Oct 2 19:32:16.793596 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:32:16.793616 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:32:16.793626 kernel: BIOS-provided physical RAM map: Oct 2 19:32:16.793632 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:32:16.793637 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:32:16.793642 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:32:16.793649 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Oct 2 19:32:16.793655 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Oct 2 19:32:16.793661 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 2 19:32:16.793667 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:32:16.793672 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Oct 2 19:32:16.793678 kernel: NX (Execute Disable) protection: active Oct 2 19:32:16.793683 kernel: SMBIOS 2.8 present. Oct 2 19:32:16.793689 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Oct 2 19:32:16.793697 kernel: Hypervisor detected: KVM Oct 2 19:32:16.793703 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:32:16.793709 kernel: kvm-clock: cpu 0, msr 26f8a001, primary cpu clock Oct 2 19:32:16.793714 kernel: kvm-clock: using sched offset of 2140737096 cycles Oct 2 19:32:16.793721 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:32:16.793727 kernel: tsc: Detected 2794.748 MHz processor Oct 2 19:32:16.793733 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:32:16.793739 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:32:16.793745 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Oct 2 19:32:16.793753 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:32:16.793759 kernel: Using GB pages for direct mapping Oct 2 19:32:16.793765 kernel: ACPI: Early table checksum verification disabled Oct 2 19:32:16.794249 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Oct 2 19:32:16.794686 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:32:16.794694 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:32:16.794700 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:32:16.794706 kernel: ACPI: FACS 0x000000009CFE0000 000040 Oct 2 19:32:16.794712 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:32:16.794720 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:32:16.794727 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:32:16.794733 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Oct 2 19:32:16.794739 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Oct 2 19:32:16.794745 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Oct 2 19:32:16.794750 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Oct 2 19:32:16.794757 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Oct 2 19:32:16.794763 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Oct 2 19:32:16.794784 kernel: No NUMA configuration found Oct 2 19:32:16.794791 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Oct 2 19:32:16.794797 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Oct 2 19:32:16.794804 kernel: Zone ranges: Oct 2 19:32:16.794810 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:32:16.794817 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Oct 2 19:32:16.794825 kernel: Normal empty Oct 2 19:32:16.794831 kernel: Movable zone start for each node Oct 2 19:32:16.794837 kernel: Early memory node ranges Oct 2 19:32:16.794844 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:32:16.794850 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Oct 2 19:32:16.794856 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Oct 2 19:32:16.794863 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:32:16.794869 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:32:16.794875 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Oct 2 19:32:16.794883 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 2 19:32:16.794889 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:32:16.794896 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:32:16.794902 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:32:16.794909 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:32:16.794915 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:32:16.794921 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:32:16.794928 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:32:16.794934 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:32:16.794942 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:32:16.794948 kernel: TSC deadline timer available Oct 2 19:32:16.794954 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Oct 2 19:32:16.794961 kernel: kvm-guest: KVM setup pv remote TLB flush Oct 2 19:32:16.794967 kernel: kvm-guest: setup PV sched yield Oct 2 19:32:16.794973 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Oct 2 19:32:16.794980 kernel: Booting paravirtualized kernel on KVM Oct 2 19:32:16.794986 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:32:16.794993 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Oct 2 19:32:16.795001 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Oct 2 19:32:16.795007 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Oct 2 19:32:16.795013 kernel: pcpu-alloc: [0] 0 1 2 3 Oct 2 19:32:16.795020 kernel: kvm-guest: setup async PF for cpu 0 Oct 2 19:32:16.795026 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Oct 2 19:32:16.795055 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:32:16.795065 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:32:16.795072 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Oct 2 19:32:16.795078 kernel: Policy zone: DMA32 Oct 2 19:32:16.795086 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:32:16.795098 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:32:16.795105 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:32:16.795111 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:32:16.795118 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:32:16.795125 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 132728K reserved, 0K cma-reserved) Oct 2 19:32:16.795131 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 2 19:32:16.795138 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:32:16.795144 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:32:16.795152 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:32:16.795159 kernel: rcu: RCU event tracing is enabled. Oct 2 19:32:16.795166 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 2 19:32:16.795172 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:32:16.795179 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:32:16.795185 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:32:16.795192 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 2 19:32:16.795198 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Oct 2 19:32:16.795205 kernel: random: crng init done Oct 2 19:32:16.795212 kernel: Console: colour VGA+ 80x25 Oct 2 19:32:16.795219 kernel: printk: console [ttyS0] enabled Oct 2 19:32:16.795225 kernel: ACPI: Core revision 20210730 Oct 2 19:32:16.795232 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Oct 2 19:32:16.795238 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:32:16.795245 kernel: x2apic enabled Oct 2 19:32:16.795251 kernel: Switched APIC routing to physical x2apic. Oct 2 19:32:16.795257 kernel: kvm-guest: setup PV IPIs Oct 2 19:32:16.795264 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:32:16.795271 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 2 19:32:16.795278 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Oct 2 19:32:16.795284 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 2 19:32:16.795291 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 2 19:32:16.795297 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 2 19:32:16.795304 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:32:16.795310 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:32:16.795317 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:32:16.795323 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:32:16.795336 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 2 19:32:16.795342 kernel: RETBleed: Mitigation: untrained return thunk Oct 2 19:32:16.795349 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:32:16.795357 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:32:16.795364 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:32:16.795371 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:32:16.795378 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:32:16.795384 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:32:16.795391 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:32:16.795399 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:32:16.795406 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:32:16.795413 kernel: LSM: Security Framework initializing Oct 2 19:32:16.795419 kernel: SELinux: Initializing. Oct 2 19:32:16.795426 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:32:16.795433 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:32:16.795440 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 2 19:32:16.795448 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 2 19:32:16.795455 kernel: ... version: 0 Oct 2 19:32:16.795461 kernel: ... bit width: 48 Oct 2 19:32:16.795468 kernel: ... generic registers: 6 Oct 2 19:32:16.795475 kernel: ... value mask: 0000ffffffffffff Oct 2 19:32:16.795481 kernel: ... max period: 00007fffffffffff Oct 2 19:32:16.795488 kernel: ... fixed-purpose events: 0 Oct 2 19:32:16.795495 kernel: ... event mask: 000000000000003f Oct 2 19:32:16.795501 kernel: signal: max sigframe size: 1776 Oct 2 19:32:16.795509 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:32:16.795516 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:32:16.795523 kernel: x86: Booting SMP configuration: Oct 2 19:32:16.795529 kernel: .... node #0, CPUs: #1 Oct 2 19:32:16.795536 kernel: kvm-clock: cpu 1, msr 26f8a041, secondary cpu clock Oct 2 19:32:16.795543 kernel: kvm-guest: setup async PF for cpu 1 Oct 2 19:32:16.795551 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Oct 2 19:32:16.795559 kernel: #2 Oct 2 19:32:16.795569 kernel: kvm-clock: cpu 2, msr 26f8a081, secondary cpu clock Oct 2 19:32:16.795578 kernel: kvm-guest: setup async PF for cpu 2 Oct 2 19:32:16.795588 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Oct 2 19:32:16.795597 kernel: #3 Oct 2 19:32:16.795603 kernel: kvm-clock: cpu 3, msr 26f8a0c1, secondary cpu clock Oct 2 19:32:16.795610 kernel: kvm-guest: setup async PF for cpu 3 Oct 2 19:32:16.795617 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Oct 2 19:32:16.795623 kernel: smp: Brought up 1 node, 4 CPUs Oct 2 19:32:16.795630 kernel: smpboot: Max logical packages: 1 Oct 2 19:32:16.795637 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Oct 2 19:32:16.795643 kernel: devtmpfs: initialized Oct 2 19:32:16.795651 kernel: x86/mm: Memory block size: 128MB Oct 2 19:32:16.795658 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:32:16.795665 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 2 19:32:16.795672 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:32:16.795679 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:32:16.795686 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:32:16.795692 kernel: audit: type=2000 audit(1696275136.629:1): state=initialized audit_enabled=0 res=1 Oct 2 19:32:16.795699 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:32:16.795706 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:32:16.795714 kernel: cpuidle: using governor menu Oct 2 19:32:16.795720 kernel: ACPI: bus type PCI registered Oct 2 19:32:16.795727 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:32:16.795734 kernel: dca service started, version 1.12.1 Oct 2 19:32:16.795740 kernel: PCI: Using configuration type 1 for base access Oct 2 19:32:16.795747 kernel: PCI: Using configuration type 1 for extended access Oct 2 19:32:16.795754 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:32:16.795761 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:32:16.795768 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:32:16.795785 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:32:16.795792 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:32:16.795799 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:32:16.795806 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:32:16.795813 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:32:16.795820 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:32:16.795826 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:32:16.795833 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:32:16.795840 kernel: ACPI: Interpreter enabled Oct 2 19:32:16.795847 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:32:16.795854 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:32:16.795861 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:32:16.795868 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 2 19:32:16.795875 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:32:16.795988 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:32:16.796000 kernel: acpiphp: Slot [3] registered Oct 2 19:32:16.796007 kernel: acpiphp: Slot [4] registered Oct 2 19:32:16.796015 kernel: acpiphp: Slot [5] registered Oct 2 19:32:16.796022 kernel: acpiphp: Slot [6] registered Oct 2 19:32:16.796028 kernel: acpiphp: Slot [7] registered Oct 2 19:32:16.796041 kernel: acpiphp: Slot [8] registered Oct 2 19:32:16.796048 kernel: acpiphp: Slot [9] registered Oct 2 19:32:16.796054 kernel: acpiphp: Slot [10] registered Oct 2 19:32:16.796061 kernel: acpiphp: Slot [11] registered Oct 2 19:32:16.796068 kernel: acpiphp: Slot [12] registered Oct 2 19:32:16.796075 kernel: acpiphp: Slot [13] registered Oct 2 19:32:16.796081 kernel: acpiphp: Slot [14] registered Oct 2 19:32:16.796090 kernel: acpiphp: Slot [15] registered Oct 2 19:32:16.796096 kernel: acpiphp: Slot [16] registered Oct 2 19:32:16.796103 kernel: acpiphp: Slot [17] registered Oct 2 19:32:16.796110 kernel: acpiphp: Slot [18] registered Oct 2 19:32:16.796116 kernel: acpiphp: Slot [19] registered Oct 2 19:32:16.796123 kernel: acpiphp: Slot [20] registered Oct 2 19:32:16.796130 kernel: acpiphp: Slot [21] registered Oct 2 19:32:16.796136 kernel: acpiphp: Slot [22] registered Oct 2 19:32:16.796143 kernel: acpiphp: Slot [23] registered Oct 2 19:32:16.796151 kernel: acpiphp: Slot [24] registered Oct 2 19:32:16.796157 kernel: acpiphp: Slot [25] registered Oct 2 19:32:16.796164 kernel: acpiphp: Slot [26] registered Oct 2 19:32:16.796171 kernel: acpiphp: Slot [27] registered Oct 2 19:32:16.796177 kernel: acpiphp: Slot [28] registered Oct 2 19:32:16.796184 kernel: acpiphp: Slot [29] registered Oct 2 19:32:16.796191 kernel: acpiphp: Slot [30] registered Oct 2 19:32:16.796197 kernel: acpiphp: Slot [31] registered Oct 2 19:32:16.796204 kernel: PCI host bridge to bus 0000:00 Oct 2 19:32:16.796280 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:32:16.796344 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:32:16.796403 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:32:16.796478 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Oct 2 19:32:16.796536 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Oct 2 19:32:16.796611 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:32:16.796724 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:32:16.796857 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:32:16.796956 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 2 19:32:16.797025 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Oct 2 19:32:16.797119 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:32:16.797202 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:32:16.797282 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:32:16.797353 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:32:16.797440 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:32:16.797521 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 2 19:32:16.797605 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 2 19:32:16.797704 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Oct 2 19:32:16.797809 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Oct 2 19:32:16.797908 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Oct 2 19:32:16.798020 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Oct 2 19:32:16.798147 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:32:16.798245 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:32:16.798334 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:32:16.798433 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Oct 2 19:32:16.798514 