2 19:18:11.481000 audit: BPF prog-id=17 op=LOAD Oct 2 19:18:11.481000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:18:11.481000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:18:11.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.523000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:18:11.523000 audit[915]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffbbb4f560 a2=4000 a3=7fffbbb4f5fc items=0 ppid=1 pid=915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:11.523000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:18:06.621453 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:11.301836 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:18:06.623133 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:18:11.301851 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 2 19:18:06.623191 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:18:11.310381 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:18:11.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:06.623254 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:18:11.531901 systemd[1]: Started systemd-journald.service. Oct 2 19:18:06.623267 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:18:11.530844 systemd[1]: Mounted tmp.mount. Oct 2 19:18:06.623329 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:18:11.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.531523 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:18:06.623353 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:18:11.532938 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:18:06.623691 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:18:11.533052 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:18:11.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:06.623756 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:18:06.623775 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:18:11.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.533763 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:18:06.637032 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:18:11.533875 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:18:06.637093 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:18:11.534664 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:18:06.637125 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:18:11.534778 systemd[1]: Finished modprobe@drm.service. Oct 2 19:18:06.637145 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:18:06.637167 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:18:06.637186 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:18:10.349528 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:11.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:10.349850 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:11.535584 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:18:10.349961 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:11.539749 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:18:10.350156 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:11.545100 kernel: fuse: init (API version 7.34) Oct 2 19:18:11.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.541265 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:18:10.350235 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:18:11.542228 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:18:10.350316 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2023-10-02T19:18:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:18:11.542366 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:18:11.543008 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:18:11.543716 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:18:11.544670 systemd[1]: Reached target network-pre.target. Oct 2 19:18:11.547308 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:18:11.549009 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:18:11.552542 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:18:11.557167 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:18:11.566272 kernel: loop: module loaded Oct 2 19:18:11.559152 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:18:11.559685 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:18:11.560735 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:18:11.563835 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:18:11.568843 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:18:11.569279 systemd[1]: Finished modprobe@loop.service. Oct 2 19:18:11.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.570564 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:18:11.572460 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:18:11.573099 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:18:11.574418 systemd-journald[915]: Time spent on flushing to /var/log/journal/5ff2d4941a454cdda9f0562a4c3bf9d7 is 18.857ms for 1106 entries. Oct 2 19:18:11.574418 systemd-journald[915]: System Journal (/var/log/journal/5ff2d4941a454cdda9f0562a4c3bf9d7) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:18:11.649435 systemd-journald[915]: Received client request to flush runtime journal. Oct 2 19:18:11.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.599550 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:18:11.600643 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:18:11.603070 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:18:11.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.623296 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:18:11.624984 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:18:11.635897 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:18:11.637612 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:18:11.650565 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:18:11.654028 udevadm[955]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:18:11.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.678298 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:18:11.679937 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:18:11.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:11.719224 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:18:12.276352 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:18:12.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:12.278000 audit: BPF prog-id=18 op=LOAD Oct 2 19:18:12.278000 audit: BPF prog-id=19 op=LOAD Oct 2 19:18:12.278000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:18:12.279000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:18:12.280962 systemd[1]: Starting systemd-udevd.service... Oct 2 19:18:12.325412 systemd-udevd[958]: Using default interface naming scheme 'v252'. Oct 2 19:18:12.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:12.460000 audit: BPF prog-id=20 op=LOAD Oct 2 19:18:12.457593 systemd[1]: Started systemd-udevd.service. Oct 2 19:18:12.461863 systemd[1]: Starting systemd-networkd.service... Oct 2 19:18:12.488000 audit: BPF prog-id=21 op=LOAD Oct 2 19:18:12.489000 audit: BPF prog-id=22 op=LOAD Oct 2 19:18:12.489000 audit: BPF prog-id=23 op=LOAD Oct 2 19:18:12.491748 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:18:12.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:12.547707 systemd[1]: Started systemd-userdbd.service. Oct 2 19:18:12.548488 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:18:12.612905 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:18:12.712323 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:18:12.719288 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:18:12.755000 audit[967]: AVC avc: denied { confidentiality } for pid=967 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:18:12.755000 audit[967]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560b48d78e20 a1=32194 a2=7f3e0673fbc5 a3=5 items=106 ppid=958 pid=967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:12.755000 audit: CWD cwd="/" Oct 2 19:18:12.755000 audit: PATH item=0 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=1 name=(null) inode=14447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=2 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=3 name=(null) inode=14448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=4 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=5 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=6 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=7 name=(null) inode=14450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=8 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=9 name=(null) inode=14451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=10 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=11 name=(null) inode=14452 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=12 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=13 name=(null) inode=14453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=14 name=(null) inode=14449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=15 name=(null) inode=14454 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=16 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=17 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=18 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=19 name=(null) inode=14456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=20 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=21 name=(null) inode=14457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=22 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=23 name=(null) inode=14458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=24 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=25 name=(null) inode=14459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=26 name=(null) inode=14455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=27 name=(null) inode=14460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=28 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=29 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=30 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=31 name=(null) inode=14462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=32 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=33 name=(null) inode=14463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=34 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=35 name=(null) inode=14464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=36 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=37 name=(null) inode=14465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=38 name=(null) inode=14461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=39 name=(null) inode=14466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=40 name=(null) inode=14446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=41 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=42 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=43 name=(null) inode=14468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=44 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=45 name=(null) inode=14469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=46 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=47 name=(null) inode=14470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=48 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=49 name=(null) inode=14471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=50 name=(null) inode=14467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=51 name=(null) inode=14472 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=52 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=53 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=54 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=55 name=(null) inode=14474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=56 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=57 name=(null) inode=14475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=58 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=59 name=(null) inode=14476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=60 name=(null) inode=14476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=61 name=(null) inode=14477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=62 name=(null) inode=14476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=63 name=(null) inode=14478 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=64 name=(null) inode=14476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=65 name=(null) inode=14479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=66 name=(null) inode=14476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=67 name=(null) inode=14480 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=68 name=(null) inode=14476 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=69 name=(null) inode=14481 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=70 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=71 name=(null) inode=14482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=72 name=(null) inode=14482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=73 name=(null) inode=14483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=74 name=(null) inode=14482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=75 name=(null) inode=14484 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=76 name=(null) inode=14482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=77 name=(null) inode=14485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=78 name=(null) inode=14482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=79 name=(null) inode=14486 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=80 name=(null) inode=14482 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=81 name=(null) inode=14487 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=82 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=83 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=84 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=85 name=(null) inode=14489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=86 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=87 name=(null) inode=14490 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=88 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=89 name=(null) inode=14491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=90 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=91 name=(null) inode=14492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=92 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=93 name=(null) inode=14493 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=94 name=(null) inode=14473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=95 name=(null) inode=14494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=96 name=(null) inode=14494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=97 name=(null) inode=14495 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=98 name=(null) inode=14494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=99 name=(null) inode=14496 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=100 name=(null) inode=14494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=101 name=(null) inode=14497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=102 name=(null) inode=14494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=103 name=(null) inode=14498 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=104 name=(null) inode=14494 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PATH item=105 name=(null) inode=14499 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:12.755000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:18:12.823233 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 2 19:18:12.875295 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 2 19:18:12.903286 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:18:13.069046 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:18:13.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.073523 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:18:13.419653 lvm[987]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:18:13.430446 systemd-networkd[964]: lo: Link UP Oct 2 19:18:13.430478 systemd-networkd[964]: lo: Gained carrier Oct 2 19:18:13.433414 systemd-networkd[964]: Enumeration completed Oct 2 19:18:13.433690 systemd[1]: Started systemd-networkd.service. Oct 2 19:18:13.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.435907 systemd-networkd[964]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:18:13.440904 systemd-networkd[964]: eth0: Link UP Oct 2 19:18:13.440924 systemd-networkd[964]: eth0: Gained carrier Oct 2 19:18:13.461515 systemd-networkd[964]: eth0: DHCPv4 address 172.24.4.211/24, gateway 172.24.4.1 acquired from 172.24.4.1 Oct 2 19:18:13.472192 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:18:13.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.473627 systemd[1]: Reached target cryptsetup.target. Oct 2 19:18:13.477174 systemd[1]: Starting lvm2-activation.service... Oct 2 19:18:13.486295 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:18:13.524266 systemd[1]: Finished lvm2-activation.service. Oct 2 19:18:13.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.525604 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:18:13.526729 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:18:13.526787 systemd[1]: Reached target local-fs.target. Oct 2 19:18:13.527919 systemd[1]: Reached target machines.target. Oct 2 19:18:13.531566 systemd[1]: Starting ldconfig.service... Oct 2 19:18:13.564090 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:18:13.564263 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:13.566593 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:18:13.569985 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:18:13.573649 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:18:13.575062 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:18:13.575167 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:18:13.577498 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:18:13.618097 systemd-tmpfiles[993]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:18:13.621926 systemd[1]: boot.automount: Got automount request for /boot, triggered by 990 (bootctl) Oct 2 19:18:13.624479 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:18:13.629119 systemd-tmpfiles[993]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:18:13.645424 systemd-tmpfiles[993]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:18:13.678455 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:18:13.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.202316 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:18:14.204772 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:18:14.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.369172 systemd-fsck[999]: fsck.fat 4.2 (2021-01-31) Oct 2 19:18:14.369172 systemd-fsck[999]: /dev/vda1: 789 files, 115069/258078 clusters Oct 2 19:18:14.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.374696 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:18:14.380449 systemd[1]: Mounting boot.mount... Oct 2 19:18:14.410352 systemd[1]: Mounted boot.mount. Oct 2 19:18:14.487296 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:18:14.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.713751 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:18:14.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.717788 systemd[1]: Starting audit-rules.service... Oct 2 19:18:14.721312 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:18:14.724895 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:18:14.729000 audit: BPF prog-id=24 op=LOAD Oct 2 19:18:14.730923 systemd-networkd[964]: eth0: Gained IPv6LL Oct 2 19:18:14.735027 systemd[1]: Starting systemd-resolved.service... Oct 2 19:18:14.738000 audit: BPF prog-id=25 op=LOAD Oct 2 19:18:14.740723 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:18:14.744911 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:18:14.764000 audit[1007]: SYSTEM_BOOT pid=1007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.775936 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:18:14.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.798153 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:18:14.799603 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:18:14.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.829390 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:18:15.