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Oct 2 19:32:16.798587 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 2 19:32:16.798657 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 2 19:32:16.798723 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Oct 2 19:32:16.798802 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Oct 2 19:32:16.798874 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:32:16.798941 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Oct 2 19:32:16.799006 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Oct 2 19:32:16.799086 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Oct 2 19:32:16.799169 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Oct 2 19:32:16.799179 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:32:16.799186 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:32:16.799193 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:32:16.799200 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:32:16.799207 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:32:16.799213 kernel: iommu: Default domain type: Translated Oct 2 19:32:16.799220 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:32:16.799286 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 2 19:32:16.799354 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:32:16.799420 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 2 19:32:16.799428 kernel: vgaarb: loaded Oct 2 19:32:16.799435 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:32:16.799442 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:32:16.799449 kernel: PTP clock support registered Oct 2 19:32:16.799456 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:32:16.799463 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:32:16.799472 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:32:16.799478 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Oct 2 19:32:16.799485 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Oct 2 19:32:16.799492 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Oct 2 19:32:16.799499 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:32:16.799506 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:32:16.799513 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:32:16.799520 kernel: pnp: PnP ACPI init Oct 2 19:32:16.799614 kernel: pnp 00:02: [dma 2] Oct 2 19:32:16.799628 kernel: pnp: PnP ACPI: found 6 devices Oct 2 19:32:16.799635 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:32:16.799642 kernel: NET: Registered PF_INET protocol family Oct 2 19:32:16.799648 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:32:16.799655 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 19:32:16.799662 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:32:16.799670 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:32:16.799678 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 19:32:16.799687 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 19:32:16.799695 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:32:16.799703 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:32:16.799710 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:32:16.799717 kernel: NET: Registered PF_XDP protocol family Oct 2 19:32:16.799855 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:32:16.799926 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:32:16.799985 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:32:16.800050 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Oct 2 19:32:16.800114 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Oct 2 19:32:16.800182 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 2 19:32:16.800249 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:32:16.800315 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:32:16.800323 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:32:16.800330 kernel: Initialise system trusted keyrings Oct 2 19:32:16.800337 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 19:32:16.800344 kernel: Key type asymmetric registered Oct 2 19:32:16.800353 kernel: Asymmetric key parser 'x509' registered Oct 2 19:32:16.800360 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:32:16.800366 kernel: io scheduler mq-deadline registered Oct 2 19:32:16.800373 kernel: io scheduler kyber registered Oct 2 19:32:16.800380 kernel: io scheduler bfq registered Oct 2 19:32:16.800387 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:32:16.800394 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:32:16.800401 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:32:16.800408 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:32:16.800415 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:32:16.800422 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:32:16.800429 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:32:16.800436 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:32:16.800443 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:32:16.800450 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:32:16.800518 kernel: rtc_cmos 00:05: RTC can wake from S4 Oct 2 19:32:16.800579 kernel: rtc_cmos 00:05: registered as rtc0 Oct 2 19:32:16.800645 kernel: rtc_cmos 00:05: setting system clock to 2023-10-02T19:32:16 UTC (1696275136) Oct 2 19:32:16.800705 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Oct 2 19:32:16.800713 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:32:16.800721 kernel: Segment Routing with IPv6 Oct 2 19:32:16.800727 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:32:16.800734 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:32:16.800741 kernel: Key type dns_resolver registered Oct 2 19:32:16.800748 kernel: IPI shorthand broadcast: enabled Oct 2 19:32:16.800754 kernel: sched_clock: Marking stable (457075931, 73693582)->(540151927, -9382414) Oct 2 19:32:16.800763 kernel: registered taskstats version 1 Oct 2 19:32:16.800781 kernel: Loading compiled-in X.509 certificates Oct 2 19:32:16.800788 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:32:16.800795 kernel: Key type .fscrypt registered Oct 2 19:32:16.800802 kernel: Key type fscrypt-provisioning registered Oct 2 19:32:16.800809 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:32:16.800815 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:32:16.800822 kernel: ima: No architecture policies found Oct 2 19:32:16.800831 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:32:16.800838 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:32:16.800845 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:32:16.800851 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:32:16.800858 kernel: Run /init as init process Oct 2 19:32:16.800865 kernel: with arguments: Oct 2 19:32:16.800872 kernel: /init Oct 2 19:32:16.800879 kernel: with environment: Oct 2 19:32:16.800895 kernel: HOME=/ Oct 2 19:32:16.800903 kernel: TERM=linux Oct 2 19:32:16.800911 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:32:16.800920 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:32:16.800930 systemd[1]: Detected virtualization kvm. Oct 2 19:32:16.800938 systemd[1]: Detected architecture x86-64. Oct 2 19:32:16.800945 systemd[1]: Running in initrd. Oct 2 19:32:16.800952 systemd[1]: No hostname configured, using default hostname. Oct 2 19:32:16.800959 systemd[1]: Hostname set to . Oct 2 19:32:16.800968 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:32:16.800976 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:32:16.800983 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:32:16.800990 systemd[1]: Reached target cryptsetup.target. Oct 2 19:32:16.800998 systemd[1]: Reached target paths.target. Oct 2 19:32:16.801005 systemd[1]: Reached target slices.target. Oct 2 19:32:16.801012 systemd[1]: Reached target swap.target. Oct 2 19:32:16.801019 systemd[1]: Reached target timers.target. Oct 2 19:32:16.801028 systemd[1]: Listening on iscsid.socket. Oct 2 19:32:16.801040 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:32:16.801048 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:32:16.801055 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:32:16.801062 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:32:16.801070 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:32:16.801077 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:32:16.801086 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:32:16.801093 systemd[1]: Reached target sockets.target. Oct 2 19:32:16.801101 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:32:16.801108 systemd[1]: Finished network-cleanup.service. Oct 2 19:32:16.801116 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:32:16.801123 systemd[1]: Starting systemd-journald.service... Oct 2 19:32:16.801131 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:32:16.801139 systemd[1]: Starting systemd-resolved.service... Oct 2 19:32:16.801146 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:32:16.801154 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:32:16.801161 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:32:16.801169 kernel: audit: type=1130 audit(1696275136.793:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.801177 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:32:16.801186 systemd-journald[197]: Journal started Oct 2 19:32:16.801222 systemd-journald[197]: Runtime Journal (/run/log/journal/a96efbeac2fb427cbbb8bc8e5c41cbb6) is 6.0M, max 48.5M, 42.5M free. Oct 2 19:32:16.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.793069 systemd-modules-load[198]: Inserted module 'overlay' Oct 2 19:32:16.820037 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:32:16.820063 kernel: Bridge firewalling registered Oct 2 19:32:16.805513 systemd-resolved[199]: Positive Trust Anchors: Oct 2 19:32:16.805523 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:32:16.805549 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:32:16.825838 systemd[1]: Started systemd-journald.service. Oct 2 19:32:16.807625 systemd-resolved[199]: Defaulting to hostname 'linux'. Oct 2 19:32:16.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.818873 systemd-modules-load[198]: Inserted module 'br_netfilter' Oct 2 19:32:16.829900 kernel: audit: type=1130 audit(1696275136.826:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.829920 kernel: audit: type=1130 audit(1696275136.828:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.826944 systemd[1]: Started systemd-resolved.service. Oct 2 19:32:16.832860 kernel: audit: type=1130 audit(1696275136.831:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.830055 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:32:16.832961 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:32:16.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.837125 systemd[1]: Reached target nss-lookup.target. Oct 2 19:32:16.840745 kernel: audit: type=1130 audit(1696275136.836:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.840761 kernel: SCSI subsystem initialized Oct 2 19:32:16.841352 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:32:16.851246 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:32:16.851295 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:32:16.851305 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:32:16.853914 systemd-modules-load[198]: Inserted module 'dm_multipath' Oct 2 19:32:16.854647 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:32:16.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.855669 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:32:16.857069 kernel: audit: type=1130 audit(1696275136.853:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.858887 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:32:16.862461 kernel: audit: type=1130 audit(1696275136.858:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.860252 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:32:16.864242 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:32:16.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.867795 kernel: audit: type=1130 audit(1696275136.864:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.872375 dracut-cmdline[222]: dracut-dracut-053 Oct 2 19:32:16.874360 dracut-cmdline[222]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:32:16.928800 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:32:16.939814 kernel: iscsi: registered transport (tcp) Oct 2 19:32:16.957797 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:32:16.957828 kernel: QLogic iSCSI HBA Driver Oct 2 19:32:16.985815 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:32:16.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:16.987654 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:32:16.989758 kernel: audit: type=1130 audit(1696275136.986:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:17.031798 kernel: raid6: avx2x4 gen() 29428 MB/s Oct 2 19:32:17.048792 kernel: raid6: avx2x4 xor() 7365 MB/s Oct 2 19:32:17.065792 kernel: raid6: avx2x2 gen() 32311 MB/s Oct 2 19:32:17.084789 kernel: raid6: avx2x2 xor() 19294 MB/s Oct 2 19:32:17.101793 kernel: raid6: avx2x1 gen() 25583 MB/s Oct 2 19:32:17.159790 kernel: raid6: avx2x1 xor() 15184 MB/s Oct 2 19:32:17.176800 kernel: raid6: sse2x4 gen() 14711 MB/s Oct 2 19:32:17.193789 kernel: raid6: sse2x4 xor() 7086 MB/s Oct 2 19:32:17.210796 kernel: raid6: sse2x2 gen() 15815 MB/s Oct 2 19:32:17.227788 kernel: raid6: sse2x2 xor() 9709 MB/s Oct 2 19:32:17.244806 kernel: raid6: sse2x1 gen() 11207 MB/s Oct 2 19:32:17.262216 kernel: raid6: sse2x1 xor() 7726 MB/s Oct 2 19:32:17.262270 kernel: raid6: using algorithm avx2x2 gen() 32311 MB/s Oct 2 19:32:17.262279 kernel: raid6: .... xor() 19294 MB/s, rmw enabled Oct 2 19:32:17.262288 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:32:17.273810 kernel: xor: automatically using best checksumming function avx Oct 2 19:32:17.359800 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:32:17.368043 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:32:17.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:17.368000 audit: BPF prog-id=7 op=LOAD Oct 2 19:32:17.368000 audit: BPF prog-id=8 op=LOAD Oct 2 19:32:17.369888 systemd[1]: Starting systemd-udevd.service... Oct 2 19:32:17.380743 systemd-udevd[400]: Using default interface naming scheme 'v252'. Oct 2 19:32:17.384307 systemd[1]: Started systemd-udevd.service. Oct 2 19:32:17.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:17.386008 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:32:17.396992 dracut-pre-trigger[408]: rd.md=0: removing MD RAID activation Oct 2 19:32:17.421764 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:32:17.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:17.423591 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:32:17.459402 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:32:17.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:17.488043 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Oct 2 19:32:17.489786 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:32:17.491789 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:32:17.501796 kernel: libata version 3.00 loaded. Oct 2 19:32:17.501817 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:32:17.502966 kernel: AES CTR mode by8 optimization enabled Oct 2 19:32:17.504910 kernel: ata_piix 0000:00:01.1: version 2.13 Oct 2 19:32:17.511717 kernel: scsi host0: ata_piix Oct 2 19:32:17.511876 kernel: scsi host1: ata_piix Oct 2 19:32:17.511968 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Oct 2 19:32:17.511978 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Oct 2 19:32:17.531791 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (449) Oct 2 19:32:17.537336 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:32:17.551713 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:32:17.555962 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:32:17.562092 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:32:17.563604 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:32:17.564915 systemd[1]: Starting disk-uuid.service... Oct 2 19:32:17.604799 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:32:17.610789 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:32:17.666790 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 2 19:32:17.666842 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 2 19:32:17.694797 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 2 19:32:17.694971 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:32:17.711810 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Oct 2 19:32:18.613797 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:32:18.614335 disk-uuid[516]: The operation has completed successfully. Oct 2 19:32:18.636152 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:32:18.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.636231 systemd[1]: Finished disk-uuid.service. Oct 2 19:32:18.644137 systemd[1]: Starting verity-setup.service... Oct 2 19:32:18.655803 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:32:18.684032 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:32:18.685174 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:32:18.687172 systemd[1]: Finished verity-setup.service. Oct 2 19:32:18.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.750799 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:32:18.750947 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:32:18.751588 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:32:18.752199 systemd[1]: Starting ignition-setup.service... Oct 2 19:32:18.754007 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:32:18.759927 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:32:18.759999 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:32:18.760014 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:32:18.766697 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:32:18.775292 systemd[1]: Finished ignition-setup.service. Oct 2 19:32:18.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.776528 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:32:18.814017 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:32:18.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.815000 audit: BPF prog-id=9 op=LOAD Oct 2 19:32:18.816495 systemd[1]: Starting systemd-networkd.service... Oct 2 19:32:18.838809 systemd-networkd[694]: lo: Link UP Oct 2 19:32:18.839529 systemd-networkd[694]: lo: Gained carrier Oct 2 19:32:18.840520 systemd-networkd[694]: Enumeration completed Oct 2 19:32:18.841266 systemd[1]: Started systemd-networkd.service. Oct 2 19:32:18.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.842540 systemd[1]: Reached target network.target. Oct 2 19:32:18.842925 systemd-networkd[694]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:32:18.844008 systemd-networkd[694]: eth0: Link UP Oct 2 19:32:18.844011 systemd-networkd[694]: eth0: Gained carrier Oct 2 19:32:18.844128 systemd[1]: Starting iscsiuio.service... Oct 2 19:32:18.848938 systemd[1]: Started iscsiuio.service. Oct 2 19:32:18.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.850759 systemd[1]: Starting iscsid.service... Oct 2 19:32:18.853674 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:32:18.853674 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:32:18.853674 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:32:18.853674 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:32:18.853674 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:32:18.853674 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:32:18.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.854883 systemd[1]: Started iscsid.service. Oct 2 19:32:18.859640 systemd-networkd[694]: eth0: DHCPv4 address 10.0.0.16/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:32:18.859765 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:32:18.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.869752 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:32:18.870435 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:32:18.871073 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:32:18.871683 systemd[1]: Reached target remote-fs.target. Oct 2 19:32:18.872832 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:32:18.877633 ignition[615]: Ignition 2.14.0 Oct 2 19:32:18.877643 ignition[615]: Stage: fetch-offline Oct 2 19:32:18.877692 ignition[615]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:32:18.877700 ignition[615]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:32:18.877808 ignition[615]: parsed url from cmdline: "" Oct 2 19:32:18.877811 ignition[615]: no config URL provided Oct 2 19:32:18.877816 ignition[615]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:32:18.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.881453 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:32:18.877822 ignition[615]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:32:18.877837 ignition[615]: op(1): [started] loading QEMU firmware config module Oct 2 19:32:18.877842 ignition[615]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 2 19:32:18.883518 ignition[615]: op(1): [finished] loading QEMU firmware config module Oct 2 19:32:18.894899 ignition[615]: parsing config with SHA512: 9049f4d3bef5d8f2edf18f00942323df5dc8dcfacfb8b9f69082ffb3d70c4356f7cb4a09449f91255fbb686f609527a5ceee4a3823fc36dec037496764b11c35 Oct 2 19:32:18.915133 unknown[615]: fetched base config from "system" Oct 2 19:32:18.915143 unknown[615]: fetched user config from "qemu" Oct 2 19:32:18.915465 ignition[615]: fetch-offline: fetch-offline passed Oct 2 19:32:18.915517 ignition[615]: Ignition finished successfully Oct 2 19:32:18.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.916643 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:32:18.917681 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:32:18.918560 systemd[1]: Starting ignition-kargs.service... Oct 2 19:32:18.928930 ignition[715]: Ignition 2.14.0 Oct 2 19:32:18.928942 ignition[715]: Stage: kargs Oct 2 19:32:18.929061 ignition[715]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:32:18.929073 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:32:18.930219 ignition[715]: kargs: kargs passed Oct 2 19:32:18.931498 systemd[1]: Finished ignition-kargs.service. Oct 2 19:32:18.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.930262 ignition[715]: Ignition finished successfully Oct 2 19:32:18.933086 systemd[1]: Starting ignition-disks.service... Oct 2 19:32:18.940395 ignition[721]: Ignition 2.14.0 Oct 2 19:32:18.940407 ignition[721]: Stage: disks Oct 2 19:32:18.940499 ignition[721]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:32:18.940511 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:32:18.941376 ignition[721]: disks: disks passed Oct 2 19:32:18.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.942274 systemd[1]: Finished ignition-disks.service. Oct 2 19:32:18.941410 ignition[721]: Ignition finished successfully Oct 2 19:32:18.943491 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:32:18.944306 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:32:18.945365 systemd[1]: Reached target local-fs.target. Oct 2 19:32:18.946354 systemd[1]: Reached target sysinit.target. Oct 2 19:32:18.947396 systemd[1]: Reached target basic.target. Oct 2 19:32:18.949335 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:32:18.958082 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.16 Oct 2 19:32:18.958101 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux10'. Oct 2 19:32:18.960767 systemd-fsck[729]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:32:18.965789 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:32:18.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.966505 systemd[1]: Mounting sysroot.mount... Oct 2 19:32:18.971412 systemd[1]: Mounted sysroot.mount. Oct 2 19:32:18.972329 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:32:18.971525 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:32:18.973876 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:32:18.974259 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:32:18.974308 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:32:18.974333 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:32:18.980165 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:32:18.981070 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:32:18.986095 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:32:18.989759 initrd-setup-root[747]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:32:18.992685 initrd-setup-root[755]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:32:18.996271 initrd-setup-root[763]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:32:19.023195 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:32:19.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:19.024465 systemd[1]: Starting ignition-mount.service... Oct 2 19:32:19.025419 systemd[1]: Starting sysroot-boot.service... Oct 2 19:32:19.029584 bash[780]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:32:19.038397 ignition[782]: INFO : Ignition 2.14.0 Oct 2 19:32:19.039202 ignition[782]: INFO : Stage: mount Oct 2 19:32:19.039202 ignition[782]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:32:19.039202 ignition[782]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:32:19.041483 ignition[782]: INFO : mount: mount passed Oct 2 19:32:19.041483 ignition[782]: INFO : Ignition finished successfully Oct 2 19:32:19.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:19.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:19.041350 systemd[1]: Finished ignition-mount.service. Oct 2 19:32:19.042173 systemd[1]: Finished sysroot-boot.service. Oct 2 19:32:19.696083 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:32:19.702792 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (791) Oct 2 19:32:19.702826 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:32:19.703894 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:32:19.703907 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:32:19.706946 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:32:19.708005 systemd[1]: Starting ignition-files.service... Oct 2 19:32:19.720641 ignition[811]: INFO : Ignition 2.14.0 Oct 2 19:32:19.720641 ignition[811]: INFO : Stage: files Oct 2 19:32:19.721882 ignition[811]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:32:19.721882 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:32:19.723332 ignition[811]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:32:19.724173 ignition[811]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:32:19.724173 ignition[811]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:32:19.726394 ignition[811]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:32:19.727397 ignition[811]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:32:19.728593 unknown[811]: wrote ssh authorized keys file for user: core Oct 2 19:32:19.729319 ignition[811]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:32:19.730187 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:32:19.730187 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:32:20.089864 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:32:20.208912 systemd-networkd[694]: eth0: Gained IPv6LL Oct 2 19:32:20.228316 ignition[811]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:32:20.230139 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:32:20.230139 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:32:20.230139 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:32:20.506488 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:32:20.589809 ignition[811]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:32:20.589809 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:32:20.593107 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:32:20.593107 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:32:20.693673 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:32:21.615091 ignition[811]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:32:21.617303 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:32:21.617303 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:32:21.617303 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:32:21.688788 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:32:23.117936 ignition[811]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:32:23.120805 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:32:23.120805 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:32:23.120805 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:32:23.120805 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:32:23.120805 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(9): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(9): op(a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(9): op(a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(9): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(b): [started] processing unit "prepare-critools.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(b): op(c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(b): op(c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(b): [finished] processing unit "prepare-critools.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Oct 2 19:32:23.120805 ignition[811]: INFO : files: op(f): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:32:23.148753 ignition[811]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:32:23.148753 ignition[811]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:32:23.148753 ignition[811]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:32:23.148753 ignition[811]: INFO : files: op(11): [started] setting preset to disabled for "coreos-metadata.service" Oct 2 19:32:23.148753 ignition[811]: INFO : files: op(11): op(12): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:32:23.157205 ignition[811]: INFO : files: op(11): op(12): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:32:23.158435 ignition[811]: INFO : files: op(11): [finished] setting preset to disabled for "coreos-metadata.service" Oct 2 19:32:23.159644 ignition[811]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:32:23.161027 ignition[811]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:32:23.162316 ignition[811]: INFO : files: files passed Oct 2 19:32:23.162905 ignition[811]: INFO : Ignition finished successfully Oct 2 19:32:23.164639 systemd[1]: Finished ignition-files.service. Oct 2 19:32:23.169406 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 2 19:32:23.169434 kernel: audit: type=1130 audit(1696275143.165:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.166226 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:32:23.169415 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:32:23.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.173259 initrd-setup-root-after-ignition[835]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 2 19:32:23.176943 kernel: audit: type=1130 audit(1696275143.173:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.176964 kernel: audit: type=1130 audit(1696275143.176:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.169992 systemd[1]: Starting ignition-quench.service... Oct 2 19:32:23.182536 kernel: audit: type=1131 audit(1696275143.176:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.182639 initrd-setup-root-after-ignition[838]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:32:23.171079 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:32:23.173328 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:32:23.173382 systemd[1]: Finished ignition-quench.service. Oct 2 19:32:23.177041 systemd[1]: Reached target ignition-complete.target. Oct 2 19:32:23.182975 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:32:23.192898 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:32:23.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.192969 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:32:23.248208 kernel: audit: type=1130 audit(1696275143.242:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.248232 kernel: audit: type=1131 audit(1696275143.242:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.242321 systemd[1]: Reached target initrd-fs.target. Oct 2 19:32:23.246968 systemd[1]: Reached target initrd.target. Oct 2 19:32:23.248215 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:32:23.248792 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:32:23.257365 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:32:23.261114 kernel: audit: type=1130 audit(1696275143.257:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.258557 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:32:23.267516 systemd[1]: Stopped target network.target. Oct 2 19:32:23.268128 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:32:23.269034 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:32:23.270063 systemd[1]: Stopped target timers.target. Oct 2 19:32:23.271053 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:32:23.274799 kernel: audit: type=1131 audit(1696275143.271:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.271160 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:32:23.272137 systemd[1]: Stopped target initrd.target. Oct 2 19:32:23.274871 systemd[1]: Stopped target basic.target. Oct 2 19:32:23.275876 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:32:23.276876 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:32:23.277866 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:32:23.278949 systemd[1]: Stopped target remote-fs.target. Oct 2 19:32:23.280011 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:32:23.281070 systemd[1]: Stopped target sysinit.target. Oct 2 19:32:23.282044 systemd[1]: Stopped target local-fs.target. Oct 2 19:32:23.283044 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:32:23.284050 systemd[1]: Stopped target swap.target. Oct 2 19:32:23.288784 kernel: audit: type=1131 audit(1696275143.285:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.284957 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:32:23.285035 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:32:23.