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.000789 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:18:15.002616 systemd[1]: Reached target time-set.target. Oct 2 19:18:15.052750 systemd-resolved[1005]: Positive Trust Anchors: Oct 2 19:18:15.053635 systemd-resolved[1005]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:18:15.053870 systemd-resolved[1005]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:18:15.110614 systemd-timesyncd[1006]: Contacted time server 82.64.230.205:123 (0.flatcar.pool.ntp.org). Oct 2 19:18:15.111456 systemd-timesyncd[1006]: Initial clock synchronization to Mon 2023-10-02 19:18:15.339901 UTC. Oct 2 19:18:15.129000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:18:15.129000 audit[1023]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb064edd0 a2=420 a3=0 items=0 ppid=1002 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:15.129000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:18:15.130169 augenrules[1023]: No rules Oct 2 19:18:15.132065 systemd[1]: Finished audit-rules.service. Oct 2 19:18:15.204958 systemd-resolved[1005]: Using system hostname 'ci-3510-3-0-9-74d01cdc4c.novalocal'. Oct 2 19:18:15.208458 systemd[1]: Started systemd-resolved.service. Oct 2 19:18:15.209908 systemd[1]: Reached target network.target. Oct 2 19:18:15.210980 systemd[1]: Reached target nss-lookup.target. Oct 2 19:18:16.271366 ldconfig[989]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:18:16.291472 systemd[1]: Finished ldconfig.service. Oct 2 19:18:16.295534 systemd[1]: Starting systemd-update-done.service... Oct 2 19:18:16.309048 systemd[1]: Finished systemd-update-done.service. Oct 2 19:18:16.310529 systemd[1]: Reached target sysinit.target. Oct 2 19:18:16.311815 systemd[1]: Started motdgen.path. Oct 2 19:18:16.312948 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:18:16.314565 systemd[1]: Started logrotate.timer. Oct 2 19:18:16.316141 systemd[1]: Started mdadm.timer. Oct 2 19:18:16.317219 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:18:16.318366 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:18:16.318442 systemd[1]: Reached target paths.target. Oct 2 19:18:16.319516 systemd[1]: Reached target timers.target. Oct 2 19:18:16.321851 systemd[1]: Listening on dbus.socket. Oct 2 19:18:16.325291 systemd[1]: Starting docker.socket... Oct 2 19:18:16.332064 systemd[1]: Listening on sshd.socket. Oct 2 19:18:16.333450 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:16.334493 systemd[1]: Listening on docker.socket. Oct 2 19:18:16.335820 systemd[1]: Reached target sockets.target. Oct 2 19:18:16.336934 systemd[1]: Reached target basic.target. Oct 2 19:18:16.338140 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:18:16.338210 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:18:16.340404 systemd[1]: Starting containerd.service... Oct 2 19:18:16.343542 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:18:16.347101 systemd[1]: Starting dbus.service... Oct 2 19:18:16.352036 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:18:16.363708 systemd[1]: Starting extend-filesystems.service... Oct 2 19:18:16.365004 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:18:16.368031 systemd[1]: Starting motdgen.service... Oct 2 19:18:16.371891 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:18:16.379522 systemd[1]: Starting prepare-critools.service... Oct 2 19:18:16.385466 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:18:16.388473 systemd[1]: Starting sshd-keygen.service... Oct 2 19:18:16.392859 systemd[1]: Starting systemd-logind.service... Oct 2 19:18:16.394491 jq[1036]: false Oct 2 19:18:16.393405 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:16.393468 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:18:16.393906 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:18:16.395387 systemd[1]: Starting update-engine.service... Oct 2 19:18:16.397050 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:18:16.401307 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:18:16.401486 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:18:16.420348 tar[1052]: crictl Oct 2 19:18:16.420686 jq[1045]: true Oct 2 19:18:16.423133 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:18:16.423313 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:18:16.427112 tar[1050]: ./ Oct 2 19:18:16.427112 tar[1050]: ./loopback Oct 2 19:18:16.452210 extend-filesystems[1037]: Found vda Oct 2 19:18:16.454190 extend-filesystems[1037]: Found vda1 Oct 2 19:18:16.454834 extend-filesystems[1037]: Found vda2 Oct 2 19:18:16.455450 extend-filesystems[1037]: Found vda3 Oct 2 19:18:16.455995 extend-filesystems[1037]: Found usr Oct 2 19:18:16.456580 extend-filesystems[1037]: Found vda4 Oct 2 19:18:16.457137 extend-filesystems[1037]: Found vda6 Oct 2 19:18:16.461803 extend-filesystems[1037]: Found vda7 Oct 2 19:18:16.462542 extend-filesystems[1037]: Found vda9 Oct 2 19:18:16.465790 jq[1057]: true Oct 2 19:18:16.466097 extend-filesystems[1037]: Checking size of /dev/vda9 Oct 2 19:18:16.476324 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:18:16.476499 systemd[1]: Finished motdgen.service. Oct 2 19:18:16.549857 env[1054]: time="2023-10-02T19:18:16.549714978Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:18:16.551879 coreos-metadata[1032]: Oct 02 19:18:16.551 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 2 19:18:16.565067 tar[1050]: ./bandwidth Oct 2 19:18:16.595304 extend-filesystems[1037]: Resized partition /dev/vda9 Oct 2 19:18:16.608626 extend-filesystems[1090]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:18:16.612748 systemd-logind[1043]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:18:16.613113 systemd-logind[1043]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:18:16.614192 systemd-logind[1043]: New seat seat0. Oct 2 19:18:16.641849 env[1054]: time="2023-10-02T19:18:16.641199021Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:18:16.651987 env[1054]: time="2023-10-02T19:18:16.649385663Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:16.652073 env[1054]: time="2023-10-02T19:18:16.651980564Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:16.652073 env[1054]: time="2023-10-02T19:18:16.652026571Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:16.657497 env[1054]: time="2023-10-02T19:18:16.656398835Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:16.657497 env[1054]: time="2023-10-02T19:18:16.656440347Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:16.657497 env[1054]: time="2023-10-02T19:18:16.656458465Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:18:16.657497 env[1054]: time="2023-10-02T19:18:16.656471173Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:16.657497 env[1054]: time="2023-10-02T19:18:16.656570649Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:16.660033 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Oct 2 19:18:16.673067 env[1054]: time="2023-10-02T19:18:16.673022838Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:16.673327 env[1054]: time="2023-10-02T19:18:16.673289417Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:16.673382 env[1054]: time="2023-10-02T19:18:16.673324850Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:18:16.673441 env[1054]: time="2023-10-02T19:18:16.673415298Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:18:16.673493 env[1054]: time="2023-10-02T19:18:16.673438012Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:18:16.684172 dbus-daemon[1033]: [system] SELinux support is enabled Oct 2 19:18:16.687874 dbus-daemon[1033]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:18:16.731393 update_engine[1044]: I1002 19:18:16.698191 1044 main.cc:92] Flatcar Update Engine starting Oct 2 19:18:16.731393 update_engine[1044]: I1002 19:18:16.706537 1044 update_check_scheduler.cc:74] Next update check in 7m2s Oct 2 19:18:16.684605 systemd[1]: Started dbus.service. Oct 2 19:18:16.687150 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:18:16.687174 systemd[1]: Reached target system-config.target. Oct 2 19:18:16.687713 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:18:16.687729 systemd[1]: Reached target user-config.target. Oct 2 19:18:16.688288 systemd[1]: Started systemd-logind.service. Oct 2 19:18:16.705435 systemd[1]: Started update-engine.service. Oct 2 19:18:16.728440 systemd[1]: Started locksmithd.service. Oct 2 19:18:16.739725 bash[1084]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:18:16.738766 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:18:16.759615 tar[1050]: ./ptp Oct 2 19:18:16.760792 env[1054]: time="2023-10-02T19:18:16.760755802Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:18:16.760878 env[1054]: time="2023-10-02T19:18:16.760843095Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:18:16.760928 env[1054]: time="2023-10-02T19:18:16.760880579Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:18:16.760970 env[1054]: time="2023-10-02T19:18:16.760938242Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.760970 env[1054]: time="2023-10-02T19:18:16.760959307Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761052 env[1054]: time="2023-10-02T19:18:16.760995287Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761052 env[1054]: time="2023-10-02T19:18:16.761013343Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761052 env[1054]: time="2023-10-02T19:18:16.761038996Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761134 env[1054]: time="2023-10-02T19:18:16.761055681Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761134 env[1054]: time="2023-10-02T19:18:16.761091835Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761134 env[1054]: time="2023-10-02T19:18:16.761107748Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.761134 env[1054]: time="2023-10-02T19:18:16.761123558Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:18:16.761293 env[1054]: time="2023-10-02T19:18:16.761269339Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:18:16.761439 env[1054]: time="2023-10-02T19:18:16.761414223Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761787409Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761842538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761861212Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761922472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761941538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761957833Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761972499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.761987823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.762002489Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.762016393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.762031532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.762255 env[1054]: time="2023-10-02T19:18:16.762050021Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762595188Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762623900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762643606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762657900Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762675885Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762690839Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762710637Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:18:16.763476 env[1054]: time="2023-10-02T19:18:16.762749172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:18:16.763696 env[1054]: time="2023-10-02T19:18:16.762971899Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:18:16.763696 env[1054]: time="2023-10-02T19:18:16.763037549Z" level=info msg="Connect containerd service" Oct 2 19:18:16.763696 env[1054]: time="2023-10-02T19:18:16.763069117Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:18:16.855937 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Oct 2 19:18:16.856001 extend-filesystems[1090]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 2 19:18:16.856001 extend-filesystems[1090]: old_desc_blocks = 1, new_desc_blocks = 3 Oct 2 19:18:16.856001 extend-filesystems[1090]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Oct 2 19:18:16.858483 coreos-metadata[1032]: Oct 02 19:18:16.779 INFO Fetch successful Oct 2 19:18:16.858483 coreos-metadata[1032]: Oct 02 19:18:16.779 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:18:16.858483 coreos-metadata[1032]: Oct 02 19:18:16.794 INFO Fetch successful Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.763950718Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.764181061Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.764262882Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.765585577Z" level=info msg="Start subscribing containerd event" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.765655824Z" level=info msg="Start recovering state" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.765750249Z" level=info msg="Start event monitor" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.765771470Z" level=info msg="Start snapshots syncer" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.765782178Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.765790907Z" level=info msg="Start streaming server" Oct 2 19:18:16.858595 env[1054]: time="2023-10-02T19:18:16.768071851Z" level=info msg="containerd successfully booted in 0.219298s" Oct 2 19:18:16.764372 systemd[1]: Started containerd.service. Oct 2 19:18:16.858969 extend-filesystems[1037]: Resized filesystem in /dev/vda9 Oct 2 19:18:16.853679 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:18:16.853875 systemd[1]: Finished extend-filesystems.service. Oct 2 19:18:16.856829 unknown[1032]: wrote ssh authorized keys file for user: core Oct 2 19:18:16.882592 update-ssh-keys[1096]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:18:16.883084 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:18:16.975910 tar[1050]: ./vlan Oct 2 19:18:17.056462 tar[1050]: ./host-device Oct 2 19:18:17.138269 tar[1050]: ./tuning Oct 2 19:18:17.209502 tar[1050]: ./vrf Oct 2 19:18:17.288069 tar[1050]: ./sbr Oct 2 19:18:17.360890 tar[1050]: ./tap Oct 2 19:18:17.376437 systemd[1]: Finished prepare-critools.service. Oct 2 19:18:17.406300 tar[1050]: ./dhcp Oct 2 19:18:17.516977 tar[1050]: ./static Oct 2 19:18:17.549503 tar[1050]: ./firewall Oct 2 19:18:17.596989 tar[1050]: ./macvlan Oct 2 19:18:17.638469 tar[1050]: ./dummy Oct 2 19:18:17.679474 tar[1050]: ./bridge Oct 2 19:18:17.723168 tar[1050]: ./ipvlan Oct 2 19:18:17.765343 tar[1050]: ./portmap Oct 2 19:18:17.804885 tar[1050]: ./host-local Oct 2 19:18:17.810135 sshd_keygen[1064]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:18:17.831317 locksmithd[1093]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:18:17.833870 systemd[1]: Finished sshd-keygen.service. Oct 2 19:18:17.836011 systemd[1]: Starting issuegen.service... Oct 2 19:18:17.841301 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:18:17.841474 systemd[1]: Finished issuegen.service. Oct 2 19:18:17.843353 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:18:17.851935 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:18:17.854003 systemd[1]: Started getty@tty1.service. Oct 2 19:18:17.855657 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:18:17.856283 systemd[1]: Reached target getty.target. Oct 2 19:18:17.863890 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:18:17.864633 systemd[1]: Reached target multi-user.target. Oct 2 19:18:17.866405 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:18:17.874528 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:18:17.874687 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:18:17.875357 systemd[1]: Startup finished in 946ms (kernel) + 11.475s (initrd) + 11.665s (userspace) = 24.088s. Oct 2 19:18:25.925118 systemd[1]: Created slice system-sshd.slice. Oct 2 19:18:25.929886 systemd[1]: Started sshd@0-172.24.4.211:22-172.24.4.1:40286.service. Oct 2 19:18:27.065564 sshd[1119]: Accepted publickey for core from 172.24.4.1 port 40286 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:27.073506 sshd[1119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:27.169460 systemd[1]: Created slice user-500.slice. Oct 2 19:18:27.172108 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:18:27.180818 systemd-logind[1043]: New session 1 of user core. Oct 2 19:18:27.194765 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:18:27.198582 systemd[1]: Starting user@500.service... Oct 2 19:18:27.206125 (systemd)[1122]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:27.342644 systemd[1122]: Queued start job for default target default.target. Oct 2 19:18:27.343949 systemd[1122]: Reached target paths.target. Oct 2 19:18:27.343985 systemd[1122]: Reached target sockets.target. Oct 2 19:18:27.344008 systemd[1122]: Reached target timers.target. Oct 2 19:18:27.344030 systemd[1122]: Reached target basic.target. Oct 2 19:18:27.344179 systemd[1]: Started user@500.service. Oct 2 19:18:27.345339 systemd[1]: Started session-1.scope. Oct 2 19:18:27.347346 systemd[1122]: Reached target default.target. Oct 2 19:18:27.348098 systemd[1122]: Startup finished in 129ms. Oct 2 19:18:27.732412 systemd[1]: Started sshd@1-172.24.4.211:22-172.24.4.1:40290.service. Oct 2 19:18:29.131254 sshd[1131]: Accepted publickey for core from 172.24.4.1 port 40290 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:29.134978 sshd[1131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:29.145567 systemd-logind[1043]: New session 2 of user core. Oct 2 19:18:29.146887 systemd[1]: Started session-2.scope. Oct 2 19:18:29.773058 sshd[1131]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:29.781964 systemd[1]: Started sshd@2-172.24.4.211:22-172.24.4.1:40292.service. Oct 2 19:18:29.783152 systemd[1]: sshd@1-172.24.4.211:22-172.24.4.1:40290.service: Deactivated successfully. Oct 2 19:18:29.785801 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:18:29.788891 systemd-logind[1043]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:18:29.791479 systemd-logind[1043]: Removed session 2. Oct 2 19:18:30.951623 sshd[1136]: Accepted publickey for core from 172.24.4.1 port 40292 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:30.954893 sshd[1136]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:30.965582 systemd[1]: Started session-3.scope. Oct 2 19:18:30.967037 systemd-logind[1043]: New session 3 of user core. Oct 2 19:18:31.685004 sshd[1136]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:31.691021 systemd[1]: Started sshd@3-172.24.4.211:22-172.24.4.1:40308.service. Oct 2 19:18:31.696500 systemd[1]: sshd@2-172.24.4.211:22-172.24.4.1:40292.service: Deactivated successfully. Oct 2 19:18:31.698152 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:18:31.701185 systemd-logind[1043]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:18:31.704133 systemd-logind[1043]: Removed session 3. Oct 2 19:18:32.900793 sshd[1142]: Accepted publickey for core from 172.24.4.1 port 40308 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:32.904187 sshd[1142]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:32.915472 systemd[1]: Started session-4.scope. Oct 2 19:18:32.916809 systemd-logind[1043]: New session 4 of user core. Oct 2 19:18:33.590080 sshd[1142]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:33.597172 systemd[1]: Started sshd@4-172.24.4.211:22-172.24.4.1:40324.service. Oct 2 19:18:33.602031 systemd[1]: sshd@3-172.24.4.211:22-172.24.4.1:40308.service: Deactivated successfully. Oct 2 19:18:33.603589 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:18:33.606273 systemd-logind[1043]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:18:33.608792 systemd-logind[1043]: Removed session 4. Oct 2 19:18:34.843259 sshd[1148]: Accepted publickey for core from 172.24.4.1 port 40324 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:34.846557 sshd[1148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:34.856448 systemd-logind[1043]: New session 5 of user core. Oct 2 19:18:34.857361 systemd[1]: Started session-5.scope. Oct 2 19:18:35.431580 sudo[1152]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:18:35.432039 sudo[1152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:35.443663 dbus-daemon[1033]: Н\xf6\xd6)V: received setenforce notice (enforcing=489206544) Oct 2 19:18:35.448338 sudo[1152]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:35.639326 sshd[1148]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:35.650572 systemd[1]: Started sshd@5-172.24.4.211:22-172.24.4.1:50516.service. Oct 2 19:18:35.652404 systemd[1]: sshd@4-172.24.4.211:22-172.24.4.1:40324.service: Deactivated successfully. Oct 2 19:18:35.654589 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:18:35.660182 systemd-logind[1043]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:18:35.663938 systemd-logind[1043]: Removed session 5. Oct 2 19:18:36.780101 sshd[1155]: Accepted publickey for core from 172.24.4.1 port 50516 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:36.782745 sshd[1155]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:36.794593 systemd-logind[1043]: New session 6 of user core. Oct 2 19:18:36.795321 systemd[1]: Started session-6.scope. Oct 2 19:18:37.250983 sudo[1160]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:18:37.252035 sudo[1160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:37.258576 sudo[1160]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:37.268454 sudo[1159]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:18:37.269580 sudo[1159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:37.291000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:18:37.291928 systemd[1]: Stopping audit-rules.service... Oct 2 19:18:37.293382 auditctl[1163]: No rules Oct 2 19:18:37.299418 kernel: kauditd_printk_skb: 177 callbacks suppressed Oct 2 19:18:37.299612 kernel: audit: type=1305 audit(1696274317.291:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:18:37.294271 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:18:37.294630 systemd[1]: Stopped audit-rules.service. Oct 2 19:18:37.299845 systemd[1]: Starting audit-rules.service... Oct 2 19:18:37.291000 audit[1163]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd39e61e20 a2=420 a3=0 items=0 ppid=1 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:37.291000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:18:37.317320 kernel: audit: type=1300 audit(1696274317.291:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd39e61e20 a2=420 a3=0 items=0 ppid=1 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:37.317454 kernel: audit: type=1327 audit(1696274317.291:162): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:18:37.317509 kernel: audit: type=1131 audit(1696274317.294:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.347145 augenrules[1180]: No rules Oct 2 19:18:37.348840 systemd[1]: Finished audit-rules.service. Oct 2 19:18:37.