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.286039 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:32:23.293630 kernel: audit: type=1131 audit(1696275143.289:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.288813 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:32:23.288896 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:32:23.289985 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:32:23.290060 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:32:23.292784 systemd[1]: Stopped target paths.target. Oct 2 19:32:23.293662 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:32:23.294816 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:32:23.296068 systemd[1]: Stopped target slices.target. Oct 2 19:32:23.297016 systemd[1]: Stopped target sockets.target. Oct 2 19:32:23.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.297909 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:32:23.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.297990 systemd[1]: Closed iscsid.socket. Oct 2 19:32:23.298984 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:32:23.299062 systemd[1]: Closed iscsiuio.socket. Oct 2 19:32:23.299956 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:32:23.300058 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:32:23.301028 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:32:23.301125 systemd[1]: Stopped ignition-files.service. Oct 2 19:32:23.302569 systemd[1]: Stopping ignition-mount.service... Oct 2 19:32:23.303687 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:32:23.306596 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:32:23.307186 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:32:23.312593 ignition[852]: INFO : Ignition 2.14.0 Oct 2 19:32:23.312593 ignition[852]: INFO : Stage: umount Oct 2 19:32:23.312593 ignition[852]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:32:23.312593 ignition[852]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:32:23.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.308610 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:32:23.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.319442 ignition[852]: INFO : umount: umount passed Oct 2 19:32:23.319442 ignition[852]: INFO : Ignition finished successfully Oct 2 19:32:23.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.308812 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:32:23.310293 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:32:23.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.322000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:32:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.310454 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:32:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.314153 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:32:23.314219 systemd[1]: Stopped ignition-mount.service. Oct 2 19:32:23.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.315830 systemd-networkd[694]: eth0: DHCPv6 lease lost Oct 2 19:32:23.332000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:32:23.316995 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:32:23.317490 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:32:23.317562 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:32:23.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.319655 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:32:23.319748 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:32:23.322002 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:32:23.322062 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:32:23.323341 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:32:23.323427 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:32:23.324435 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:32:23.324466 systemd[1]: Stopped ignition-disks.service. Oct 2 19:32:23.325104 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:32:23.325132 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:32:23.325187 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:32:23.325212 systemd[1]: Stopped ignition-setup.service. Oct 2 19:32:23.325320 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:32:23.325342 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:32:23.325957 systemd[1]: Stopping network-cleanup.service... Oct 2 19:32:23.326223 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:32:23.326269 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:32:23.326520 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:32:23.326559 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:32:23.328515 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:32:23.328545 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:32:23.329949 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:32:23.331272 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:32:23.331655 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:32:23.331709 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:32:23.334615 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:32:23.334668 systemd[1]: Stopped network-cleanup.service. Oct 2 19:32:23.339814 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:32:23.342895 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:32:23.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.397759 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:32:23.397807 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:32:23.399863 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:32:23.400599 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:32:23.401889 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:32:23.402602 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:32:23.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.403859 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:32:23.404562 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:32:23.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.405794 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:32:23.406542 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:32:23.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.408415 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:32:23.409797 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:32:23.410615 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:32:23.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.412156 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:32:23.412911 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:32:23.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.414172 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:32:23.414974 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:32:23.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.417174 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 19:32:23.418660 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:32:23.419527 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:32:23.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:23.421006 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:32:23.422918 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:32:23.433820 systemd[1]: Switching root. Oct 2 19:32:23.453534 iscsid[699]: iscsid shutting down. Oct 2 19:32:23.454244 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Oct 2 19:32:23.454288 systemd-journald[197]: Journal stopped Oct 2 19:32:27.037941 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:32:27.037987 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:32:27.037997 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:32:27.038007 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:32:27.038019 kernel: SELinux: policy capability open_perms=1 Oct 2 19:32:27.038031 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:32:27.038041 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:32:27.038051 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:32:27.038060 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:32:27.038073 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:32:27.038085 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:32:27.038096 systemd[1]: Successfully loaded SELinux policy in 38.071ms. Oct 2 19:32:27.038116 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.545ms. Oct 2 19:32:27.038128 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:32:27.038138 systemd[1]: Detected virtualization kvm. Oct 2 19:32:27.038148 systemd[1]: Detected architecture x86-64. Oct 2 19:32:27.038159 systemd[1]: Detected first boot. Oct 2 19:32:27.038169 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:32:27.038181 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:32:27.038192 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:32:27.038206 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:32:27.038217 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:32:27.038230 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:32:27.038240 systemd[1]: Stopped iscsiuio.service. Oct 2 19:32:27.038249 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:32:27.038261 systemd[1]: Stopped iscsid.service. Oct 2 19:32:27.038271 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:32:27.038281 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:32:27.038292 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:32:27.038301 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:32:27.038313 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:32:27.038327 systemd[1]: Created slice system-getty.slice. Oct 2 19:32:27.038340 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:32:27.038356 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:32:27.038366 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:32:27.038377 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:32:27.038387 systemd[1]: Created slice user.slice. Oct 2 19:32:27.038396 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:32:27.038406 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:32:27.038416 systemd[1]: Set up automount boot.automount. Oct 2 19:32:27.038438 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:32:27.038450 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:32:27.038460 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:32:27.038470 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:32:27.038481 systemd[1]: Reached target integritysetup.target. Oct 2 19:32:27.038491 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:32:27.038501 systemd[1]: Reached target remote-fs.target. Oct 2 19:32:27.038511 systemd[1]: Reached target slices.target. Oct 2 19:32:27.038521 systemd[1]: Reached target swap.target. Oct 2 19:32:27.038531 systemd[1]: Reached target torcx.target. Oct 2 19:32:27.038541 systemd[1]: Reached target veritysetup.target. Oct 2 19:32:27.038553 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:32:27.038563 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:32:27.038573 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:32:27.038584 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:32:27.038594 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:32:27.038605 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:32:27.038615 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:32:27.038625 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:32:27.038636 systemd[1]: Mounting media.mount... Oct 2 19:32:27.038648 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:32:27.038658 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:32:27.038668 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:32:27.038678 systemd[1]: Mounting tmp.mount... Oct 2 19:32:27.038688 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:32:27.038698 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:32:27.038708 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:32:27.038718 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:32:27.038729 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:32:27.038740 systemd[1]: Starting modprobe@drm.service... Oct 2 19:32:27.038757 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:32:27.038768 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:32:27.038798 systemd[1]: Starting modprobe@loop.service... Oct 2 19:32:27.038809 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:32:27.038819 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:32:27.038829 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:32:27.038839 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:32:27.038849 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:32:27.038860 systemd[1]: Stopped systemd-journald.service. Oct 2 19:32:27.038870 kernel: loop: module loaded Oct 2 19:32:27.038880 kernel: fuse: init (API version 7.34) Oct 2 19:32:27.038889 systemd[1]: Starting systemd-journald.service... Oct 2 19:32:27.038900 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:32:27.038910 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:32:27.038922 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:32:27.038933 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:32:27.038944 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:32:27.038956 systemd[1]: Stopped verity-setup.service. Oct 2 19:32:27.038966 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:32:27.038976 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:32:27.038986 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:32:27.038996 systemd[1]: Mounted media.mount. Oct 2 19:32:27.039006 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:32:27.039016 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:32:27.039027 systemd[1]: Mounted tmp.mount. Oct 2 19:32:27.039039 systemd-journald[958]: Journal started Oct 2 19:32:27.039076 systemd-journald[958]: Runtime Journal (/run/log/journal/a96efbeac2fb427cbbb8bc8e5c41cbb6) is 6.0M, max 48.5M, 42.5M free. Oct 2 19:32:23.526000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:32:24.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:32:24.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:32:24.679000 audit: BPF prog-id=10 op=LOAD Oct 2 19:32:24.679000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:32:24.680000 audit: BPF prog-id=11 op=LOAD Oct 2 19:32:24.680000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:32:26.926000 audit: BPF prog-id=12 op=LOAD Oct 2 19:32:26.926000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:32:26.926000 audit: BPF prog-id=13 op=LOAD Oct 2 19:32:26.926000 audit: BPF prog-id=14 op=LOAD Oct 2 19:32:26.926000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:32:26.926000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:32:26.927000 audit: BPF prog-id=15 op=LOAD Oct 2 19:32:26.927000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:32:26.927000 audit: BPF prog-id=16 op=LOAD Oct 2 19:32:26.927000 audit: BPF prog-id=17 op=LOAD Oct 2 19:32:26.927000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:32:26.927000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:32:26.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.936000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:32:27.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.012000 audit: BPF prog-id=18 op=LOAD Oct 2 19:32:27.012000 audit: BPF prog-id=19 op=LOAD Oct 2 19:32:27.012000 audit: BPF prog-id=20 op=LOAD Oct 2 19:32:27.012000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:32:27.012000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:32:27.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.036000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:32:27.036000 audit[958]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffaac2aa70 a2=4000 a3=7fffaac2ab0c items=0 ppid=1 pid=958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:27.036000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:32:24.745107 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:32:26.925245 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:32:24.745395 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:32:26.925256 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 2 19:32:24.745410 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:32:26.929254 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:32:24.745437 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:32:24.745446 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:32:24.745472 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:32:24.745482 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:32:24.745657 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:32:24.745687 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:32:24.745698 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:32:24.746038 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:32:27.040812 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:32:24.746069 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:32:24.746084 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:32:24.746096 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:32:24.746110 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:32:24.746121 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:32:26.643257 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:32:26.643509 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:32:26.643597 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:32:26.643795 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:32:26.643850 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:32:27.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.643902 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2023-10-02T19:32:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:32:27.042793 systemd[1]: Started systemd-journald.service. Oct 2 19:32:27.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.043440 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:32:27.043681 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:32:27.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.044834 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:32:27.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.045798 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:32:27.045955 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:32:27.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.046673 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:32:27.046809 systemd[1]: Finished modprobe@drm.service. Oct 2 19:32:27.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.047493 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:32:27.047609 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:32:27.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.048362 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:32:27.048477 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:32:27.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.049180 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:32:27.049282 systemd[1]: Finished modprobe@loop.service. Oct 2 19:32:27.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.050058 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:32:27.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.050851 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:32:27.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.051642 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:32:27.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.052721 systemd[1]: Reached target network-pre.target. Oct 2 19:32:27.054463 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:32:27.056032 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:32:27.056549 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:32:27.058097 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:32:27.059927 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:32:27.060684 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:32:27.063825 systemd-journald[958]: Time spent on flushing to /var/log/journal/a96efbeac2fb427cbbb8bc8e5c41cbb6 is 13.417ms for 1085 entries. Oct 2 19:32:27.063825 systemd-journald[958]: System Journal (/var/log/journal/a96efbeac2fb427cbbb8bc8e5c41cbb6) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:32:27.093922 systemd-journald[958]: Received client request to flush runtime journal. Oct 2 19:32:27.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.061550 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:32:27.062230 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:32:27.062992 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:32:27.065258 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:32:27.067318 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:32:27.069667 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:32:27.070540 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:32:27.071253 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:32:27.077364 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:32:27.080535 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:32:27.082267 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:32:27.085229 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:32:27.086895 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:32:27.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.094810 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:32:27.095922 udevadm[991]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:32:27.103360 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:32:27.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.505539 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:32:27.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.506000 audit: BPF prog-id=21 op=LOAD Oct 2 19:32:27.506000 audit: BPF prog-id=22 op=LOAD Oct 2 19:32:27.506000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:32:27.506000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:32:27.507994 systemd[1]: Starting systemd-udevd.service... Oct 2 19:32:27.528414 systemd-udevd[993]: Using default interface naming scheme 'v252'. Oct 2 19:32:27.544439 systemd[1]: Started systemd-udevd.service. Oct 2 19:32:27.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.545000 audit: BPF prog-id=23 op=LOAD Oct 2 19:32:27.547099 systemd[1]: Starting systemd-networkd.service... Oct 2 19:32:27.553000 audit: BPF prog-id=24 op=LOAD Oct 2 19:32:27.553000 audit: BPF prog-id=25 op=LOAD Oct 2 19:32:27.553000 audit: BPF prog-id=26 op=LOAD Oct 2 19:32:27.555092 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:32:27.567274 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:32:27.581657 systemd[1]: Started systemd-userdbd.service. Oct 2 19:32:27.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.619089 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:32:27.628801 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:32:27.632952 systemd-networkd[1001]: lo: Link UP Oct 2 19:32:27.632959 systemd-networkd[1001]: lo: Gained carrier Oct 2 19:32:27.633290 systemd-networkd[1001]: Enumeration completed Oct 2 19:32:27.633366 systemd[1]: Started systemd-networkd.service. Oct 2 19:32:27.633382 systemd-networkd[1001]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:32:27.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.634579 systemd-networkd[1001]: eth0: Link UP Oct 2 19:32:27.634585 systemd-networkd[1001]: eth0: Gained carrier Oct 2 19:32:27.638799 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:32:27.638000 audit[1004]: AVC avc: denied { confidentiality } for pid=1004 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:32:27.638000 audit[1004]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56007b734b20 a1=32194 a2=7f3667da8bc5 a3=5 items=106 ppid=993 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:27.638000 audit: CWD cwd="/" Oct 2 19:32:27.638000 audit: PATH item=0 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=1 name=(null) inode=14270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=2 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=3 name=(null) inode=14271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=4 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=5 name=(null) inode=14272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=6 name=(null) inode=14272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=7 name=(null) inode=14273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=8 name=(null) inode=14272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=9 name=(null) inode=14274 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=10 name=(null) inode=14272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=11 name=(null) inode=14275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=12 name=(null) inode=14272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=13 name=(null) inode=14276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=14 name=(null) inode=14272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=15 name=(null) inode=14277 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=16 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=17 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=18 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=19 name=(null) inode=14279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=20 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=21 name=(null) inode=14280 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=22 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=23 name=(null) inode=14281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=24 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=25 name=(null) inode=14282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=26 name=(null) inode=14278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=27 name=(null) inode=14283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=28 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=29 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=30 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=31 name=(null) inode=14285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=32 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=33 name=(null) inode=14286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=34 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=35 name=(null) inode=14287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=36 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=37 name=(null) inode=14288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=38 name=(null) inode=14284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=39 name=(null) inode=14289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=40 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=41 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=42 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=43 name=(null) inode=14291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=44 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=45 name=(null) inode=14292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=46 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=47 name=(null) inode=14293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=48 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=49 name=(null) inode=14294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=50 name=(null) inode=14290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=51 name=(null) inode=14295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=52 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=53 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=54 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=55 name=(null) inode=14297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=56 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=57 name=(null) inode=14298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=58 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=59 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=60 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=61 name=(null) inode=14300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=62 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=63 name=(null) inode=14301 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=64 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=65 name=(null) inode=14302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=66 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=67 name=(null) inode=14303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=68 name=(null) inode=14299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=69 name=(null) inode=14304 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=70 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=71 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=72 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=73 name=(null) inode=14306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=74 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=75 name=(null) inode=14307 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=76 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=77 name=(null) inode=14308 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=78 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=79 name=(null) inode=14309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=80 name=(null) inode=14305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=81 name=(null) inode=14310 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=82 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=83 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=84 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=85 name=(null) inode=14312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=86 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=87 name=(null) inode=14313 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=88 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=89 name=(null) inode=14314 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=90 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=91 name=(null) inode=14315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=92 name=(null) inode=14311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=93 name=(null) inode=14316 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=94 name=(null) inode=14296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=95 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=96 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=97 name=(null) inode=14318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=98 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=99 name=(null) inode=14319 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=100 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=101 name=(null) inode=14320 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=102 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=103 name=(null) inode=14321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=104 name=(null) inode=14317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PATH item=105 name=(null) inode=14322 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:32:27.638000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:32:27.651925 systemd-networkd[1001]: eth0: DHCPv4 address 10.0.0.16/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:32:27.659813 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 2 19:32:27.668796 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 2 19:32:27.672795 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:32:27.726800 kernel: kvm: Nested Virtualization enabled Oct 2 19:32:27.726985 kernel: SVM: kvm: Nested Paging enabled Oct 2 19:32:27.742796 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:32:27.765223 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:32:27.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.767090 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:32:27.782037 lvm[1028]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:32:27.804734 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:32:27.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.805505 systemd[1]: Reached target cryptsetup.target. Oct 2 19:32:27.807114 systemd[1]: Starting lvm2-activation.service... Oct 2 19:32:27.810760 lvm[1029]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:32:27.835008 systemd[1]: Finished lvm2-activation.service. Oct 2 19:32:27.