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.351010 sudo[1159]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:37.359314 kernel: audit: type=1130 audit(1696274317.349:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.349000 audit[1159]: USER_END pid=1159 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.349000 audit[1159]: CRED_DISP pid=1159 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.378630 kernel: audit: type=1106 audit(1696274317.349:165): pid=1159 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.378748 kernel: audit: type=1104 audit(1696274317.349:166): pid=1159 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.544505 sshd[1155]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:37.553483 systemd[1]: sshd@5-172.24.4.211:22-172.24.4.1:50516.service: Deactivated successfully. Oct 2 19:18:37.548000 audit[1155]: USER_END pid=1155 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:37.555459 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:18:37.566263 kernel: audit: type=1106 audit(1696274317.548:167): pid=1155 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:37.548000 audit[1155]: CRED_DISP pid=1155 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:37.577665 kernel: audit: type=1104 audit(1696274317.548:168): pid=1155 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:37.576567 systemd-logind[1043]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:18:37.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.211:22-172.24.4.1:50516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.579050 systemd[1]: Started sshd@6-172.24.4.211:22-172.24.4.1:50532.service. Oct 2 19:18:37.588299 kernel: audit: type=1131 audit(1696274317.553:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.211:22-172.24.4.1:50516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.211:22-172.24.4.1:50532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.590594 systemd-logind[1043]: Removed session 6. Oct 2 19:18:38.577000 audit[1186]: USER_ACCT pid=1186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:38.577988 sshd[1186]: Accepted publickey for core from 172.24.4.1 port 50532 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:18:38.579000 audit[1186]: CRED_ACQ pid=1186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:38.579000 audit[1186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd371c2620 a2=3 a3=0 items=0 ppid=1 pid=1186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:38.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:38.580418 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:38.588612 systemd-logind[1043]: New session 7 of user core. Oct 2 19:18:38.590660 systemd[1]: Started session-7.scope. Oct 2 19:18:38.603000 audit[1186]: USER_START pid=1186 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:38.606000 audit[1188]: CRED_ACQ pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:38.996000 audit[1189]: USER_ACCT pid=1189 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:38.997742 sudo[1189]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:18:38.997000 audit[1189]: CRED_REFR pid=1189 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:38.998988 sudo[1189]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:39.001000 audit[1189]: USER_START pid=1189 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:39.645488 systemd[1]: Reloading. Oct 2 19:18:39.732716 /usr/lib/systemd/system-generators/torcx-generator[1218]: time="2023-10-02T19:18:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:39.741270 /usr/lib/systemd/system-generators/torcx-generator[1218]: time="2023-10-02T19:18:39Z" level=info msg="torcx already run" Oct 2 19:18:39.829152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:39.829187 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:39.856578 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.925000 audit: BPF prog-id=31 op=LOAD Oct 2 19:18:39.926000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit: BPF prog-id=32 op=LOAD Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.926000 audit: BPF prog-id=33 op=LOAD Oct 2 19:18:39.926000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:18:39.926000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.927000 audit: BPF prog-id=34 op=LOAD Oct 2 19:18:39.927000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.930000 audit: BPF prog-id=35 op=LOAD Oct 2 19:18:39.930000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit: BPF prog-id=36 op=LOAD Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.932000 audit: BPF prog-id=37 op=LOAD Oct 2 19:18:39.932000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:18:39.932000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit: BPF prog-id=38 op=LOAD Oct 2 19:18:39.934000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.934000 audit: BPF prog-id=39 op=LOAD Oct 2 19:18:39.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.935000 audit: BPF prog-id=40 op=LOAD Oct 2 19:18:39.935000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:18:39.935000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit: BPF prog-id=41 op=LOAD Oct 2 19:18:39.938000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit: BPF prog-id=42 op=LOAD Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.938000 audit: BPF prog-id=43 op=LOAD Oct 2 19:18:39.938000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:18:39.938000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.940000 audit: BPF prog-id=44 op=LOAD Oct 2 19:18:39.940000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:39.942000 audit: BPF prog-id=45 op=LOAD Oct 2 19:18:39.942000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:18:39.957441 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:18:39.964159 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:18:39.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:39.964861 systemd[1]: Reached target network-online.target. Oct 2 19:18:39.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:39.966510 systemd[1]: Started kubelet.service. Oct 2 19:18:39.985096 systemd[1]: Starting coreos-metadata.service... Oct 2 19:18:40.037878 kubelet[1265]: E1002 19:18:40.037828 1265 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:18:40.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:18:40.039756 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:18:40.039887 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:18:40.051724 coreos-metadata[1273]: Oct 02 19:18:40.051 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 2 19:18:40.419981 coreos-metadata[1273]: Oct 02 19:18:40.418 INFO Fetch successful Oct 2 19:18:40.419981 coreos-metadata[1273]: Oct 02 19:18:40.418 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Oct 2 19:18:40.434647 coreos-metadata[1273]: Oct 02 19:18:40.434 INFO Fetch successful Oct 2 19:18:40.434912 coreos-metadata[1273]: Oct 02 19:18:40.434 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Oct 2 19:18:40.451678 coreos-metadata[1273]: Oct 02 19:18:40.451 INFO Fetch successful Oct 2 19:18:40.451974 coreos-metadata[1273]: Oct 02 19:18:40.451 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Oct 2 19:18:40.468745 coreos-metadata[1273]: Oct 02 19:18:40.468 INFO Fetch successful Oct 2 19:18:40.468985 coreos-metadata[1273]: Oct 02 19:18:40.468 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Oct 2 19:18:40.484809 coreos-metadata[1273]: Oct 02 19:18:40.484 INFO Fetch successful Oct 2 19:18:40.504418 systemd[1]: Finished coreos-metadata.service. Oct 2 19:18:40.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:41.293244 systemd[1]: Stopped kubelet.service. Oct 2 19:18:41.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:41.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:41.337635 systemd[1]: Reloading. Oct 2 19:18:41.459936 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2023-10-02T19:18:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:41.459967 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2023-10-02T19:18:41Z" level=info msg="torcx already run" Oct 2 19:18:41.541179 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:41.541197 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:41.567128 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit: BPF prog-id=46 op=LOAD Oct 2 19:18:41.631000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.631000 audit: BPF prog-id=47 op=LOAD Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit: BPF prog-id=48 op=LOAD Oct 2 19:18:41.632000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:18:41.632000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.633000 audit: BPF prog-id=49 op=LOAD Oct 2 19:18:41.633000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.635000 audit: BPF prog-id=50 op=LOAD Oct 2 19:18:41.635000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit: BPF prog-id=51 op=LOAD Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.636000 audit: BPF prog-id=52 op=LOAD Oct 2 19:18:41.637000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:18:41.637000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit: BPF prog-id=53 op=LOAD Oct 2 19:18:41.638000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit: BPF prog-id=54 op=LOAD Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.639000 audit: BPF prog-id=55 op=LOAD Oct 2 19:18:41.639000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:18:41.639000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit: BPF prog-id=56 op=LOAD Oct 2 19:18:41.641000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit: BPF prog-id=57 op=LOAD Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.641000 audit: BPF prog-id=58 op=LOAD Oct 2 19:18:41.641000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:18:41.641000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.644000 audit: BPF prog-id=59 op=LOAD Oct 2 19:18:41.644000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:41.645000 audit: BPF prog-id=60 op=LOAD Oct 2 19:18:41.645000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:18:41.660615 systemd[1]: Started kubelet.service. Oct 2 19:18:41.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:41.712803 kubelet[1374]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:18:41.713103 kubelet[1374]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:18:41.713161 kubelet[1374]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:18:41.713294 kubelet[1374]: I1002 19:18:41.713268 1374 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:18:42.187391 kubelet[1374]: I1002 19:18:42.187344 1374 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:18:42.187391 kubelet[1374]: I1002 19:18:42.187373 1374 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:18:42.187637 kubelet[1374]: I1002 19:18:42.187613 1374 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:18:42.191773 kubelet[1374]: I1002 19:18:42.191737 1374 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:18:42.191946 kubelet[1374]: I1002 19:18:42.191915 1374 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:18:42.192024 kubelet[1374]: I1002 19:18:42.191987 1374 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:18:42.192024 kubelet[1374]: I1002 19:18:42.192007 1374 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:18:42.192024 kubelet[1374]: I1002 19:18:42.192019 1374 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:18:42.192365 kubelet[1374]: I1002 19:18:42.192097 1374 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:18:42.193346 kubelet[1374]: I1002 19:18:42.193317 1374 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:18:42.197154 kubelet[1374]: I1002 19:18:42.197120 1374 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:18:42.197410 kubelet[1374]: I1002 19:18:42.197387 1374 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:18:42.197594 kubelet[1374]: I1002 19:18:42.197571 1374 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:18:42.197749 kubelet[1374]: I1002 19:18:42.197728 1374 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:18:42.198496 kubelet[1374]: I1002 19:18:42.198446 1374 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:18:42.198794 kubelet[1374]: W1002 19:18:42.198766 1374 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:18:42.199315 kubelet[1374]: I1002 19:18:42.199191 1374 server.go:1168] "Started kubelet" Oct 2 19:18:42.199670 kubelet[1374]: E1002 19:18:42.199641 1374 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:42.199973 kubelet[1374]: E1002 19:18:42.199942 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:42.199000 audit[1374]: AVC avc: denied { mac_admin } for pid=1374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:42.199000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:42.199000 audit[1374]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000487800 a1=c0005ffbf0 a2=c0004877d0 a3=25 items=0 ppid=1 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.199000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:42.199000 audit[1374]: AVC avc: denied { mac_admin } for pid=1374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:42.199000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:42.199000 audit[1374]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007fc7a0 a1=c0005ffc08 a2=c000487890 a3=25 items=0 ppid=1 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.199000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:42.202194 kubelet[1374]: I1002 19:18:42.200890 1374 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:18:42.202194 kubelet[1374]: I1002 19:18:42.200942 1374 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:18:42.202194 kubelet[1374]: I1002 19:18:42.201002 1374 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:18:42.206185 kubelet[1374]: I1002 19:18:42.206089 1374 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:18:42.207581 kubelet[1374]: I1002 19:18:42.207523 1374 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:18:42.210660 kubelet[1374]: I1002 19:18:42.210533 1374 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:18:42.211158 kubelet[1374]: E1002 19:18:42.211129 1374 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:18:42.211158 kubelet[1374]: E1002 19:18:42.211157 1374 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:18:42.212029 kubelet[1374]: I1002 19:18:42.211993 1374 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:18:42.214811 kubelet[1374]: I1002 19:18:42.214775 1374 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:18:42.253527 kubelet[1374]: W1002 19:18:42.253482 1374 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:18:42.265172 kubelet[1374]: E1002 19:18:42.259059 1374 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:18:42.265172 kubelet[1374]: W1002 19:18:42.258365 1374 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.211" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:18:42.265172 kubelet[1374]: E1002 19:18:42.259109 1374 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.211" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:18:42.265172 kubelet[1374]: W1002 19:18:42.258427 1374 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:18:42.265172 kubelet[1374]: E1002 19:18:42.259121 1374 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:18:42.265670 kubelet[1374]: E1002 19:18:42.258498 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082404c53bb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 199172027, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 199172027, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.265670 kubelet[1374]: E1002 19:18:42.258791 1374 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.211\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 2 19:18:42.265955 kubelet[1374]: E1002 19:18:42.264433 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a60824103093c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 211146044, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 211146044, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.274475 kubelet[1374]: E1002 19:18:42.274098 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449fe358", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.211 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271757144, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271757144, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.273000 audit[1386]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.273000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0996bf20 a2=0 a3=7fff0996bf0c items=0 ppid=1374 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:18:42.276012 kubelet[1374]: I1002 19:18:42.275996 1374 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:18:42.276142 kubelet[1374]: I1002 19:18:42.276129 1374 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:18:42.276272 kubelet[1374]: I1002 19:18:42.276260 1374 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:18:42.277000 kubelet[1374]: E1002 19:18:42.276914 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449ff7ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.211 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271762378, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271762378, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.276000 audit[1390]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.276000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffaaf87710 a2=0 a3=7fffaaf876fc items=0 ppid=1374 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:18:42.279101 kubelet[1374]: E1002 19:18:42.278954 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a608244a00286", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.211 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271765126, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271765126, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.282546 kubelet[1374]: I1002 19:18:42.282528 1374 policy_none.go:49] "None policy: Start" Oct 2 19:18:42.283572 kubelet[1374]: I1002 19:18:42.283560 1374 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:18:42.283681 kubelet[1374]: I1002 19:18:42.283670 1374 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:18:42.300307 systemd[1]: Created slice kubepods.slice. Oct 2 19:18:42.303234 kernel: kauditd_printk_skb: 376 callbacks suppressed Oct 2 19:18:42.303300 kernel: audit: type=1325 audit(1696274322.279:534): table=filter:4 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.279000 audit[1393]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.279000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc8e13840 a2=0 a3=7fffc8e1382c items=0 ppid=1374 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.310174 kernel: audit: type=1300 audit(1696274322.279:534): arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc8e13840 a2=0 a3=7fffc8e1382c items=0 ppid=1374 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.313993 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:18:42.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:42.315047 kubelet[1374]: I1002 19:18:42.315028 1374 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.211" Oct 2 19:18:42.318245 kernel: audit: type=1327 audit(1696274322.279:534): proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:42.318953 kubelet[1374]: E1002 19:18:42.318804 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449fe358", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.211 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271757144, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 314960429, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a6082449fe358" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.318000 audit[1398]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.320168 kubelet[1374]: E1002 19:18:42.319955 1374 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.211" Oct 2 19:18:42.323233 kernel: audit: type=1325 audit(1696274322.318:535): table=filter:5 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.323472 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:18:42.331286 kernel: audit: type=1300 audit(1696274322.318:535): arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6ca04220 a2=0 a3=7fff6ca0420c items=0 ppid=1374 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.318000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6ca04220 a2=0 a3=7fff6ca0420c items=0 ppid=1374 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.331465 kubelet[1374]: E1002 19:18:42.326374 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449ff7ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.211 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271762378, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 314967036, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a6082449ff7ca" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.331588 kubelet[1374]: E1002 19:18:42.329998 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a608244a00286", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.211 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271765126, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 314969844, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a608244a00286" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:42.335328 kernel: audit: type=1327 audit(1696274322.318:535): proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:42.338413 kubelet[1374]: I1002 19:18:42.338372 1374 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:18:42.338525 kubelet[1374]: I1002 19:18:42.338473 1374 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:18:42.338904 kubelet[1374]: I1002 19:18:42.338882 1374 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:18:42.339778 kubelet[1374]: E1002 19:18:42.339764 1374 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.211\" not found" Oct 2 19:18:42.337000 audit[1374]: AVC avc: denied { mac_admin } for pid=1374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:42.344259 kernel: audit: type=1400 audit(1696274322.337:536): avc: denied { mac_admin } for pid=1374 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:42.337000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:42.346358 kubelet[1374]: E1002 19:18:42.346065 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a608248f5e809", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 344503305, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 344503305, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.337000 audit[1374]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e2b9e0 a1=c000e4a888 a2=c000e2b9b0 a3=25 items=0 ppid=1 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.358085 kernel: audit: type=1401 audit(1696274322.337:536): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:42.358161 kernel: audit: type=1300 audit(1696274322.337:536): arch=c000003e syscall=188 success=no exit=-22 a0=c000e2b9e0 a1=c000e4a888 a2=c000e2b9b0 a3=25 items=0 ppid=1 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.358182 kernel: audit: type=1327 audit(1696274322.337:536): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:42.337000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:42.402000 audit[1403]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.402000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffec66e3ca0 a2=0 a3=7ffec66e3c8c items=0 ppid=1374 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:18:42.404588 kubelet[1374]: I1002 19:18:42.404539 1374 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:18:42.404000 audit[1404]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.404000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6a50e4c0 a2=0 a3=7ffd6a50e4ac items=0 ppid=1374 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:18:42.405000 audit[1406]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.405000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc944c92b0 a2=0 a3=7ffc944c929c items=0 ppid=1374 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:18:42.406000 audit[1407]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:42.406000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9ac3f200 a2=0 a3=7ffc9ac3f1ec items=0 ppid=1374 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:18:42.407000 audit[1405]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:42.407000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1a470710 a2=0 a3=10e3 items=0 ppid=1374 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:18:42.408736 kubelet[1374]: I1002 19:18:42.408693 1374 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:18:42.408802 kubelet[1374]: I1002 19:18:42.408788 1374 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:18:42.408853 kubelet[1374]: I1002 19:18:42.408841 1374 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:18:42.408938 kubelet[1374]: E1002 19:18:42.408922 1374 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:18:42.408000 audit[1408]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:42.408000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa61bd640 a2=0 a3=7fffa61bd62c items=0 ppid=1374 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:18:42.411000 audit[1409]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:42.411000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdfd9b28b0 a2=0 a3=7ffdfd9b289c items=0 ppid=1374 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:18:42.412669 kubelet[1374]: W1002 19:18:42.412638 1374 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:18:42.412720 kubelet[1374]: E1002 19:18:42.412681 1374 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:18:42.412000 audit[1410]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:42.412000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0eb6eb70 a2=0 a3=7ffd0eb6eb5c items=0 ppid=1374 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:18:42.469269 kubelet[1374]: E1002 19:18:42.462567 1374 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.211\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 2 19:18:42.521803 kubelet[1374]: I1002 19:18:42.521758 1374 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.211" Oct 2 19:18:42.523970 kubelet[1374]: E1002 19:18:42.523927 1374 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.211" Oct 2 19:18:42.524435 kubelet[1374]: E1002 19:18:42.524298 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449fe358", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.211 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271757144, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 521530071, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a6082449fe358" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.527844 kubelet[1374]: E1002 19:18:42.527738 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449ff7ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.211 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271762378, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 521667811, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a6082449ff7ca" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.530012 kubelet[1374]: E1002 19:18:42.529882 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a608244a00286", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.211 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271765126, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 521674650, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a608244a00286" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.869399 kubelet[1374]: E1002 19:18:42.869200 1374 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.211\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 2 19:18:42.926127 kubelet[1374]: I1002 19:18:42.926104 1374 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.211" Oct 2 19:18:42.928169 kubelet[1374]: E1002 19:18:42.928116 1374 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.211" Oct 2 19:18:42.928386 kubelet[1374]: E1002 19:18:42.928019 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449fe358", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.211 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271757144, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 926068703, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a6082449fe358" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.929985 kubelet[1374]: E1002 19:18:42.929880 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a6082449ff7ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.211 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271762378, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 926074188, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a6082449ff7ca" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:42.931492 kubelet[1374]: E1002 19:18:42.931367 1374 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211.178a608244a00286", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.211", UID:"172.24.4.211", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.211 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.211"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 271765126, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 42, 926077107, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.211.178a608244a00286" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:18:43.194313 kubelet[1374]: I1002 19:18:43.194148 1374 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:18:43.200833 kubelet[1374]: E1002 19:18:43.200792 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:43.638628 kubelet[1374]: E1002 19:18:43.637896 1374 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.211" not found Oct 2 19:18:43.682477 kubelet[1374]: E1002 19:18:43.682428 1374 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.211\" not found" node="172.24.4.211" Oct 2 19:18:43.729774 kubelet[1374]: I1002 19:18:43.729697 1374 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.211" Oct 2 19:18:43.746143 kubelet[1374]: I1002 19:18:43.746094 1374 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.211" Oct 2 19:18:43.812245 kubelet[1374]: I1002 19:18:43.812180 1374 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:18:43.812752 env[1054]: time="2023-10-02T19:18:43.812663144Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:18:43.813901 kubelet[1374]: I1002 19:18:43.813873 1374 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:18:44.195000 audit[1189]: USER_END pid=1189 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.195000 audit[1189]: CRED_DISP pid=1189 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.195470 sudo[1189]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:44.200963 kubelet[1374]: I1002 19:18:44.200860 1374 apiserver.go:52] "Watching apiserver" Oct 2 19:18:44.201636 kubelet[1374]: E1002 19:18:44.201616 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:44.212695 kubelet[1374]: I1002 19:18:44.212632 1374 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:18:44.213005 kubelet[1374]: I1002 19:18:44.212987 1374 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:18:44.215810 kubelet[1374]: I1002 19:18:44.215785 1374 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:18:44.225943 systemd[1]: Created slice kubepods-besteffort-pod8f92141b_8c49_4247_b6f3_e0a300ac0438.slice. Oct 2 19:18:44.238352 kubelet[1374]: I1002 19:18:44.238304 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-xtables-lock\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238515 kubelet[1374]: I1002 19:18:44.238396 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-policysync\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238515 kubelet[1374]: I1002 19:18:44.238463 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a205d810-b1ff-4454-b8b9-c86750cc9006-node-certs\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238711 kubelet[1374]: I1002 19:18:44.238525 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-flexvol-driver-host\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238711 kubelet[1374]: I1002 19:18:44.238587 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rbgg9\" (UniqueName: \"kubernetes.io/projected/8f92141b-8c49-4247-b6f3-e0a300ac0438-kube-api-access-rbgg9\") pod \"kube-proxy-tzxhs\" (UID: \"8f92141b-8c49-4247-b6f3-e0a300ac0438\") " pod="kube-system/kube-proxy-tzxhs" Oct 2 19:18:44.238711 kubelet[1374]: I1002 19:18:44.238644 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-cni-bin-dir\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238711 kubelet[1374]: I1002 19:18:44.238700 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8f92141b-8c49-4247-b6f3-e0a300ac0438-kube-proxy\") pod \"kube-proxy-tzxhs\" (UID: \"8f92141b-8c49-4247-b6f3-e0a300ac0438\") " pod="kube-system/kube-proxy-tzxhs" Oct 2 19:18:44.238954 kubelet[1374]: I1002 19:18:44.238755 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-cni-net-dir\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238954 kubelet[1374]: I1002 19:18:44.238815 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-cni-log-dir\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238954 kubelet[1374]: I1002 19:18:44.238874 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-66bjr\" (UniqueName: \"kubernetes.io/projected/a205d810-b1ff-4454-b8b9-c86750cc9006-kube-api-access-66bjr\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.238954 kubelet[1374]: I1002 19:18:44.238931 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8f92141b-8c49-4247-b6f3-e0a300ac0438-lib-modules\") pod \"kube-proxy-tzxhs\" (UID: \"8f92141b-8c49-4247-b6f3-e0a300ac0438\") " pod="kube-system/kube-proxy-tzxhs" Oct 2 19:18:44.239181 kubelet[1374]: I1002 19:18:44.238997 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-lib-modules\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.239181 kubelet[1374]: I1002 19:18:44.239053 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a205d810-b1ff-4454-b8b9-c86750cc9006-tigera-ca-bundle\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.239181 kubelet[1374]: I1002 19:18:44.239109 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-var-run-calico\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.239181 kubelet[1374]: I1002 19:18:44.239177 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a205d810-b1ff-4454-b8b9-c86750cc9006-var-lib-calico\") pod \"calico-node-28wmb\" (UID: \"a205d810-b1ff-4454-b8b9-c86750cc9006\") " pod="calico-system/calico-node-28wmb" Oct 2 19:18:44.239441 kubelet[1374]: I1002 19:18:44.239270 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8f92141b-8c49-4247-b6f3-e0a300ac0438-xtables-lock\") pod \"kube-proxy-tzxhs\" (UID: \"8f92141b-8c49-4247-b6f3-e0a300ac0438\") " pod="kube-system/kube-proxy-tzxhs" Oct 2 19:18:44.239441 kubelet[1374]: I1002 19:18:44.239290 1374 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:18:44.244395 systemd[1]: Created slice kubepods-besteffort-poda205d810_b1ff_4454_b8b9_c86750cc9006.slice. Oct 2 19:18:44.344432 kubelet[1374]: E1002 19:18:44.344396 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.344652 kubelet[1374]: W1002 19:18:44.344621 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.344823 kubelet[1374]: E1002 19:18:44.344797 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.345577 kubelet[1374]: E1002 19:18:44.345532 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.345577 kubelet[1374]: W1002 19:18:44.345563 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.345856 kubelet[1374]: E1002 19:18:44.345605 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.346036 kubelet[1374]: E1002 19:18:44.346001 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.346036 kubelet[1374]: W1002 19:18:44.346028 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.346285 kubelet[1374]: E1002 19:18:44.346056 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.346505 kubelet[1374]: E1002 19:18:44.346474 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.346505 kubelet[1374]: W1002 19:18:44.346501 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.346677 kubelet[1374]: E1002 19:18:44.346528 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.346982 kubelet[1374]: E1002 19:18:44.346952 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.346982 kubelet[1374]: W1002 19:18:44.346978 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.347124 kubelet[1374]: E1002 19:18:44.347005 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.350727 kubelet[1374]: E1002 19:18:44.350695 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.350930 kubelet[1374]: W1002 19:18:44.350903 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.351079 kubelet[1374]: E1002 19:18:44.351057 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.362611 sshd[1186]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:44.363000 audit[1186]: USER_END pid=1186 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:44.363000 audit[1186]: CRED_DISP pid=1186 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:18:44.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.211:22-172.24.4.1:50532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.367344 systemd[1]: sshd@6-172.24.4.211:22-172.24.4.1:50532.service: Deactivated successfully. Oct 2 19:18:44.368859 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:18:44.371619 systemd-logind[1043]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:18:44.373867 systemd-logind[1043]: Removed session 7. Oct 2 19:18:44.390123 kubelet[1374]: E1002 19:18:44.390058 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.390123 kubelet[1374]: W1002 19:18:44.390095 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.390123 kubelet[1374]: E1002 19:18:44.390134 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.403296 kubelet[1374]: E1002 19:18:44.403241 1374 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:18:44.403518 kubelet[1374]: W1002 19:18:44.403489 1374 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:18:44.403675 kubelet[1374]: E1002 19:18:44.403652 1374 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:18:44.564505 env[1054]: time="2023-10-02T19:18:44.564248048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-28wmb,Uid:a205d810-b1ff-4454-b8b9-c86750cc9006,Namespace:calico-system,Attempt:0,}" Oct 2 19:18:44.568300 env[1054]: time="2023-10-02T19:18:44.565483526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tzxhs,Uid:8f92141b-8c49-4247-b6f3-e0a300ac0438,Namespace:kube-system,Attempt:0,}" Oct 2 19:18:45.203195 kubelet[1374]: E1002 19:18:45.203127 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:45.397730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2113341776.mount: Deactivated successfully. Oct 2 19:18:45.417071 env[1054]: time="2023-10-02T19:18:45.416506433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.424066 env[1054]: time="2023-10-02T19:18:45.423997823Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.428742 env[1054]: time="2023-10-02T19:18:45.428654158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.432501 env[1054]: time="2023-10-02T19:18:45.432422079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.442144 env[1054]: time="2023-10-02T19:18:45.442055461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.445827 env[1054]: time="2023-10-02T19:18:45.445712969Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.452282 env[1054]: time="2023-10-02T19:18:45.452226093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.456676 env[1054]: time="2023-10-02T19:18:45.455281883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:45.491959 env[1054]: time="2023-10-02T19:18:45.491610478Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:45.492221 env[1054]: time="2023-10-02T19:18:45.492172907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:45.492359 env[1054]: time="2023-10-02T19:18:45.492323059Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:45.492718 env[1054]: time="2023-10-02T19:18:45.492682126Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18d00b309f8d7d53f993bde89ff058354f270f23a239e939bdb6d140fba241b9 pid=1433 runtime=io.containerd.runc.v2 Oct 2 19:18:45.494733 env[1054]: time="2023-10-02T19:18:45.494639271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:45.494853 env[1054]: time="2023-10-02T19:18:45.494704422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:45.494853 env[1054]: time="2023-10-02T19:18:45.494723871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:45.495236 env[1054]: time="2023-10-02T19:18:45.495160860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1 pid=1447 runtime=io.containerd.runc.v2 Oct 2 19:18:45.519103 systemd[1]: Started cri-containerd-215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1.scope. Oct 2 19:18:45.535614 systemd[1]: Started cri-containerd-18d00b309f8d7d53f993bde89ff058354f270f23a239e939bdb6d140fba241b9.scope. Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.546000 audit: BPF prog-id=61 op=LOAD Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1447 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356163623335653936323965373563353835623662353032623634 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1447 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356163623335653936323965373563353835623662353032623634 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.547000 audit: BPF prog-id=62 op=LOAD Oct 2 19:18:45.547000 audit[1459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bd560 items=0 ppid=1447 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356163623335653936323965373563353835623662353032623634 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit: BPF prog-id=63 op=LOAD Oct 2 19:18:45.548000 audit[1459]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bd5a8 items=0 ppid=1447 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356163623335653936323965373563353835623662353032623634 Oct 2 19:18:45.548000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:18:45.548000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { perfmon } for pid=1459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit[1459]: AVC avc: denied { bpf } for pid=1459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.548000 audit: BPF prog-id=64 op=LOAD Oct 2 19:18:45.548000 audit[1459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bd9b8 items=0 ppid=1447 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356163623335653936323965373563353835623662353032623634 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.558000 audit: BPF prog-id=65 op=LOAD Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1433 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643030623330396638643764353366393933626465383966663035 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1433 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643030623330396638643764353366393933626465383966663035 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.559000 audit: BPF prog-id=66 op=LOAD Oct 2 19:18:45.559000 audit[1458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185890 items=0 ppid=1433 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643030623330396638643764353366393933626465383966663035 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.561000 audit: BPF prog-id=67 op=LOAD Oct 2 19:18:45.561000 audit[1458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001858d8 items=0 ppid=1433 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643030623330396638643764353366393933626465383966663035 Oct 2 19:18:45.561000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:18:45.562000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { perfmon } for pid=1458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit[1458]: AVC avc: denied { bpf } for pid=1458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:45.562000 audit: BPF prog-id=68 op=LOAD Oct 2 19:18:45.562000 audit[1458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185ce8 items=0 ppid=1433 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:45.