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.835884 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:32:27.836566 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:32:27.836593 systemd[1]: Reached target local-fs.target. Oct 2 19:32:27.837175 systemd[1]: Reached target machines.target. Oct 2 19:32:27.838889 systemd[1]: Starting ldconfig.service... Oct 2 19:32:27.839704 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:32:27.839787 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:32:27.840765 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:32:27.842503 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:32:27.844446 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:32:27.845245 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:32:27.845281 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:32:27.846188 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:32:27.847293 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1031 (bootctl) Oct 2 19:32:27.848209 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:32:27.856719 systemd-tmpfiles[1034]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:32:27.857756 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:32:27.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.859525 systemd-tmpfiles[1034]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:32:27.860955 systemd-tmpfiles[1034]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:32:27.883150 systemd-fsck[1039]: fsck.fat 4.2 (2021-01-31) Oct 2 19:32:27.883150 systemd-fsck[1039]: /dev/vda1: 789 files, 115069/258078 clusters Oct 2 19:32:27.884835 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:32:27.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:27.887331 systemd[1]: Mounting boot.mount... Oct 2 19:32:28.066680 systemd[1]: Mounted boot.mount. Oct 2 19:32:28.078216 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:32:28.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:28.133896 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:32:28.134417 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:32:28.135519 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:32:28.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:28.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:28.137425 systemd[1]: Starting audit-rules.service... Oct 2 19:32:28.138757 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:32:28.140659 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:32:28.141000 audit: BPF prog-id=27 op=LOAD Oct 2 19:32:28.142687 systemd[1]: Starting systemd-resolved.service... Oct 2 19:32:28.144000 audit: BPF prog-id=28 op=LOAD Oct 2 19:32:28.145913 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:32:28.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:28.147319 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:32:28.148411 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:32:28.149300 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:32:28.153000 audit[1054]: SYSTEM_BOOT pid=1054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:32:28.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:28.158486 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:32:28.181806 kernel: kauditd_printk_skb: 227 callbacks suppressed Oct 2 19:32:28.188879 kernel: audit: type=1305 audit(1696275148.175:161): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:32:28.188913 kernel: audit: type=1300 audit(1696275148.175:161): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe940a0f0 a2=420 a3=0 items=0 ppid=1043 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:28.188944 kernel: audit: type=1327 audit(1696275148.175:161): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:32:28.175000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:32:28.175000 audit[1063]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe940a0f0 a2=420 a3=0 items=0 ppid=1043 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:28.175000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:32:28.189137 augenrules[1063]: No rules Oct 2 19:32:28.182813 systemd[1]: Finished audit-rules.service. Oct 2 19:32:28.183540 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:32:28.203620 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:32:28.204769 systemd[1]: Reached target time-set.target. Oct 2 19:32:28.796753 systemd-timesyncd[1048]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 2 19:32:28.796787 systemd-timesyncd[1048]: Initial clock synchronization to Mon 2023-10-02 19:32:28.796693 UTC. Oct 2 19:32:28.800072 systemd-resolved[1047]: Positive Trust Anchors: Oct 2 19:32:28.800298 systemd-resolved[1047]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:32:28.800397 systemd-resolved[1047]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:32:28.815903 systemd-resolved[1047]: Defaulting to hostname 'linux'. Oct 2 19:32:28.817272 systemd[1]: Started systemd-resolved.service. Oct 2 19:32:28.818152 systemd[1]: Reached target network.target. Oct 2 19:32:28.819003 systemd[1]: Reached target nss-lookup.target. Oct 2 19:32:28.859978 ldconfig[1030]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:32:28.865842 systemd[1]: Finished ldconfig.service. Oct 2 19:32:28.867775 systemd[1]: Starting systemd-update-done.service... Oct 2 19:32:28.873286 systemd[1]: Finished systemd-update-done.service. Oct 2 19:32:28.874147 systemd[1]: Reached target sysinit.target. Oct 2 19:32:28.875133 systemd[1]: Started motdgen.path. Oct 2 19:32:28.875828 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:32:28.877045 systemd[1]: Started logrotate.timer. Oct 2 19:32:28.877854 systemd[1]: Started mdadm.timer. Oct 2 19:32:28.878502 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:32:28.879300 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:32:28.879334 systemd[1]: Reached target paths.target. Oct 2 19:32:28.880029 systemd[1]: Reached target timers.target. Oct 2 19:32:28.881052 systemd[1]: Listening on dbus.socket. Oct 2 19:32:28.882328 systemd[1]: Starting docker.socket... Oct 2 19:32:28.884900 systemd[1]: Listening on sshd.socket. Oct 2 19:32:28.885650 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:32:28.885955 systemd[1]: Listening on docker.socket. Oct 2 19:32:28.886563 systemd[1]: Reached target sockets.target. Oct 2 19:32:28.887088 systemd[1]: Reached target basic.target. Oct 2 19:32:28.887650 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:32:28.887673 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:32:28.888484 systemd[1]: Starting containerd.service... Oct 2 19:32:28.890149 systemd[1]: Starting dbus.service... Oct 2 19:32:28.891728 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:32:28.893596 systemd[1]: Starting extend-filesystems.service... Oct 2 19:32:28.894364 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:32:28.895792 systemd[1]: Starting motdgen.service... Oct 2 19:32:28.897552 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:32:28.901158 systemd[1]: Starting prepare-critools.service... Oct 2 19:32:28.902786 jq[1074]: false Oct 2 19:32:28.903120 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:32:28.905048 systemd[1]: Starting sshd-keygen.service... Oct 2 19:32:28.909205 extend-filesystems[1075]: Found sr0 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda1 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda2 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda3 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found usr Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda4 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda6 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda7 Oct 2 19:32:28.909205 extend-filesystems[1075]: Found vda9 Oct 2 19:32:28.909205 extend-filesystems[1075]: Checking size of /dev/vda9 Oct 2 19:32:28.909006 systemd[1]: Starting systemd-logind.service... Oct 2 19:32:28.910298 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:32:28.910344 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:32:28.910750 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:32:28.915770 systemd[1]: Starting update-engine.service... Oct 2 19:32:28.927834 jq[1093]: true Oct 2 19:32:28.918177 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:32:28.921117 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:32:28.921280 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:32:28.922647 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:32:28.932901 jq[1099]: true Oct 2 19:32:28.922784 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:32:28.932700 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:32:28.932829 systemd[1]: Finished motdgen.service. Oct 2 19:32:28.934996 extend-filesystems[1075]: Old size kept for /dev/vda9 Oct 2 19:32:28.936941 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:32:28.937078 systemd[1]: Finished extend-filesystems.service. Oct 2 19:32:28.940538 dbus-daemon[1073]: [system] SELinux support is enabled Oct 2 19:32:28.944107 tar[1095]: ./ Oct 2 19:32:28.944107 tar[1095]: ./loopback Oct 2 19:32:28.940674 systemd[1]: Started dbus.service. Oct 2 19:32:28.942659 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:32:28.942675 systemd[1]: Reached target system-config.target. Oct 2 19:32:28.943325 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:32:28.943336 systemd[1]: Reached target user-config.target. Oct 2 19:32:28.949312 tar[1096]: crictl Oct 2 19:32:28.976199 env[1100]: time="2023-10-02T19:32:28.976132036Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:32:28.992415 tar[1095]: ./bandwidth Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.003575532Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.003773253Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.004966080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005005815Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005239964Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005269038Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005282844Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005291190Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005351192Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:32:29.005890 env[1100]: time="2023-10-02T19:32:29.005541028Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:32:29.006229 env[1100]: time="2023-10-02T19:32:29.005641907Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:32:29.006229 env[1100]: time="2023-10-02T19:32:29.005654040Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:32:29.006229 env[1100]: time="2023-10-02T19:32:29.005699175Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:32:29.006229 env[1100]: time="2023-10-02T19:32:29.005708733Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:32:29.030778 tar[1095]: ./ptp Oct 2 19:32:29.066832 tar[1095]: ./vlan Oct 2 19:32:29.100930 tar[1095]: ./host-device Oct 2 19:32:29.133150 tar[1095]: ./tuning Oct 2 19:32:29.162072 tar[1095]: ./vrf Oct 2 19:32:29.173705 systemd-logind[1085]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:32:29.173736 systemd-logind[1085]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:32:29.174350 systemd-logind[1085]: New seat seat0. Oct 2 19:32:29.176620 update_engine[1092]: I1002 19:32:29.176048 1092 main.cc:92] Flatcar Update Engine starting Oct 2 19:32:29.177269 systemd[1]: Started systemd-logind.service. Oct 2 19:32:29.181907 systemd[1]: Started update-engine.service. Oct 2 19:32:29.182072 update_engine[1092]: I1002 19:32:29.182032 1092 update_check_scheduler.cc:74] Next update check in 10m56s Oct 2 19:32:29.182695 env[1100]: time="2023-10-02T19:32:29.182645683Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:32:29.182742 env[1100]: time="2023-10-02T19:32:29.182705154Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:32:29.182742 env[1100]: time="2023-10-02T19:32:29.182724040Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:32:29.182790 env[1100]: time="2023-10-02T19:32:29.182768974Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182812 env[1100]: time="2023-10-02T19:32:29.182789232Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182832 env[1100]: time="2023-10-02T19:32:29.182807126Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182852 env[1100]: time="2023-10-02T19:32:29.182828726Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182872 env[1100]: time="2023-10-02T19:32:29.182848553Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182872 env[1100]: time="2023-10-02T19:32:29.182866517Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182908 env[1100]: time="2023-10-02T19:32:29.182883409Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182931 env[1100]: time="2023-10-02T19:32:29.182907704Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.182931 env[1100]: time="2023-10-02T19:32:29.182924245Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:32:29.183112 env[1100]: time="2023-10-02T19:32:29.183079586Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:32:29.183235 env[1100]: time="2023-10-02T19:32:29.183206154Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:32:29.183579 env[1100]: time="2023-10-02T19:32:29.183546803Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:32:29.183622 env[1100]: time="2023-10-02T19:32:29.183596776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183650 env[1100]: time="2023-10-02T19:32:29.183622745Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:32:29.183719 env[1100]: time="2023-10-02T19:32:29.183689610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183762 env[1100]: time="2023-10-02T19:32:29.183720649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183762 env[1100]: time="2023-10-02T19:32:29.183740225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183762 env[1100]: time="2023-10-02T19:32:29.183756165Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183818 env[1100]: time="2023-10-02T19:32:29.183772155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183818 env[1100]: time="2023-10-02T19:32:29.183788596Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183818 env[1100]: time="2023-10-02T19:32:29.183803404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183877 env[1100]: time="2023-10-02T19:32:29.183816939Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.183877 env[1100]: time="2023-10-02T19:32:29.183834873Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.183973212Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.183998530Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.184015001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.184029748Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.184049425Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.184064574Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.184094319Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:32:29.186277 env[1100]: time="2023-10-02T19:32:29.184139855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:32:29.184205 systemd[1]: Started locksmithd.service. Oct 2 19:32:29.185622 systemd[1]: Started containerd.service. Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.184411154Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.184478039Z" level=info msg="Connect containerd service" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.184518194Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185110966Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185291104Z" level=info msg="Start subscribing containerd event" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185352890Z" level=info msg="Start recovering state" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185418082Z" level=info msg="Start event monitor" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185438891Z" level=info msg="Start snapshots syncer" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185450613Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185458077Z" level=info msg="Start streaming server" Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185444902Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185520945Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:32:29.186705 env[1100]: time="2023-10-02T19:32:29.185584183Z" level=info msg="containerd successfully booted in 0.213139s" Oct 2 19:32:29.189580 bash[1126]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:32:29.190734 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:32:29.197067 tar[1095]: ./sbr Oct 2 19:32:29.225791 tar[1095]: ./tap Oct 2 19:32:29.254028 locksmithd[1131]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:32:29.259672 tar[1095]: ./dhcp Oct 2 19:32:29.324271 sshd_keygen[1111]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:32:29.343193 systemd[1]: Finished sshd-keygen.service. Oct 2 19:32:29.345624 systemd[1]: Starting issuegen.service... Oct 2 19:32:29.348509 tar[1095]: ./static Oct 2 19:32:29.350680 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:32:29.350889 systemd[1]: Finished issuegen.service. Oct 2 19:32:29.354818 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:32:29.361216 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:32:29.363465 systemd[1]: Started getty@tty1.service. Oct 2 19:32:29.365203 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:32:29.366149 systemd[1]: Reached target getty.target. Oct 2 19:32:29.374435 tar[1095]: ./firewall Oct 2 19:32:29.387727 systemd[1]: Created slice system-sshd.slice. Oct 2 19:32:29.389608 systemd[1]: Started sshd@0-10.0.0.16:22-10.0.0.1:46966.service. Oct 2 19:32:29.396196 systemd[1]: Finished prepare-critools.service. Oct 2 19:32:29.410924 tar[1095]: ./macvlan Oct 2 19:32:29.436637 sshd[1152]: Accepted publickey for core from 10.0.0.1 port 46966 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:29.437342 sshd[1152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:29.441782 tar[1095]: ./dummy Oct 2 19:32:29.445554 systemd[1]: Created slice user-500.slice. Oct 2 19:32:29.447395 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:32:29.450333 systemd-logind[1085]: New session 1 of user core. Oct 2 19:32:29.455015 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:32:29.457318 systemd[1]: Starting user@500.service... Oct 2 19:32:29.459676 (systemd)[1156]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:29.474983 tar[1095]: ./bridge Oct 2 19:32:29.508279 tar[1095]: ./ipvlan Oct 2 19:32:29.539006 tar[1095]: ./portmap Oct 2 19:32:29.558666 systemd[1156]: Queued start job for default target default.target. Oct 2 19:32:29.559118 systemd[1156]: Reached target paths.target. Oct 2 19:32:29.559138 systemd[1156]: Reached target sockets.target. Oct 2 19:32:29.559149 systemd[1156]: Reached target timers.target. Oct 2 19:32:29.559160 systemd[1156]: Reached target basic.target. Oct 2 19:32:29.559280 systemd[1]: Started user@500.service. Oct 2 19:32:29.559409 systemd[1156]: Reached target default.target. Oct 2 19:32:29.559445 systemd[1156]: Startup finished in 94ms. Oct 2 19:32:29.560802 systemd[1]: Started session-1.scope. Oct 2 19:32:29.569064 tar[1095]: ./host-local Oct 2 19:32:29.609156 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:32:29.615354 systemd[1]: Reached target multi-user.target. Oct 2 19:32:29.618812 systemd[1]: Started sshd@1-10.0.0.16:22-10.0.0.1:46968.service. Oct 2 19:32:29.622229 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:32:29.632099 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:32:29.632235 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:32:29.634395 systemd[1]: Startup finished in 626ms (kernel) + 6.806s (initrd) + 5.561s (userspace) = 12.995s. Oct 2 19:32:29.662871 sshd[1167]: Accepted publickey for core from 10.0.0.1 port 46968 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:29.664302 sshd[1167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:29.668437 systemd-logind[1085]: New session 2 of user core. Oct 2 19:32:29.669338 systemd[1]: Started session-2.scope. Oct 2 19:32:29.723880 sshd[1167]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:29.726859 systemd[1]: sshd@1-10.0.0.16:22-10.0.0.1:46968.service: Deactivated successfully. Oct 2 19:32:29.727566 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:32:29.728124 systemd-logind[1085]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:32:29.729556 systemd[1]: Started sshd@2-10.0.0.16:22-10.0.0.1:46980.service. Oct 2 19:32:29.730409 systemd-logind[1085]: Removed session 2. Oct 2 19:32:29.765340 sshd[1174]: Accepted publickey for core from 10.0.0.1 port 46980 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:29.766389 sshd[1174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:29.770810 systemd-logind[1085]: New session 3 of user core. Oct 2 19:32:29.771858 systemd[1]: Started session-3.scope. Oct 2 19:32:29.821618 sshd[1174]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:29.824157 systemd[1]: sshd@2-10.0.0.16:22-10.0.0.1:46980.service: Deactivated successfully. Oct 2 19:32:29.824738 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:32:29.825312 systemd-logind[1085]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:32:29.826148 systemd[1]: Started sshd@3-10.0.0.16:22-10.0.0.1:46996.service. Oct 2 19:32:29.826848 systemd-logind[1085]: Removed session 3. Oct 2 19:32:29.864863 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 46996 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:29.866864 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:29.870423 systemd-logind[1085]: New session 4 of user core. Oct 2 19:32:29.871244 systemd[1]: Started session-4.scope. Oct 2 19:32:29.927868 sshd[1180]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:29.933116 systemd[1]: sshd@3-10.0.0.16:22-10.0.0.1:46996.service: Deactivated successfully. Oct 2 19:32:29.933850 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:32:29.934556 systemd-logind[1085]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:32:29.935744 systemd[1]: Started sshd@4-10.0.0.16:22-10.0.0.1:47008.service. Oct 2 19:32:29.936754 systemd-logind[1085]: Removed session 4. Oct 2 19:32:29.972920 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 47008 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:29.974517 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:29.978147 systemd-logind[1085]: New session 5 of user core. Oct 2 19:32:29.978821 systemd[1]: Started session-5.scope. Oct 2 19:32:30.033357 sudo[1189]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:32:30.033506 sudo[1189]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:32:30.042419 dbus-daemon[1073]: \xd0]\u001b\u0001\u0001V: received setenforce notice (enforcing=-1186995376) Oct 2 19:32:30.044003 sudo[1189]: pam_unix(sudo:session): session closed for user root Oct 2 19:32:30.045672 sshd[1186]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:30.048607 systemd[1]: sshd@4-10.0.0.16:22-10.0.0.1:47008.service: Deactivated successfully. Oct 2 19:32:30.049059 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:32:30.049478 systemd-logind[1085]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:32:30.050400 systemd[1]: Started sshd@5-10.0.0.16:22-10.0.0.1:47022.service. Oct 2 19:32:30.050894 systemd-logind[1085]: Removed session 5. Oct 2 19:32:30.080383 systemd-networkd[1001]: eth0: Gained IPv6LL Oct 2 19:32:30.086125 sshd[1193]: Accepted publickey for core from 10.0.0.1 port 47022 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:30.087268 sshd[1193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:30.090376 systemd-logind[1085]: New session 6 of user core. Oct 2 19:32:30.091285 systemd[1]: Started session-6.scope. Oct 2 19:32:30.143312 sudo[1198]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:32:30.143467 sudo[1198]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:32:30.145609 sudo[1198]: pam_unix(sudo:session): session closed for user root Oct 2 19:32:30.148695 sudo[1197]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:32:30.148894 sudo[1197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:32:30.155794 systemd[1]: Stopping audit-rules.service... Oct 2 19:32:30.155000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:32:30.156749 auditctl[1201]: No rules Oct 2 19:32:30.157036 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:32:30.157209 systemd[1]: Stopped audit-rules.service. Oct 2 19:32:30.155000 audit[1201]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcfeac5bd0 a2=420 a3=0 items=0 ppid=1 pid=1201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:30.158637 systemd[1]: Starting audit-rules.service... Oct 2 19:32:30.161562 kernel: audit: type=1305 audit(1696275150.155:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:32:30.161600 kernel: audit: type=1300 audit(1696275150.155:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcfeac5bd0 a2=420 a3=0 items=0 ppid=1 pid=1201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:30.161615 kernel: audit: type=1327 audit(1696275150.155:162): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:32:30.155000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:32:30.164658 kernel: audit: type=1131 audit(1696275150.155:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.171268 augenrules[1218]: No rules Oct 2 19:32:30.171745 systemd[1]: Finished audit-rules.service. Oct 2 19:32:30.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.172539 sudo[1197]: pam_unix(sudo:session): session closed for user root Oct 2 19:32:30.173682 sshd[1193]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:30.171000 audit[1197]: USER_END pid=1197 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.176209 systemd[1]: sshd@5-10.0.0.16:22-10.0.0.1:47022.service: Deactivated successfully. Oct 2 19:32:30.176758 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:32:30.177085 kernel: audit: type=1130 audit(1696275150.170:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.177134 kernel: audit: type=1106 audit(1696275150.171:165): pid=1197 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.177151 kernel: audit: type=1104 audit(1696275150.171:166): pid=1197 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.171000 audit[1197]: CRED_DISP pid=1197 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.177299 systemd-logind[1085]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:32:30.178236 systemd[1]: Started sshd@6-10.0.0.16:22-10.0.0.1:47038.service. Oct 2 19:32:30.173000 audit[1193]: USER_END pid=1193 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:30.173000 audit[1193]: CRED_DISP pid=1193 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:30.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.16:22-10.0.0.1:47022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.16:22-10.0.0.1:47038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.179433 systemd-logind[1085]: Removed session 6. Oct 2 19:32:30.212000 audit[1224]: USER_ACCT pid=1224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:30.213924 sshd[1224]: Accepted publickey for core from 10.0.0.1 port 47038 ssh2: RSA SHA256:b8JkJ8STGPpktId2vNwDpv0odk05FCpuAkJstdQTTnk Oct 2 19:32:30.213000 audit[1224]: CRED_ACQ pid=1224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:30.213000 audit[1224]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef582c6e0 a2=3 a3=0 items=0 ppid=1 pid=1224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:30.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:30.214905 sshd[1224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:30.217983 systemd-logind[1085]: New session 7 of user core. Oct 2 19:32:30.218677 systemd[1]: Started session-7.scope. Oct 2 19:32:30.220000 audit[1224]: USER_START pid=1224 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:30.221000 audit[1226]: CRED_ACQ pid=1226 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:30.267000 audit[1227]: USER_ACCT pid=1227 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.267000 audit[1227]: CRED_REFR pid=1227 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.268511 sudo[1227]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:32:30.268664 sudo[1227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:32:30.269000 audit[1227]: USER_START pid=1227 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:30.778839 systemd[1]: Reloading. Oct 2 19:32:30.850614 /usr/lib/systemd/system-generators/torcx-generator[1257]: time="2023-10-02T19:32:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:32:30.850641 /usr/lib/systemd/system-generators/torcx-generator[1257]: time="2023-10-02T19:32:30Z" level=info msg="torcx already run" Oct 2 19:32:30.911384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:32:30.911400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:32:30.929492 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit: BPF prog-id=34 op=LOAD Oct 2 19:32:30.983000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.983000 audit: BPF prog-id=35 op=LOAD Oct 2 19:32:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit: BPF prog-id=36 op=LOAD Oct 2 19:32:30.984000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:32:30.984000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit: BPF prog-id=37 op=LOAD Oct 2 19:32:30.984000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit: BPF prog-id=38 op=LOAD Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit: BPF prog-id=39 op=LOAD Oct 2 19:32:30.985000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:32:30.985000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit: BPF prog-id=40 op=LOAD Oct 2 19:32:30.986000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.986000 audit: BPF prog-id=41 op=LOAD Oct 2 19:32:30.986000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit: BPF prog-id=42 op=LOAD Oct 2 19:32:30.987000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit: BPF prog-id=43 op=LOAD Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.987000 audit: BPF prog-id=44 op=LOAD Oct 2 19:32:30.987000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:32:30.987000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.988000 audit: BPF prog-id=45 op=LOAD Oct 2 19:32:30.988000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit: BPF prog-id=46 op=LOAD Oct 2 19:32:30.989000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit: BPF prog-id=47 op=LOAD Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:30.989000 audit: BPF prog-id=48 op=LOAD Oct 2 19:32:30.989000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:32:30.989000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:32:30.998046 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:32:32.513839 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:32:32.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:32.514324 systemd[1]: Reached target network-online.target. Oct 2 19:32:32.515547 systemd[1]: Started kubelet.service. Oct 2 19:32:32.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:32.526866 systemd[1]: Starting coreos-metadata.service... Oct 2 19:32:32.536892 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 2 19:32:32.537074 systemd[1]: Finished coreos-metadata.service. Oct 2 19:32:32.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:32.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:32.565295 kubelet[1299]: E1002 19:32:32.565230 1299 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:32:32.567208 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:32:32.567347 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:32:32.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:32:33.295591 systemd[1]: Stopped kubelet.service. Oct 2 19:32:33.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:33.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:33.308164 systemd[1]: Reloading. Oct 2 19:32:33.368172 /usr/lib/systemd/system-generators/torcx-generator[1368]: time="2023-10-02T19:32:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:32:33.368510 /usr/lib/systemd/system-generators/torcx-generator[1368]: time="2023-10-02T19:32:33Z" level=info msg="torcx already run" Oct 2 19:32:33.433231 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:32:33.433248 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:32:33.452450 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit: BPF prog-id=49 op=LOAD Oct 2 19:32:33.505000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit: BPF prog-id=50 op=LOAD Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit: BPF prog-id=51 op=LOAD Oct 2 19:32:33.505000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:32:33.505000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit: BPF prog-id=52 op=LOAD Oct 2 19:32:33.506000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit: BPF prog-id=53 op=LOAD Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.506000 audit: BPF prog-id=54 op=LOAD Oct 2 19:32:33.506000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:32:33.506000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.507000 audit: BPF prog-id=55 op=LOAD Oct 2 19:32:33.507000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit: BPF prog-id=56 op=LOAD Oct 2 19:32:33.508000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.508000 audit: BPF prog-id=57 op=LOAD Oct 2 19:32:33.508000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit: BPF prog-id=58 op=LOAD Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit: BPF prog-id=59 op=LOAD Oct 2 19:32:33.509000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:32:33.509000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.509000 audit: BPF prog-id=60 op=LOAD Oct 2 19:32:33.509000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit: BPF prog-id=61 op=LOAD Oct 2 19:32:33.511000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit: BPF prog-id=62 op=LOAD Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.511000 audit: BPF prog-id=63 op=LOAD Oct 2 19:32:33.511000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:32:33.511000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:32:33.525183 systemd[1]: Started kubelet.service. Oct 2 19:32:33.