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643030623330396638643764353366393933626465383966663035 Oct 2 19:18:45.582782 env[1054]: time="2023-10-02T19:18:45.582730337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-28wmb,Uid:a205d810-b1ff-4454-b8b9-c86750cc9006,Namespace:calico-system,Attempt:0,} returns sandbox id \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\"" Oct 2 19:18:45.584653 env[1054]: time="2023-10-02T19:18:45.584629630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:18:45.589369 env[1054]: time="2023-10-02T19:18:45.589335879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tzxhs,Uid:8f92141b-8c49-4247-b6f3-e0a300ac0438,Namespace:kube-system,Attempt:0,} returns sandbox id \"18d00b309f8d7d53f993bde89ff058354f270f23a239e939bdb6d140fba241b9\"" Oct 2 19:18:46.203594 kubelet[1374]: E1002 19:18:46.203531 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:47.047659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2647096262.mount: Deactivated successfully. Oct 2 19:18:47.204692 kubelet[1374]: E1002 19:18:47.204581 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:48.205155 kubelet[1374]: E1002 19:18:48.205084 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:48.265132 env[1054]: time="2023-10-02T19:18:48.265057613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.268919 env[1054]: time="2023-10-02T19:18:48.268849912Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.272446 env[1054]: time="2023-10-02T19:18:48.272418932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.277901 env[1054]: time="2023-10-02T19:18:48.277845598Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.282492 env[1054]: time="2023-10-02T19:18:48.282461652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:18:48.284526 env[1054]: time="2023-10-02T19:18:48.284502796Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:18:48.287705 env[1054]: time="2023-10-02T19:18:48.287678311Z" level=info msg="CreateContainer within sandbox \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:18:48.302345 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1623057805.mount: Deactivated successfully. Oct 2 19:18:48.306573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3476147574.mount: Deactivated successfully. Oct 2 19:18:48.319297 env[1054]: time="2023-10-02T19:18:48.319172446Z" level=info msg="CreateContainer within sandbox \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f\"" Oct 2 19:18:48.320271 env[1054]: time="2023-10-02T19:18:48.320237704Z" level=info msg="StartContainer for \"e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f\"" Oct 2 19:18:48.348115 systemd[1]: Started cri-containerd-e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f.scope. Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.380130 kernel: kauditd_printk_skb: 143 callbacks suppressed Oct 2 19:18:48.380238 kernel: audit: type=1400 audit(1696274328.377:586): avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1447 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.388334 kernel: audit: type=1300 audit(1696274328.377:586): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1447 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.393543 kernel: audit: type=1327 audit(1696274328.377:586): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643863366238393863313961313137316165646661333136323835 Oct 2 19:18:48.393616 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643863366238393863313961313137316165646661333136323835 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.397169 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.404088 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.404177 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.407573 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.412227 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.414677 kernel: audit: type=1400 audit(1696274328.377:587): avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.377000 audit: BPF prog-id=69 op=LOAD Oct 2 19:18:48.377000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ea3e0 items=0 ppid=1447 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643863366238393863313961313137316165646661333136323835 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.387000 audit: BPF prog-id=70 op=LOAD Oct 2 19:18:48.387000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ea428 items=0 ppid=1447 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643863366238393863313961313137316165646661333136323835 Oct 2 19:18:48.399000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:18:48.399000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:48.399000 audit: BPF prog-id=71 op=LOAD Oct 2 19:18:48.399000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea4b8 items=0 ppid=1447 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643863366238393863313961313137316165646661333136323835 Oct 2 19:18:48.445256 systemd[1]: cri-containerd-e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f.scope: Deactivated successfully. Oct 2 19:18:48.446000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:18:48.447672 env[1054]: time="2023-10-02T19:18:48.447617753Z" level=info msg="StartContainer for \"e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f\" returns successfully" Oct 2 19:18:48.588956 env[1054]: time="2023-10-02T19:18:48.584912761Z" level=info msg="shim disconnected" id=e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f Oct 2 19:18:48.588956 env[1054]: time="2023-10-02T19:18:48.587385568Z" level=warning msg="cleaning up after shim disconnected" id=e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f namespace=k8s.io Oct 2 19:18:48.588956 env[1054]: time="2023-10-02T19:18:48.587445621Z" level=info msg="cleaning up dead shim" Oct 2 19:18:48.611038 env[1054]: time="2023-10-02T19:18:48.610975868Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:18:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1556 runtime=io.containerd.runc.v2\n" Oct 2 19:18:49.205799 kubelet[1374]: E1002 19:18:49.205749 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:49.301356 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e7d8c6b898c19a1171aedfa31628522458190697fd9a40c186f2c8b33834e74f-rootfs.mount: Deactivated successfully. Oct 2 19:18:49.772789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount733136797.mount: Deactivated successfully. Oct 2 19:18:50.206254 kubelet[1374]: E1002 19:18:50.205904 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:50.599334 env[1054]: time="2023-10-02T19:18:50.598927346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:50.602685 env[1054]: time="2023-10-02T19:18:50.602549918Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:50.610655 env[1054]: time="2023-10-02T19:18:50.610577829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:50.614540 env[1054]: time="2023-10-02T19:18:50.614473384Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:50.615099 env[1054]: time="2023-10-02T19:18:50.615043156Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:18:50.618040 env[1054]: time="2023-10-02T19:18:50.618005155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:18:50.621685 env[1054]: time="2023-10-02T19:18:50.621619499Z" level=info msg="CreateContainer within sandbox \"18d00b309f8d7d53f993bde89ff058354f270f23a239e939bdb6d140fba241b9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:18:50.644159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount357323711.mount: Deactivated successfully. Oct 2 19:18:50.657141 env[1054]: time="2023-10-02T19:18:50.657098060Z" level=info msg="CreateContainer within sandbox \"18d00b309f8d7d53f993bde89ff058354f270f23a239e939bdb6d140fba241b9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c7ddb88feb0cd8d47a1dfafb3a5912c23fdd6e8b372c5f31b55a4883c3485ab2\"" Oct 2 19:18:50.657987 env[1054]: time="2023-10-02T19:18:50.657964489Z" level=info msg="StartContainer for \"c7ddb88feb0cd8d47a1dfafb3a5912c23fdd6e8b372c5f31b55a4883c3485ab2\"" Oct 2 19:18:50.693274 systemd[1]: Started cri-containerd-c7ddb88feb0cd8d47a1dfafb3a5912c23fdd6e8b372c5f31b55a4883c3485ab2.scope. Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1433 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646462383866656230636438643437613164666166623361353931 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.719000 audit: BPF prog-id=72 op=LOAD Oct 2 19:18:50.719000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a6310 items=0 ppid=1433 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646462383866656230636438643437613164666166623361353931 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.721000 audit: BPF prog-id=73 op=LOAD Oct 2 19:18:50.721000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a6358 items=0 ppid=1433 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646462383866656230636438643437613164666166623361353931 Oct 2 19:18:50.722000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:18:50.722000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:50.722000 audit: BPF prog-id=74 op=LOAD Oct 2 19:18:50.722000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a63e8 items=0 ppid=1433 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646462383866656230636438643437613164666166623361353931 Oct 2 19:18:50.747751 env[1054]: time="2023-10-02T19:18:50.747634264Z" level=info msg="StartContainer for \"c7ddb88feb0cd8d47a1dfafb3a5912c23fdd6e8b372c5f31b55a4883c3485ab2\" returns successfully" Oct 2 19:18:50.815000 audit[1630]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.815000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebd6f9480 a2=0 a3=7ffebd6f946c items=0 ppid=1593 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:18:50.816000 audit[1631]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:50.816000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd08abadc0 a2=0 a3=7ffd08abadac items=0 ppid=1593 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:18:50.817000 audit[1632]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.817000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff38940d20 a2=0 a3=7fff38940d0c items=0 ppid=1593 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:18:50.819000 audit[1633]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:50.819000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1da125e0 a2=0 a3=7ffe1da125cc items=0 ppid=1593 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:18:50.820000 audit[1634]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.820000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1074ee90 a2=0 a3=7ffd1074ee7c items=0 ppid=1593 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:18:50.821000 audit[1635]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:50.821000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff45bf6300 a2=0 a3=7fff45bf62ec items=0 ppid=1593 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:18:50.926000 audit[1637]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.926000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda4d98090 a2=0 a3=7ffda4d9807c items=0 ppid=1593 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:18:50.933000 audit[1639]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.933000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcd0266e40 a2=0 a3=7ffcd0266e2c items=0 ppid=1593 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:18:50.940000 audit[1642]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.940000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffa3118da0 a2=0 a3=7fffa3118d8c items=0 ppid=1593 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:18:50.943000 audit[1643]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.943000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff91c06c50 a2=0 a3=7fff91c06c3c items=0 ppid=1593 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:18:50.949000 audit[1645]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.949000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdeafedca0 a2=0 a3=7ffdeafedc8c items=0 ppid=1593 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:18:50.952000 audit[1646]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.952000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca39c9c30 a2=0 a3=7ffca39c9c1c items=0 ppid=1593 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:18:50.962000 audit[1648]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.962000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbb058220 a2=0 a3=7ffdbb05820c items=0 ppid=1593 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:18:50.970000 audit[1651]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.970000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd69d2e920 a2=0 a3=7ffd69d2e90c items=0 ppid=1593 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:18:50.974000 audit[1652]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.974000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb0bf9370 a2=0 a3=7fffb0bf935c items=0 ppid=1593 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:18:50.979000 audit[1654]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.979000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe316127a0 a2=0 a3=7ffe3161278c items=0 ppid=1593 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:18:50.982000 audit[1655]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.982000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8714dd90 a2=0 a3=7fff8714dd7c items=0 ppid=1593 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:18:50.988000 audit[1657]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.988000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed47861f0 a2=0 a3=7ffed47861dc items=0 ppid=1593 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:18:50.996000 audit[1660]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:50.996000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf5cf4f10 a2=0 a3=7ffdf5cf4efc items=0 ppid=1593 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:18:51.006000 audit[1663]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:51.006000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc3f24f10 a2=0 a3=7ffcc3f24efc items=0 ppid=1593 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:18:51.010000 audit[1664]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:51.010000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcdd805350 a2=0 a3=7ffcdd80533c items=0 ppid=1593 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:18:51.015000 audit[1666]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:51.015000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff33241840 a2=0 a3=7fff3324182c items=0 ppid=1593 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:18:51.072000 audit[1671]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:51.072000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb80482e0 a2=0 a3=7ffdb80482cc items=0 ppid=1593 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:18:51.078000 audit[1676]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:51.078000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc17f75d10 a2=0 a3=7ffc17f75cfc items=0 ppid=1593 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:18:51.081000 audit[1678]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:51.081000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc2ce26100 a2=0 a3=7ffc2ce260ec items=0 ppid=1593 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:18:51.098000 audit[1680]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:51.098000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc3e023710 a2=0 a3=7ffc3e0236fc items=0 ppid=1593 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:51.142000 audit[1680]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:51.142000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc3e023710 a2=0 a3=7ffc3e0236fc items=0 ppid=1593 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:51.158000 audit[1689]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.158000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe850c5560 a2=0 a3=7ffe850c554c items=0 ppid=1593 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:18:51.165000 audit[1691]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.165000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda76e5a50 a2=0 a3=7ffda76e5a3c items=0 ppid=1593 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:18:51.170000 audit[1694]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.170000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd44f93cf0 a2=0 a3=7ffd44f93cdc items=0 ppid=1593 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:18:51.173000 audit[1695]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.173000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf18db390 a2=0 a3=7ffdf18db37c items=0 ppid=1593 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:18:51.176000 audit[1697]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.176000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8dcaafa0 a2=0 a3=7fff8dcaaf8c items=0 ppid=1593 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:18:51.177000 audit[1698]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.177000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4dccd090 a2=0 a3=7ffc4dccd07c items=0 ppid=1593 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:18:51.180000 audit[1700]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.180000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc86a45f60 a2=0 a3=7ffc86a45f4c items=0 ppid=1593 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:18:51.183000 audit[1703]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.183000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffec2d79430 a2=0 a3=7ffec2d7941c items=0 ppid=1593 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:18:51.184000 audit[1704]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.184000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffac185130 a2=0 a3=7fffac18511c items=0 ppid=1593 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:18:51.186000 audit[1706]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.186000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd83627e50 a2=0 a3=7ffd83627e3c items=0 ppid=1593 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:18:51.187000 audit[1707]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.187000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3a4eeb40 a2=0 a3=7ffc3a4eeb2c items=0 ppid=1593 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:18:51.192000 audit[1709]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.192000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9cdf1ee0 a2=0 a3=7fff9cdf1ecc items=0 ppid=1593 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:18:51.198000 audit[1712]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.198000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd04d20670 a2=0 a3=7ffd04d2065c items=0 ppid=1593 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:18:51.201000 audit[1715]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.201000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc18ec49d0 a2=0 a3=7ffc18ec49bc items=0 ppid=1593 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:18:51.202000 audit[1716]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.202000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffface8b820 a2=0 a3=7ffface8b80c items=0 ppid=1593 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:18:51.204000 audit[1718]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.204000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7e282c10 a2=0 a3=7fff7e282bfc items=0 ppid=1593 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:18:51.206500 kubelet[1374]: E1002 19:18:51.206458 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:51.208000 audit[1721]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.208000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcce974b60 a2=0 a3=7ffcce974b4c items=0 ppid=1593 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:18:51.210000 audit[1722]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.210000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1c82e5d0 a2=0 a3=7ffd1c82e5bc items=0 ppid=1593 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:18:51.212000 audit[1724]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.212000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe12de74b0 a2=0 a3=7ffe12de749c items=0 ppid=1593 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:51.216000 audit[1727]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.216000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2d90a130 a2=0 a3=7ffd2d90a11c items=0 ppid=1593 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:51.217000 audit[1728]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.217000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd35f02640 a2=0 a3=7ffd35f0262c items=0 ppid=1593 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:18:51.219000 audit[1730]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:51.219000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc19dfa430 a2=0 a3=7ffc19dfa41c items=0 ppid=1593 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:18:51.222000 audit[1732]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:18:51.222000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffccb49a200 a2=0 a3=7ffccb49a1ec items=0 ppid=1593 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.222000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:51.223000 audit[1732]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:18:51.223000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffccb49a200 a2=0 a3=7ffccb49a1ec items=0 ppid=1593 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.223000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:51.641987 systemd[1]: run-containerd-runc-k8s.io-c7ddb88feb0cd8d47a1dfafb3a5912c23fdd6e8b372c5f31b55a4883c3485ab2-runc.ICsrVH.mount: Deactivated successfully. Oct 2 19:18:52.207105 kubelet[1374]: E1002 19:18:52.207032 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:52.239063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3565420318.mount: Deactivated successfully. Oct 2 19:18:53.207668 kubelet[1374]: E1002 19:18:53.207592 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:54.208180 kubelet[1374]: E1002 19:18:54.208109 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:55.208529 kubelet[1374]: E1002 19:18:55.208481 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:56.208982 kubelet[1374]: E1002 19:18:56.208915 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:56.654242 env[1054]: time="2023-10-02T19:18:56.654166548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.656751 env[1054]: time="2023-10-02T19:18:56.656721125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.659292 env[1054]: time="2023-10-02T19:18:56.659253022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.661991 env[1054]: time="2023-10-02T19:18:56.661956184Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.662904 env[1054]: time="2023-10-02T19:18:56.662873278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:18:56.665621 env[1054]: time="2023-10-02T19:18:56.665416880Z" level=info msg="CreateContainer within sandbox \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:18:56.682743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1404916643.mount: Deactivated successfully. Oct 2 19:18:56.705562 env[1054]: time="2023-10-02T19:18:56.705448176Z" level=info msg="CreateContainer within sandbox \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363\"" Oct 2 19:18:56.706931 env[1054]: time="2023-10-02T19:18:56.706842506Z" level=info msg="StartContainer for \"32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363\"" Oct 2 19:18:56.755830 systemd[1]: Started cri-containerd-32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363.scope. Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.783301 kernel: kauditd_printk_skb: 230 callbacks suppressed Oct 2 19:18:56.783522 kernel: audit: type=1400 audit(1696274336.780:650): avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1447 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.794762 kernel: audit: type=1300 audit(1696274336.780:650): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1447 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.795160 kernel: audit: type=1327 audit(1696274336.780:650): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623363383063643239356463656432353630646336343664643536 Oct 2 19:18:56.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623363383063643239356463656432353630646336343664643536 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.802875 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.803008 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.806389 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.813482 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.813593 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.826083 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.826290 kernel: audit: type=1400 audit(1696274336.780:651): avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit: BPF prog-id=75 op=LOAD Oct 2 19:18:56.780000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002886a0 items=0 ppid=1447 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623363383063643239356463656432353630646336343664643536 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit: BPF prog-id=76 op=LOAD Oct 2 19:18:56.780000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002886e8 items=0 ppid=1447 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623363383063643239356463656432353630646336343664643536 Oct 2 19:18:56.780000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:18:56.780000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit: BPF prog-id=77 op=LOAD Oct 2 19:18:56.780000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000288778 items=0 ppid=1447 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623363383063643239356463656432353630646336343664643536 Oct 2 19:18:56.851558 env[1054]: time="2023-10-02T19:18:56.851316233Z" level=info msg="StartContainer for \"32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363\" returns successfully" Oct 2 19:18:57.210174 kubelet[1374]: E1002 19:18:57.210089 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:57.567789 kubelet[1374]: I1002 19:18:57.567696 1374 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-tzxhs" podStartSLOduration=9.541272274 podCreationTimestamp="2023-10-02 19:18:43 +0000 UTC" firstStartedPulling="2023-10-02 19:18:45.590572183 +0000 UTC m=+3.927391998" lastFinishedPulling="2023-10-02 19:18:50.616901576 +0000 UTC m=+8.953721441" observedRunningTime="2023-10-02 19:18:51.473844666 +0000 UTC m=+9.810664531" watchObservedRunningTime="2023-10-02 19:18:57.567601717 +0000 UTC m=+15.904421582" Oct 2 19:18:57.678707 systemd[1]: run-containerd-runc-k8s.io-32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363-runc.rtP93F.mount: Deactivated successfully. Oct 2 19:18:58.211353 kubelet[1374]: E1002 19:18:58.211247 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:58.254850 env[1054]: time="2023-10-02T19:18:58.254708671Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:18:58.262457 systemd[1]: cri-containerd-32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363.scope: Deactivated successfully. Oct 2 19:18:58.264000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:18:58.307364 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363-rootfs.mount: Deactivated successfully. Oct 2 19:18:58.314316 kubelet[1374]: I1002 19:18:58.313404 1374 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:18:58.724316 kubelet[1374]: I1002 19:18:58.724176 1374 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:18:58.805899 kubelet[1374]: I1002 19:18:58.754189 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/213896e3-6980-4d51-96ce-e3d3e3cef28c-kubelet-dir\") pod \"csi-node-driver-8vfb9\" (UID: \"213896e3-6980-4d51-96ce-e3d3e3cef28c\") " pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:58.805899 kubelet[1374]: I1002 19:18:58.754325 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/213896e3-6980-4d51-96ce-e3d3e3cef28c-varrun\") pod \"csi-node-driver-8vfb9\" (UID: \"213896e3-6980-4d51-96ce-e3d3e3cef28c\") " pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:58.805899 kubelet[1374]: I1002 19:18:58.754391 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/213896e3-6980-4d51-96ce-e3d3e3cef28c-etccalico\") pod \"csi-node-driver-8vfb9\" (UID: \"213896e3-6980-4d51-96ce-e3d3e3cef28c\") " pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:58.805899 kubelet[1374]: I1002 19:18:58.754454 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/213896e3-6980-4d51-96ce-e3d3e3cef28c-registration-dir\") pod \"csi-node-driver-8vfb9\" (UID: \"213896e3-6980-4d51-96ce-e3d3e3cef28c\") " pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:58.805899 kubelet[1374]: I1002 19:18:58.754513 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/213896e3-6980-4d51-96ce-e3d3e3cef28c-socket-dir\") pod \"csi-node-driver-8vfb9\" (UID: \"213896e3-6980-4d51-96ce-e3d3e3cef28c\") " pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:58.741371 systemd[1]: Created slice kubepods-besteffort-pod213896e3_6980_4d51_96ce_e3d3e3cef28c.slice. Oct 2 19:18:58.806553 kubelet[1374]: I1002 19:18:58.754573 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fxm69\" (UniqueName: \"kubernetes.io/projected/213896e3-6980-4d51-96ce-e3d3e3cef28c-kube-api-access-fxm69\") pod \"csi-node-driver-8vfb9\" (UID: \"213896e3-6980-4d51-96ce-e3d3e3cef28c\") " pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:58.906027 env[1054]: time="2023-10-02T19:18:58.905919678Z" level=info msg="shim disconnected" id=32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363 Oct 2 19:18:58.906388 env[1054]: time="2023-10-02T19:18:58.906032402Z" level=warning msg="cleaning up after shim disconnected" id=32b3c80cd295dced2560dc646dd56d3202c6a45d2a860f7a8f2e1d9db3c9f363 namespace=k8s.io Oct 2 19:18:58.906388 env[1054]: time="2023-10-02T19:18:58.906060914Z" level=info msg="cleaning up dead shim" Oct 2 19:18:58.938449 env[1054]: time="2023-10-02T19:18:58.938349716Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:18:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1785 runtime=io.containerd.runc.v2\n" Oct 2 19:18:59.108496 env[1054]: time="2023-10-02T19:18:59.108403571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vfb9,Uid:213896e3-6980-4d51-96ce-e3d3e3cef28c,Namespace:calico-system,Attempt:0,}" Oct 2 19:18:59.211609 kubelet[1374]: E1002 19:18:59.211541 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:18:59.236469 env[1054]: time="2023-10-02T19:18:59.236353140Z" level=error msg="Failed to destroy network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:18:59.237913 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7-shm.mount: Deactivated successfully. Oct 2 19:18:59.239598 env[1054]: time="2023-10-02T19:18:59.239549156Z" level=error msg="encountered an error cleaning up failed sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:18:59.239789 env[1054]: time="2023-10-02T19:18:59.239743904Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vfb9,Uid:213896e3-6980-4d51-96ce-e3d3e3cef28c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:18:59.240679 kubelet[1374]: E1002 19:18:59.240323 1374 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:18:59.240679 kubelet[1374]: E1002 19:18:59.240386 1374 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:59.240679 kubelet[1374]: E1002 19:18:59.240412 1374 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8vfb9" Oct 2 19:18:59.240806 kubelet[1374]: E1002 19:18:59.240479 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8vfb9_calico-system(213896e3-6980-4d51-96ce-e3d3e3cef28c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8vfb9_calico-system(213896e3-6980-4d51-96ce-e3d3e3cef28c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8vfb9" podUID=213896e3-6980-4d51-96ce-e3d3e3cef28c Oct 2 19:18:59.475649 env[1054]: time="2023-10-02T19:18:59.475150699Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:18:59.476784 kubelet[1374]: I1002 19:18:59.475374 1374 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Oct 2 19:18:59.477038 env[1054]: time="2023-10-02T19:18:59.476980339Z" level=info msg="StopPodSandbox for \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\"" Oct 2 19:18:59.535870 env[1054]: time="2023-10-02T19:18:59.535786289Z" level=error msg="StopPodSandbox for \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\" failed" error="failed to destroy network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:18:59.536166 kubelet[1374]: E1002 19:18:59.536116 1374 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Oct 2 19:18:59.536327 kubelet[1374]: E1002 19:18:59.536191 1374 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7} Oct 2 19:18:59.536327 kubelet[1374]: E1002 19:18:59.536284 1374 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"213896e3-6980-4d51-96ce-e3d3e3cef28c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:18:59.536555 kubelet[1374]: E1002 19:18:59.536343 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"213896e3-6980-4d51-96ce-e3d3e3cef28c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8vfb9" podUID=213896e3-6980-4d51-96ce-e3d3e3cef28c Oct 2 19:19:00.212790 kubelet[1374]: E1002 19:19:00.212707 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:01.213490 kubelet[1374]: E1002 19:19:01.213382 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:01.791262 update_engine[1044]: I1002 19:19:01.791090 1044 update_attempter.cc:505] Updating boot flags... Oct 2 19:19:02.198450 kubelet[1374]: E1002 19:19:02.198349 1374 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:02.213780 kubelet[1374]: E1002 19:19:02.213725 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:02.548061 kubelet[1374]: I1002 19:19:02.547967 1374 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:02.558683 systemd[1]: Created slice kubepods-besteffort-pod325331c9_a0cf_497c_83c7_866344b4530d.slice. Oct 2 19:19:02.582655 kubelet[1374]: I1002 19:19:02.582608 1374 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zjgtf\" (UniqueName: \"kubernetes.io/projected/325331c9-a0cf-497c-83c7-866344b4530d-kube-api-access-zjgtf\") pod \"nginx-deployment-845c78c8b9-d42nc\" (UID: \"325331c9-a0cf-497c-83c7-866344b4530d\") " pod="default/nginx-deployment-845c78c8b9-d42nc" Oct 2 19:19:02.869898 env[1054]: time="2023-10-02T19:19:02.869764689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-d42nc,Uid:325331c9-a0cf-497c-83c7-866344b4530d,Namespace:default,Attempt:0,}" Oct 2 19:19:03.037151 env[1054]: time="2023-10-02T19:19:03.037101765Z" level=error msg="Failed to destroy network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:03.038723 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2-shm.mount: Deactivated successfully. Oct 2 19:19:03.039624 env[1054]: time="2023-10-02T19:19:03.039590288Z" level=error msg="encountered an error cleaning up failed sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:03.039736 env[1054]: time="2023-10-02T19:19:03.039706873Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-d42nc,Uid:325331c9-a0cf-497c-83c7-866344b4530d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:03.040053 kubelet[1374]: E1002 19:19:03.040025 1374 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:03.040112 kubelet[1374]: E1002 19:19:03.040093 1374 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-d42nc" Oct 2 19:19:03.040146 kubelet[1374]: E1002 19:19:03.040131 1374 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-d42nc" Oct 2 19:19:03.040258 kubelet[1374]: E1002 19:19:03.040201 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-d42nc_default(325331c9-a0cf-497c-83c7-866344b4530d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-d42nc_default(325331c9-a0cf-497c-83c7-866344b4530d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-d42nc" podUID=325331c9-a0cf-497c-83c7-866344b4530d Oct 2 19:19:03.214593 kubelet[1374]: E1002 19:19:03.214470 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:03.487752 kubelet[1374]: I1002 19:19:03.487654 1374 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Oct 2 19:19:03.489541 env[1054]: time="2023-10-02T19:19:03.489476234Z" level=info msg="StopPodSandbox for \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\"" Oct 2 19:19:03.576007 env[1054]: time="2023-10-02T19:19:03.575943501Z" level=error msg="StopPodSandbox for \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\" failed" error="failed to destroy network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:03.576225 kubelet[1374]: E1002 19:19:03.576183 1374 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Oct 2 19:19:03.576286 kubelet[1374]: E1002 19:19:03.576245 1374 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2} Oct 2 19:19:03.576332 kubelet[1374]: E1002 19:19:03.576295 1374 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"325331c9-a0cf-497c-83c7-866344b4530d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:19:03.576409 kubelet[1374]: E1002 19:19:03.576358 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"325331c9-a0cf-497c-83c7-866344b4530d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-d42nc" podUID=325331c9-a0cf-497c-83c7-866344b4530d Oct 2 19:19:04.215094 kubelet[1374]: E1002 19:19:04.214996 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:05.215905 kubelet[1374]: E1002 19:19:05.215830 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:06.025542 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2370086250.mount: Deactivated successfully. Oct 2 19:19:06.199457 env[1054]: time="2023-10-02T19:19:06.199166130Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:06.204149 env[1054]: time="2023-10-02T19:19:06.204080559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:06.209133 env[1054]: time="2023-10-02T19:19:06.209080686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:06.216502 env[1054]: time="2023-10-02T19:19:06.216416736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:06.217374 env[1054]: time="2023-10-02T19:19:06.217272406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:19:06.217841 kubelet[1374]: E1002 19:19:06.217775 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:06.225126 env[1054]: time="2023-10-02T19:19:06.225051984Z" level=info msg="CreateContainer within sandbox \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:19:06.264740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount424507842.mount: Deactivated successfully. Oct 2 19:19:06.281488 env[1054]: time="2023-10-02T19:19:06.281281555Z" level=info msg="CreateContainer within sandbox \"215acb35e9629e75c585b6b502b64733d2d4e7e02cbb57cd8365b9d32493caa1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1\"" Oct 2 19:19:06.283312 env[1054]: time="2023-10-02T19:19:06.283202650Z" level=info msg="StartContainer for \"100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1\"" Oct 2 19:19:06.337355 systemd[1]: Started cri-containerd-100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1.scope. Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.365920 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:19:06.365989 kernel: audit: type=1400 audit(1696274346.363:657): avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1447 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:06.374263 kernel: audit: type=1300 audit(1696274346.363:657): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1447 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:06.374304 kernel: audit: type=1327 audit(1696274346.363:657): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306138333430373331633837333532383366343239313534663931 Oct 2 19:19:06.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306138333430373331633837333532383366343239313534663931 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.382117 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.382176 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.388727 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.392032 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.399151 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.399198 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.403239 kernel: audit: type=1400 audit(1696274346.363:658): avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.363000 audit: BPF prog-id=78 op=LOAD Oct 2 19:19:06.363000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d7d90 items=0 ppid=1447 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:06.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306138333430373331633837333532383366343239313534663931 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.373000 audit: BPF prog-id=79 op=LOAD Oct 2 19:19:06.373000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d7dd8 items=0 ppid=1447 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:06.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306138333430373331633837333532383366343239313534663931 Oct 2 19:19:06.378000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:19:06.378000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:06.378000 audit: BPF prog-id=80 op=LOAD Oct 2 19:19:06.378000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d7e68 items=0 ppid=1447 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:06.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306138333430373331633837333532383366343239313534663931 Oct 2 19:19:06.422060 env[1054]: time="2023-10-02T19:19:06.422021386Z" level=info msg="StartContainer for \"100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1\" returns successfully" Oct 2 19:19:06.522507 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:19:06.522880 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:19:06.534909 kubelet[1374]: I1002 19:19:06.534659 1374 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-28wmb" podStartSLOduration=2.900960812 podCreationTimestamp="2023-10-02 19:18:43 +0000 UTC" firstStartedPulling="2023-10-02 19:18:45.584267805 +0000 UTC m=+3.921087620" lastFinishedPulling="2023-10-02 19:19:06.217897279 +0000 UTC m=+24.554717144" observedRunningTime="2023-10-02 19:19:06.532005108 +0000 UTC m=+24.868824923" watchObservedRunningTime="2023-10-02 19:19:06.534590336 +0000 UTC m=+24.871410151" Oct 2 19:19:07.218804 kubelet[1374]: E1002 19:19:07.218694 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:07.543291 systemd[1]: run-containerd-runc-k8s.io-100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1-runc.XsXv9I.mount: Deactivated successfully. Oct 2 19:19:08.219423 kubelet[1374]: E1002 19:19:08.219354 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:08.330000 audit[2068]: AVC avc: denied { write } for pid=2068 comm="tee" name="fd" dev="proc" ino=18335 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.332000 audit[2075]: AVC avc: denied { write } for pid=2075 comm="tee" name="fd" dev="proc" ino=18338 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.334000 audit[2079]: AVC avc: denied { write } for pid=2079 comm="tee" name="fd" dev="proc" ino=18971 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.330000 audit[2068]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdeba0097d a2=241 a3=1b6 items=1 ppid=2041 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.330000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:19:08.330000 audit: PATH item=0 name="/dev/fd/63" inode=18951 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.330000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.334000 audit[2077]: AVC avc: denied { write } for pid=2077 comm="tee" name="fd" dev="proc" ino=18975 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.332000 audit[2075]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4cec997b a2=241 a3=1b6 items=1 ppid=2047 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.334000 audit[2077]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff30a4297b a2=241 a3=1b6 items=1 ppid=2043 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.334000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:19:08.334000 audit: PATH item=0 name="/dev/fd/63" inode=18332 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.334000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.332000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:19:08.332000 audit: PATH item=0 name="/dev/fd/63" inode=18331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.332000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.336000 audit[2081]: AVC avc: denied { write } for pid=2081 comm="tee" name="fd" dev="proc" ino=18979 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.338000 audit[2083]: AVC avc: denied { write } for pid=2083 comm="tee" name="fd" dev="proc" ino=18983 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.338000 audit[2083]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2a45d96b a2=241 a3=1b6 items=1 ppid=2049 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.338000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:19:08.338000 audit: PATH item=0 name="/dev/fd/63" inode=18968 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.334000 audit[2079]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4405d97c a2=241 a3=1b6 items=1 ppid=2051 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.334000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:19:08.334000 audit: PATH item=0 name="/dev/fd/63" inode=18964 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.334000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.336000 audit[2081]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff183ad97b a2=241 a3=1b6 items=1 ppid=2044 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.336000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:19:08.336000 audit: PATH item=0 name="/dev/fd/63" inode=18965 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.336000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.338000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.346000 audit[2088]: AVC avc: denied { write } for pid=2088 comm="tee" name="fd" dev="proc" ino=18344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:08.346000 audit[2088]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0118796c a2=241 a3=1b6 items=1 ppid=2040 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.346000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:19:08.346000 audit: PATH item=0 name="/dev/fd/63" inode=18339 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:08.346000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:08.628277 kernel: Initializing XFRM netlink socket Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.752000 audit: BPF prog-id=81 op=LOAD Oct 2 19:19:08.752000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0bf0c550 a2=70 a3=7f1fbf81c000 items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.752000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.753000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit: BPF prog-id=82 op=LOAD Oct 2 19:19:08.753000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0bf0c550 a2=70 a3=6e items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.753000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe0bf0c500 a2=70 a3=470860 items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.753000 audit: BPF prog-id=83 op=LOAD Oct 2 19:19:08.753000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe0bf0c4e0 a2=70 a3=7ffe0bf0c550 items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.754000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:19:08.754000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.754000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0bf0c5c0 a2=70 a3=0 items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.754000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.754000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0bf0c5b0 a2=70 a3=0 items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.754000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.754000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe0bf0c5f0 a2=70 a3=fe00 items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.756000 audit: BPF prog-id=84 op=LOAD Oct 2 19:19:08.756000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe0bf0c510 a2=70 a3=ffffffff items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:08.761000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.761000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8a155760 a2=70 a3=ffff items=0 ppid=2053 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:19:08.762000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:08.762000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8a155630 a2=70 a3=3 items=0 ppid=2053 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:19:08.770000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:19:08.770000 audit[2180]: SYSCALL arch=c000003e syscall=233 success=yes exit=0 a0=12 a1=1 a2=13 a3=7fff1ad4c3ec items=0 ppid=958 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.770000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:19:08.851000 audit[2207]: NETFILTER_CFG table=mangle:65 family=2 entries=19 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:08.851000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdf04a4af0 a2=0 a3=7ffdf04a4adc items=0 ppid=2053 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.851000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:08.858000 audit[2209]: NETFILTER_CFG table=nat:66 family=2 entries=16 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:08.858000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd815f35c0 a2=0 a3=7ffd815f35ac items=0 ppid=2053 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.858000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:08.864000 audit[2206]: NETFILTER_CFG table=raw:67 family=2 entries=19 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:08.864000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff9ea993a0 a2=0 a3=0 items=0 ppid=2053 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.864000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:08.887000 audit[2212]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:08.887000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffedf765840 a2=0 a3=7ffedf76582c items=0 ppid=2053 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.887000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:09.221196 kubelet[1374]: E1002 19:19:09.220989 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:09.675481 systemd-networkd[964]: vxlan.calico: Link UP Oct 2 19:19:09.675512 systemd-networkd[964]: vxlan.calico: Gained carrier Oct 2 19:19:10.221492 kubelet[1374]: E1002 19:19:10.221386 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:11.222944 kubelet[1374]: E1002 19:19:11.222886 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:11.564560 systemd-networkd[964]: vxlan.calico: Gained IPv6LL Oct 2 19:19:12.224125 kubelet[1374]: E1002 19:19:12.224072 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:12.411551 env[1054]: time="2023-10-02T19:19:12.411460064Z" level=info msg="StopPodSandbox for \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\"" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.568 [INFO][2253] k8s.go 576: Cleaning up netns ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.573 [INFO][2253] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" iface="eth0" netns="/var/run/netns/cni-6128fbeb-da9e-4384-bc42-bf7c3a290162" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.576 [INFO][2253] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" iface="eth0" netns="/var/run/netns/cni-6128fbeb-da9e-4384-bc42-bf7c3a290162" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.577 [INFO][2253] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" iface="eth0" netns="/var/run/netns/cni-6128fbeb-da9e-4384-bc42-bf7c3a290162" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.577 [INFO][2253] k8s.go 583: Releasing IP address(es) ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.578 [INFO][2253] utils.go 196: Calico CNI releasing IP address ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.637 [INFO][2259] ipam_plugin.go 416: Releasing address using handleID ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" HandleID="k8s-pod-network.2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Workload="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.660337 env[1054]: time="2023-10-02T19:19:12Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:12.660337 env[1054]: time="2023-10-02T19:19:12Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.653 [WARNING][2259] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" HandleID="k8s-pod-network.2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Workload="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.653 [INFO][2259] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" HandleID="k8s-pod-network.2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Workload="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.660337 env[1054]: time="2023-10-02T19:19:12Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:12.660337 env[1054]: 2023-10-02 19:19:12.658 [INFO][2253] k8s.go 589: Teardown processing complete. ContainerID="2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7" Oct 2 19:19:12.663271 systemd[1]: run-netns-cni\x2d6128fbeb\x2dda9e\x2d4384\x2dbc42\x2dbf7c3a290162.mount: Deactivated successfully. Oct 2 19:19:12.664616 env[1054]: time="2023-10-02T19:19:12.664466858Z" level=info msg="TearDown network for sandbox \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\" successfully" Oct 2 19:19:12.664616 env[1054]: time="2023-10-02T19:19:12.664505156Z" level=info msg="StopPodSandbox for \"2568bca81852514fc3e5000a071cb175d3a32c538599eeb2f4e099a25a7989c7\" returns successfully" Oct 2 19:19:12.665152 env[1054]: time="2023-10-02T19:19:12.665122286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vfb9,Uid:213896e3-6980-4d51-96ce-e3d3e3cef28c,Namespace:calico-system,Attempt:1,}" Oct 2 19:19:12.964468 systemd-networkd[964]: caliece61770072: Link UP Oct 2 19:19:12.970497 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliece61770072: link becomes ready Oct 2 19:19:12.970645 systemd-networkd[964]: caliece61770072: Gained carrier Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.760 [INFO][2265] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.211-k8s-csi--node--driver--8vfb9-eth0 csi-node-driver- calico-system 213896e3-6980-4d51-96ce-e3d3e3cef28c 1069 0 2023-10-02 19:18:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.211 csi-node-driver-8vfb9 eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliece61770072 [] []}} ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.762 [INFO][2265] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.836 [INFO][2277] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" HandleID="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Workload="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.867 [INFO][2277] ipam_plugin.go 269: Auto assigning IP ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" HandleID="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Workload="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010d060), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.211", "pod":"csi-node-driver-8vfb9", "timestamp":"2023-10-02 19:19:12.836662216 +0000 UTC"}, Hostname:"172.24.4.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:12.994186 env[1054]: time="2023-10-02T19:19:12Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:12.994186 env[1054]: time="2023-10-02T19:19:12Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.868 [INFO][2277] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.211' Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.874 [INFO][2277] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.886 [INFO][2277] ipam.go 372: Looking up existing affinities for host host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.902 [INFO][2277] ipam.go 489: Trying affinity for 192.168.103.128/26 host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.908 [INFO][2277] ipam.go 155: Attempting to load block cidr=192.168.103.128/26 host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.914 [INFO][2277] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.103.128/26 host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.914 [INFO][2277] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.103.128/26 handle="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.918 [INFO][2277] ipam.go 1682: Creating new handle: k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020 Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.928 [INFO][2277] ipam.go 1203: Writing block in order to claim IPs block=192.168.103.128/26 handle="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.941 [INFO][2277] ipam.go 1216: Successfully claimed IPs: [192.168.103.129/26] block=192.168.103.128/26 handle="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.942 [INFO][2277] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.103.129/26] handle="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" host="172.24.4.211" Oct 2 19:19:12.994186 env[1054]: time="2023-10-02T19:19:12Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:12.994186 env[1054]: 2023-10-02 19:19:12.942 [INFO][2277] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.103.129/26] IPv6=[] ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" HandleID="k8s-pod-network.eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Workload="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.995772 env[1054]: 2023-10-02 19:19:12.948 [INFO][2265] k8s.go 383: Populated endpoint ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211-k8s-csi--node--driver--8vfb9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"213896e3-6980-4d51-96ce-e3d3e3cef28c", ResourceVersion:"1069", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 18, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.211", ContainerID:"", Pod:"csi-node-driver-8vfb9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.103.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliece61770072", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:12.995772 env[1054]: 2023-10-02 19:19:12.948 [INFO][2265] k8s.go 384: Calico CNI using IPs: [192.168.103.129/32] ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.995772 env[1054]: 2023-10-02 19:19:12.948 [INFO][2265] dataplane_linux.go 68: Setting the host side veth name to caliece61770072 ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.995772 env[1054]: 2023-10-02 19:19:12.951 [INFO][2265] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:12.995772 env[1054]: 2023-10-02 19:19:12.972 [INFO][2265] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211-k8s-csi--node--driver--8vfb9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"213896e3-6980-4d51-96ce-e3d3e3cef28c", ResourceVersion:"1069", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 18, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.211", ContainerID:"eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020", Pod:"csi-node-driver-8vfb9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.103.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliece61770072", MAC:"46:7d:90:df:1f:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:12.995772 env[1054]: 2023-10-02 19:19:12.991 [INFO][2265] k8s.go 489: Wrote updated endpoint to datastore ContainerID="eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020" Namespace="calico-system" Pod="csi-node-driver-8vfb9" WorkloadEndpoint="172.24.4.211-k8s-csi--node--driver--8vfb9-eth0" Oct 2 19:19:13.020199 env[1054]: time="2023-10-02T19:19:13.020119707Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:13.020199 env[1054]: time="2023-10-02T19:19:13.020166932Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:13.020476 env[1054]: time="2023-10-02T19:19:13.020180630Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:13.020630 env[1054]: time="2023-10-02T19:19:13.020581359Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020 pid=2311 runtime=io.containerd.runc.v2 Oct 2 19:19:13.039000 audit[2333]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:13.043138 kernel: kauditd_printk_skb: 153 callbacks suppressed Oct 2 19:19:13.043222 kernel: audit: type=1325 audit(1696274353.039:688): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:13.045739 systemd[1]: Started cri-containerd-eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020.scope. Oct 2 19:19:13.039000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc017d8110 a2=0 a3=7ffc017d80fc items=0 ppid=2053 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.052239 kernel: audit: type=1300 audit(1696274353.039:688): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc017d8110 a2=0 a3=7ffc017d80fc items=0 ppid=2053 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:13.056275 kernel: audit: type=1327 audit(1696274353.039:688): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.075380 kernel: audit: type=1400 audit(1696274353.066:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.075517 kernel: audit: type=1400 audit(1696274353.066:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.075546 kernel: audit: type=1400 audit(1696274353.066:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.086099 kernel: audit: type=1400 audit(1696274353.066:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.086179 kernel: audit: type=1400 audit(1696274353.066:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.093074 kernel: audit: type=1400 audit(1696274353.066:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.096626 kernel: audit: type=1400 audit(1696274353.066:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit: BPF prog-id=85 op=LOAD Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653937353865336630643738313936633334393435356638363961 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653937353865336630643738313936633334393435356638363961 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.067000 audit: BPF prog-id=86 op=LOAD Oct 2 19:19:13.067000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002186b0 items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653937353865336630643738313936633334393435356638363961 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.081000 audit: BPF prog-id=87 op=LOAD Oct 2 19:19:13.081000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002186f8 items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653937353865336630643738313936633334393435356638363961 Oct 2 19:19:13.088000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:19:13.088000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:13.088000 audit: BPF prog-id=88 op=LOAD Oct 2 19:19:13.088000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000218b08 items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:13.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653937353865336630643738313936633334393435356638363961 Oct 2 19:19:13.110479 env[1054]: time="2023-10-02T19:19:13.110431979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vfb9,Uid:213896e3-6980-4d51-96ce-e3d3e3cef28c,Namespace:calico-system,Attempt:1,} returns sandbox id \"eee9758e3f0d78196c349455f869aa5259ffe702da88710f85d6ba8911f59020\"" Oct 2 19:19:13.111924 env[1054]: time="2023-10-02T19:19:13.111903571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:19:13.226303 kubelet[1374]: E1002 19:19:13.226108 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:13.356126 env[1054]: time="2023-10-02T19:19:13.355975710Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:13.358264 env[1054]: time="2023-10-02T19:19:13.358120009Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:13.360194 kubelet[1374]: E1002 19:19:13.358684 1374 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:13.360194 kubelet[1374]: E1002 19:19:13.358819 1374 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:13.360506 kubelet[1374]: E1002 19:19:13.359875 1374 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fxm69,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-8vfb9_calico-system(213896e3-6980-4d51-96ce-e3d3e3cef28c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:13.362398 env[1054]: time="2023-10-02T19:19:13.362332044Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:19:13.613380 env[1054]: time="2023-10-02T19:19:13.613271869Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:13.615248 env[1054]: time="2023-10-02T19:19:13.615094438Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:13.615689 kubelet[1374]: E1002 19:19:13.615657 1374 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:13.615985 kubelet[1374]: E1002 19:19:13.615961 1374 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:13.616485 kubelet[1374]: E1002 19:19:13.616422 1374 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fxm69,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-8vfb9_calico-system(213896e3-6980-4d51-96ce-e3d3e3cef28c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:13.617091 kubelet[1374]: E1002 19:19:13.617034 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-8vfb9" podUID=213896e3-6980-4d51-96ce-e3d3e3cef28c Oct 2 19:19:14.226911 kubelet[1374]: E1002 19:19:14.226854 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:14.525637 kubelet[1374]: E1002 19:19:14.525397 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-8vfb9" podUID=213896e3-6980-4d51-96ce-e3d3e3cef28c Oct 2 19:19:14.814110 systemd[1]: run-containerd-runc-k8s.io-100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1-runc.4rmPIj.mount: Deactivated successfully. Oct 2 19:19:14.826503 systemd-networkd[964]: caliece61770072: Gained IPv6LL Oct 2 19:19:15.228099 kubelet[1374]: E1002 19:19:15.227924 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:16.229873 kubelet[1374]: E1002 19:19:16.229799 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:17.230903 kubelet[1374]: E1002 19:19:17.230791 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:18.231513 kubelet[1374]: E1002 19:19:18.231414 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:19.232478 kubelet[1374]: E1002 19:19:19.232413 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:19.410550 env[1054]: time="2023-10-02T19:19:19.410446455Z" level=info msg="StopPodSandbox for \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\"" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.521 [INFO][2394] k8s.go 576: Cleaning up netns ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.522 [INFO][2394] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" iface="eth0" netns="/var/run/netns/cni-ef864ad6-d989-3d79-4c4b-2607f964e933" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.522 [INFO][2394] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" iface="eth0" netns="/var/run/netns/cni-ef864ad6-d989-3d79-4c4b-2607f964e933" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.523 [INFO][2394] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" iface="eth0" netns="/var/run/netns/cni-ef864ad6-d989-3d79-4c4b-2607f964e933" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.523 [INFO][2394] k8s.go 583: Releasing IP address(es) ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.523 [INFO][2394] utils.go 196: Calico CNI releasing IP address ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.581 [INFO][2401] ipam_plugin.go 416: Releasing address using handleID ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" HandleID="k8s-pod-network.a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Workload="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.606849 env[1054]: time="2023-10-02T19:19:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:19.606849 env[1054]: time="2023-10-02T19:19:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.597 [WARNING][2401] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" HandleID="k8s-pod-network.a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Workload="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.597 [INFO][2401] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" HandleID="k8s-pod-network.a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Workload="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.606849 env[1054]: time="2023-10-02T19:19:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:19.606849 env[1054]: 2023-10-02 19:19:19.604 [INFO][2394] k8s.go 589: Teardown processing complete. ContainerID="a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2" Oct 2 19:19:19.611598 env[1054]: time="2023-10-02T19:19:19.611406401Z" level=info msg="TearDown network for sandbox \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\" successfully" Oct 2 19:19:19.611598 env[1054]: time="2023-10-02T19:19:19.611463214Z" level=info msg="StopPodSandbox for \"a5773962298356e60874e19066c9afdc2c5183de78192064dca3bac3a419b7f2\" returns successfully" Oct 2 19:19:19.611809 systemd[1]: run-netns-cni\x2def864ad6\x2dd989\x2d3d79\x2d4c4b\x2d2607f964e933.mount: Deactivated successfully. Oct 2 19:19:19.613712 env[1054]: time="2023-10-02T19:19:19.613618735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-d42nc,Uid:325331c9-a0cf-497c-83c7-866344b4530d,Namespace:default,Attempt:1,}" Oct 2 19:19:19.874051 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:19:19.874320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali481a0e20ab9: link becomes ready Oct 2 19:19:19.885025 systemd-networkd[964]: cali481a0e20ab9: Link UP Oct 2 19:19:19.885034 systemd-networkd[964]: cali481a0e20ab9: Gained carrier Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.716 [INFO][2407] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0 nginx-deployment-845c78c8b9- default 325331c9-a0cf-497c-83c7-866344b4530d 1110 0 2023-10-02 19:19:02 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.211 nginx-deployment-845c78c8b9-d42nc eth0 default [] [] [kns.default ksa.default.default] cali481a0e20ab9 [] []}} ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.717 [INFO][2407] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.773 [INFO][2419] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" HandleID="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Workload="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.797 [INFO][2419] ipam_plugin.go 269: Auto assigning IP ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" HandleID="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Workload="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d860), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.211", "pod":"nginx-deployment-845c78c8b9-d42nc", "timestamp":"2023-10-02 19:19:19.773055603 +0000 UTC"}, Hostname:"172.24.4.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:19.909923 env[1054]: time="2023-10-02T19:19:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:19.909923 env[1054]: time="2023-10-02T19:19:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.797 [INFO][2419] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.211' Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.802 [INFO][2419] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.812 [INFO][2419] ipam.go 372: Looking up existing affinities for host host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.824 [INFO][2419] ipam.go 489: Trying affinity for 192.168.103.128/26 host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.828 [INFO][2419] ipam.go 155: Attempting to load block cidr=192.168.103.128/26 host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.834 [INFO][2419] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.103.128/26 host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.834 [INFO][2419] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.103.128/26 handle="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.839 [INFO][2419] ipam.go 1682: Creating new handle: k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162 Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.849 [INFO][2419] ipam.go 1203: Writing block in order to claim IPs block=192.168.103.128/26 handle="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.862 [INFO][2419] ipam.go 1216: Successfully claimed IPs: [192.168.103.130/26] block=192.168.103.128/26 handle="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.862 [INFO][2419] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.103.130/26] handle="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" host="172.24.4.211" Oct 2 19:19:19.909923 env[1054]: time="2023-10-02T19:19:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:19.909923 env[1054]: 2023-10-02 19:19:19.862 [INFO][2419] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.103.130/26] IPv6=[] ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" HandleID="k8s-pod-network.083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Workload="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.910935 env[1054]: 2023-10-02 19:19:19.866 [INFO][2407] k8s.go 383: Populated endpoint ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"325331c9-a0cf-497c-83c7-866344b4530d", ResourceVersion:"1110", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.211", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-d42nc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.103.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali481a0e20ab9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:19.910935 env[1054]: 2023-10-02 19:19:19.866 [INFO][2407] k8s.go 384: Calico CNI using IPs: [192.168.103.130/32] ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.910935 env[1054]: 2023-10-02 19:19:19.866 [INFO][2407] dataplane_linux.go 68: Setting the host side veth name to cali481a0e20ab9 ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.910935 env[1054]: 2023-10-02 19:19:19.874 [INFO][2407] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.910935 env[1054]: 2023-10-02 19:19:19.885 [INFO][2407] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"325331c9-a0cf-497c-83c7-866344b4530d", ResourceVersion:"1110", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.211", ContainerID:"083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162", Pod:"nginx-deployment-845c78c8b9-d42nc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.103.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali481a0e20ab9", MAC:"8a:d9:87:70:4f:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:19.910935 env[1054]: 2023-10-02 19:19:19.902 [INFO][2407] k8s.go 489: Wrote updated endpoint to datastore ContainerID="083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162" Namespace="default" Pod="nginx-deployment-845c78c8b9-d42nc" WorkloadEndpoint="172.24.4.211-k8s-nginx--deployment--845c78c8b9--d42nc-eth0" Oct 2 19:19:19.936000 audit[2440]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:19.940807 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 2 19:19:19.940938 kernel: audit: type=1325 audit(1696274359.936:707): table=filter:70 family=2 entries=40 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:19.936000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffca727fac0 a2=0 a3=7ffca727faac items=0 ppid=2053 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.957904 kernel: audit: type=1300 audit(1696274359.936:707): arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffca727fac0 a2=0 a3=7ffca727faac items=0 ppid=2053 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.958091 kernel: audit: type=1327 audit(1696274359.936:707): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:19.936000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:19.963799 env[1054]: time="2023-10-02T19:19:19.963654705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:19.963799 env[1054]: time="2023-10-02T19:19:19.963745104Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:19.964095 env[1054]: time="2023-10-02T19:19:19.963786677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:19.964316 env[1054]: time="2023-10-02T19:19:19.964115452Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162 pid=2448 runtime=io.containerd.runc.v2 Oct 2 19:19:19.989520 systemd[1]: Started cri-containerd-083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162.scope. Oct 2 19:19:20.008800 kernel: audit: type=1400 audit(1696274360.000:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.008892 kernel: audit: type=1400 audit(1696274360.000:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.012597 kernel: audit: type=1400 audit(1696274360.000:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.012669 kernel: audit: type=1400 audit(1696274360.000:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.023244 kernel: audit: type=1400 audit(1696274360.000:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.034229 kernel: audit: type=1400 audit(1696274360.000:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.034290 kernel: audit: type=1400 audit(1696274360.000:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.012000 audit: BPF prog-id=89 op=LOAD Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336436373837393363323137343734393934393330636638383630 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336436373837393363323137343734393934393330636638383630 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.016000 audit: BPF prog-id=90 op=LOAD Oct 2 19:19:20.016000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000098350 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336436373837393363323137343734393934393330636638383630 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit: BPF prog-id=91 op=LOAD Oct 2 19:19:20.017000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000098398 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336436373837393363323137343734393934393330636638383630 Oct 2 19:19:20.017000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:19:20.017000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:20.017000 audit: BPF prog-id=92 op=LOAD Oct 2 19:19:20.017000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000987a8 items=0 ppid=2448 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038336436373837393363323137343734393934393330636638383630 Oct 2 19:19:20.060144 env[1054]: time="2023-10-02T19:19:20.060099079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-d42nc,Uid:325331c9-a0cf-497c-83c7-866344b4530d,Namespace:default,Attempt:1,} returns sandbox id \"083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162\"" Oct 2 19:19:20.062085 env[1054]: time="2023-10-02T19:19:20.062049023Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:19:20.233246 kubelet[1374]: E1002 19:19:20.233080 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:20.610084 systemd[1]: run-containerd-runc-k8s.io-083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162-runc.InBBZi.mount: Deactivated successfully. Oct 2 19:19:21.095654 systemd-networkd[964]: cali481a0e20ab9: Gained IPv6LL Oct 2 19:19:21.233750 kubelet[1374]: E1002 19:19:21.233686 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:22.198164 kubelet[1374]: E1002 19:19:22.198122 1374 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:22.234701 kubelet[1374]: E1002 19:19:22.234672 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:23.236230 kubelet[1374]: E1002 19:19:23.236008 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:24.236400 kubelet[1374]: E1002 19:19:24.236295 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:24.841748 systemd[1]: run-containerd-runc-k8s.io-100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1-runc.zy2Xoc.mount: Deactivated successfully. Oct 2 19:19:25.176692 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3302527265.mount: Deactivated successfully. Oct 2 19:19:25.237122 kubelet[1374]: E1002 19:19:25.237040 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:26.237557 kubelet[1374]: E1002 19:19:26.237406 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:26.567030 env[1054]: time="2023-10-02T19:19:26.566977807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.570460 env[1054]: time="2023-10-02T19:19:26.570436817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.572993 env[1054]: time="2023-10-02T19:19:26.572973482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.576954 env[1054]: time="2023-10-02T19:19:26.576933969Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.577498 env[1054]: time="2023-10-02T19:19:26.577477650Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:19:26.580455 env[1054]: time="2023-10-02T19:19:26.580432327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:19:26.581786 env[1054]: time="2023-10-02T19:19:26.581762687Z" level=info msg="CreateContainer within sandbox \"083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:19:26.598132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3728614013.mount: Deactivated successfully. Oct 2 19:19:26.608394 env[1054]: time="2023-10-02T19:19:26.608357168Z" level=info msg="CreateContainer within sandbox \"083d678793c217474994930cf886098d0cdc6b61f6463c7119a77cff01982162\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f1381891518063fd0274d924da60058cd09610ba7c7326496041c3ba0be13119\"" Oct 2 19:19:26.609581 env[1054]: time="2023-10-02T19:19:26.609553614Z" level=info msg="StartContainer for \"f1381891518063fd0274d924da60058cd09610ba7c7326496041c3ba0be13119\"" Oct 2 19:19:26.650873 systemd[1]: Started cri-containerd-f1381891518063fd0274d924da60058cd09610ba7c7326496041c3ba0be13119.scope. Oct 2 19:19:26.682687 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 2 19:19:26.682812 kernel: audit: type=1400 audit(1696274366.668:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.682842 kernel: audit: type=1400 audit(1696274366.668:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.682865 kernel: audit: type=1400 audit(1696274366.668:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.682886 kernel: audit: type=1400 audit(1696274366.668:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.689887 kernel: audit: type=1400 audit(1696274366.668:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.689936 kernel: audit: type=1400 audit(1696274366.668:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.689966 kernel: audit: type=1400 audit(1696274366.668:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.696554 kernel: audit: type=1400 audit(1696274366.668:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.696629 kernel: audit: type=1400 audit(1696274366.668:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.704297 kernel: audit: type=1400 audit(1696274366.668:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.668000 audit: BPF prog-id=93 op=LOAD Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2448 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333831383931353138303633666430323734643932346461363030 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2448 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333831383931353138303633666430323734643932346461363030 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.675000 audit: BPF prog-id=94 op=LOAD Oct 2 19:19:26.675000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00028ba80 items=0 ppid=2448 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333831383931353138303633666430323734643932346461363030 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.678000 audit: BPF prog-id=95 op=LOAD Oct 2 19:19:26.678000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00028bac8 items=0 ppid=2448 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333831383931353138303633666430323734643932346461363030 Oct 2 19:19:26.681000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:19:26.681000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.681000 audit: BPF prog-id=96 op=LOAD Oct 2 19:19:26.681000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00028bed8 items=0 ppid=2448 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333831383931353138303633666430323734643932346461363030 Oct 2 19:19:26.720800 env[1054]: time="2023-10-02T19:19:26.720751198Z" level=info msg="StartContainer for \"f1381891518063fd0274d924da60058cd09610ba7c7326496041c3ba0be13119\" returns successfully" Oct 2 19:19:26.822049 env[1054]: time="2023-10-02T19:19:26.821833837Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:26.825559 env[1054]: time="2023-10-02T19:19:26.825472832Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:26.826365 kubelet[1374]: E1002 19:19:26.826141 1374 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:26.826365 kubelet[1374]: E1002 19:19:26.826278 1374 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:26.826630 kubelet[1374]: E1002 19:19:26.826501 1374 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fxm69,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-8vfb9_calico-system(213896e3-6980-4d51-96ce-e3d3e3cef28c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:26.829179 env[1054]: time="2023-10-02T19:19:26.829125333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:19:27.083330 env[1054]: time="2023-10-02T19:19:27.083010220Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:27.085903 env[1054]: time="2023-10-02T19:19:27.085768754Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:27.086420 kubelet[1374]: E1002 19:19:27.086370 1374 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:27.086656 kubelet[1374]: E1002 19:19:27.086631 1374 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:27.087011 kubelet[1374]: E1002 19:19:27.086980 1374 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fxm69,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-8vfb9_calico-system(213896e3-6980-4d51-96ce-e3d3e3cef28c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:27.087549 kubelet[1374]: E1002 19:19:27.087517 1374 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-8vfb9" podUID=213896e3-6980-4d51-96ce-e3d3e3cef28c Oct 2 19:19:27.238715 kubelet[1374]: E1002 19:19:27.238642 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:27.572032 kubelet[1374]: I1002 19:19:27.571983 1374 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-d42nc" podStartSLOduration=19.054452599 podCreationTimestamp="2023-10-02 19:19:02 +0000 UTC" firstStartedPulling="2023-10-02 19:19:20.061475644 +0000 UTC m=+38.398295459" lastFinishedPulling="2023-10-02 19:19:26.578931983 +0000 UTC m=+44.915751848" observedRunningTime="2023-10-02 19:19:27.571369357 +0000 UTC m=+45.908189222" watchObservedRunningTime="2023-10-02 19:19:27.571908988 +0000 UTC m=+45.908728853" Oct 2 19:19:28.240020 kubelet[1374]: E1002 19:19:28.239919 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:29.240395 kubelet[1374]: E1002 19:19:29.240339 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:30.241407 kubelet[1374]: E1002 19:19:30.241347 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:31.241690 kubelet[1374]: E1002 19:19:31.241586 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:32.242749 kubelet[1374]: E1002 19:19:32.242700 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:33.244098 kubelet[1374]: E1002 19:19:33.244041 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:34.245994 kubelet[1374]: E1002 19:19:34.245878 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:34.819808 systemd[1]: run-containerd-runc-k8s.io-100a8340731c8735283f429154f9152edf75e9bb243592b22af3ea644649e4f1-runc.5YMMMa.mount: Deactivated successfully. Oct 2 19:19:35.246658 kubelet[1374]: E1002 19:19:35.246483 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:19:36.248658 kubelet[1374]: E1002 19:19:36.248588 1374 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"