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:33.573771 kubelet[1408]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:32:33.573771 kubelet[1408]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:32:33.573771 kubelet[1408]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:32:33.573771 kubelet[1408]: I1002 19:32:33.573734 1408 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:32:33.707094 kubelet[1408]: I1002 19:32:33.707037 1408 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:32:33.707094 kubelet[1408]: I1002 19:32:33.707080 1408 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:32:33.707358 kubelet[1408]: I1002 19:32:33.707340 1408 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:32:33.712303 kubelet[1408]: I1002 19:32:33.712226 1408 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:32:33.719158 kubelet[1408]: I1002 19:32:33.719119 1408 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:32:33.719367 kubelet[1408]: I1002 19:32:33.719350 1408 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:32:33.719560 kubelet[1408]: I1002 19:32:33.719534 1408 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:32:33.719660 kubelet[1408]: I1002 19:32:33.719566 1408 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:32:33.719660 kubelet[1408]: I1002 19:32:33.719576 1408 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:32:33.719701 kubelet[1408]: I1002 19:32:33.719694 1408 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:32:33.719785 kubelet[1408]: I1002 19:32:33.719771 1408 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:32:33.719808 kubelet[1408]: I1002 19:32:33.719786 1408 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:32:33.719808 kubelet[1408]: I1002 19:32:33.719806 1408 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:32:33.719856 kubelet[1408]: I1002 19:32:33.719819 1408 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:32:33.719982 kubelet[1408]: E1002 19:32:33.719950 1408 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:33.720408 kubelet[1408]: E1002 19:32:33.720217 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:33.720527 kubelet[1408]: I1002 19:32:33.720498 1408 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:32:33.720720 kubelet[1408]: W1002 19:32:33.720698 1408 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:32:33.721197 kubelet[1408]: I1002 19:32:33.721179 1408 server.go:1232] "Started kubelet" Oct 2 19:32:33.721376 kubelet[1408]: I1002 19:32:33.721356 1408 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:32:33.721540 kubelet[1408]: I1002 19:32:33.721526 1408 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:32:33.722228 kubelet[1408]: I1002 19:32:33.721697 1408 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:32:33.722228 kubelet[1408]: I1002 19:32:33.722095 1408 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:32:33.721000 audit[1408]: AVC avc: denied { mac_admin } for pid=1408 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.721000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:32:33.723111 kubelet[1408]: E1002 19:32:33.723082 1408 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:32:33.721000 audit[1408]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006591a0 a1=c00011b9f8 a2=c000659170 a3=25 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.721000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:32:33.721000 audit[1408]: AVC avc: denied { mac_admin } for pid=1408 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.721000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:32:33.721000 audit[1408]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb45c0 a1=c00011ba10 a2=c000659230 a3=25 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.721000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:32:33.723403 kubelet[1408]: E1002 19:32:33.723119 1408 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:32:33.723403 kubelet[1408]: I1002 19:32:33.723175 1408 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:32:33.723403 kubelet[1408]: I1002 19:32:33.723229 1408 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:32:33.723403 kubelet[1408]: I1002 19:32:33.723316 1408 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:32:33.724349 kubelet[1408]: E1002 19:32:33.724337 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:33.724455 kubelet[1408]: I1002 19:32:33.724440 1408 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:32:33.724589 kubelet[1408]: I1002 19:32:33.724576 1408 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:32:33.724697 kubelet[1408]: I1002 19:32:33.724685 1408 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:32:33.734017 kubelet[1408]: W1002 19:32:33.733992 1408 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:32:33.734355 kubelet[1408]: E1002 19:32:33.734333 1408 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:32:33.734355 kubelet[1408]: E1002 19:32:33.734159 1408 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.16\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 2 19:32:33.734355 kubelet[1408]: W1002 19:32:33.734191 1408 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.16" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:32:33.734503 kubelet[1408]: E1002 19:32:33.734366 1408 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.16" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:32:33.734503 kubelet[1408]: W1002 19:32:33.734212 1408 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:32:33.734503 kubelet[1408]: E1002 19:32:33.734376 1408 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:32:33.734592 kubelet[1408]: E1002 19:32:33.734307 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dadeedcb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 721159115, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 721159115, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.736010 kubelet[1408]: E1002 19:32:33.735934 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dafc9878", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 723103352, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 723103352, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.744366 kubelet[1408]: I1002 19:32:33.744342 1408 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:32:33.744366 kubelet[1408]: I1002 19:32:33.744355 1408 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:32:33.744366 kubelet[1408]: I1002 19:32:33.744367 1408 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:32:33.746980 kubelet[1408]: E1002 19:32:33.746902 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39b073", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.16 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743884403, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743884403, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.747237 kubelet[1408]: I1002 19:32:33.747219 1408 policy_none.go:49] "None policy: Start" Oct 2 19:32:33.747637 kubelet[1408]: I1002 19:32:33.747627 1408 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:32:33.747729 kubelet[1408]: I1002 19:32:33.747717 1408 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:32:33.747813 kubelet[1408]: E1002 19:32:33.747634 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39cc51", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.16 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743891537, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743891537, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.748418 kubelet[1408]: E1002 19:32:33.748360 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39d5f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.16 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743894001, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743894001, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.752866 systemd[1]: Created slice kubepods.slice. Oct 2 19:32:33.751000 audit[1424]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.751000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3e169b10 a2=0 a3=7ffe3e169afc items=0 ppid=1408 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:32:33.753000 audit[1427]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.753000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffc3420c50 a2=0 a3=7fffc3420c3c items=0 ppid=1408 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:32:33.757081 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:32:33.759422 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:32:33.765899 kubelet[1408]: I1002 19:32:33.765868 1408 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:32:33.764000 audit[1408]: AVC avc: denied { mac_admin } for pid=1408 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:33.764000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:32:33.764000 audit[1408]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e09ec0 a1=c000f2f0b0 a2=c000e09e90 a3=25 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.764000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:32:33.766173 kubelet[1408]: I1002 19:32:33.765945 1408 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:32:33.766173 kubelet[1408]: I1002 19:32:33.766104 1408 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:32:33.766652 kubelet[1408]: E1002 19:32:33.766606 1408 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.16\" not found" Oct 2 19:32:33.768143 kubelet[1408]: E1002 19:32:33.768050 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dd9e21dc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 767244252, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 767244252, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.755000 audit[1429]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.774523 kernel: kauditd_printk_skb: 384 callbacks suppressed Oct 2 19:32:33.774564 kernel: audit: type=1325 audit(1696275153.755:536): table=filter:4 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.774580 kernel: audit: type=1300 audit(1696275153.755:536): arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc7cdb2610 a2=0 a3=7ffc7cdb25fc items=0 ppid=1408 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.755000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc7cdb2610 a2=0 a3=7ffc7cdb25fc items=0 ppid=1408 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.778315 kernel: audit: type=1327 audit(1696275153.755:536): proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:32:33.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:32:33.779484 kernel: audit: type=1325 audit(1696275153.771:537): table=filter:5 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.771000 audit[1434]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.781156 kernel: audit: type=1300 audit(1696275153.771:537): arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0067c460 a2=0 a3=7ffc0067c44c items=0 ppid=1408 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.771000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0067c460 a2=0 a3=7ffc0067c44c items=0 ppid=1408 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.784249 kernel: audit: type=1327 audit(1696275153.771:537): proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:32:33.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:32:33.815000 audit[1439]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.817416 kubelet[1408]: I1002 19:32:33.817392 1408 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:32:33.818112 kubelet[1408]: I1002 19:32:33.818097 1408 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:32:33.818156 kubelet[1408]: I1002 19:32:33.818121 1408 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:32:33.818156 kubelet[1408]: I1002 19:32:33.818141 1408 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:32:33.818201 kubelet[1408]: E1002 19:32:33.818177 1408 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:32:33.823291 kernel: audit: type=1325 audit(1696275153.815:538): table=filter:6 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.823381 kernel: audit: type=1300 audit(1696275153.815:538): arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe49356e10 a2=0 a3=7ffe49356dfc items=0 ppid=1408 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.823402 kernel: audit: type=1327 audit(1696275153.815:538): proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:32:33.815000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe49356e10 a2=0 a3=7ffe49356dfc items=0 ppid=1408 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:32:33.823566 kubelet[1408]: W1002 19:32:33.819404 1408 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:32:33.823566 kubelet[1408]: E1002 19:32:33.819431 1408 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:32:33.816000 audit[1440]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:33.825807 kubelet[1408]: I1002 19:32:33.825786 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.16" Oct 2 19:32:33.826851 kubelet[1408]: E1002 19:32:33.826822 1408 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.16" Oct 2 19:32:33.827161 kubelet[1408]: E1002 19:32:33.827093 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39b073", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.16 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743884403, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 825745813, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39b073" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.827853 kernel: audit: type=1325 audit(1696275153.816:539): table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:33.816000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe70c4b020 a2=0 a3=7ffe70c4b00c items=0 ppid=1408 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:32:33.816000 audit[1441]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.816000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7418afc0 a2=0 a3=7ffe7418afac items=0 ppid=1408 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:32:33.817000 audit[1442]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:33.817000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc15891970 a2=0 a3=7ffc1589195c items=0 ppid=1408 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:32:33.818000 audit[1443]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.818000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc92cafe70 a2=0 a3=7ffc92cafe5c items=0 ppid=1408 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:32:33.818000 audit[1444]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:33.818000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec2dc06e0 a2=0 a3=7ffec2dc06cc items=0 ppid=1408 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:32:33.818000 audit[1445]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:33.818000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff024094c0 a2=0 a3=7fff024094ac items=0 ppid=1408 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:32:33.819000 audit[1446]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:33.819000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffede5b22f0 a2=0 a3=7ffede5b22dc items=0 ppid=1408 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:33.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:32:33.828740 kubelet[1408]: E1002 19:32:33.827883 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39cc51", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.16 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743891537, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 825750652, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39cc51" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.831542 kubelet[1408]: E1002 19:32:33.831431 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39d5f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.16 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743894001, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 825753397, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39d5f1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:33.936000 kubelet[1408]: E1002 19:32:33.935949 1408 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.16\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Oct 2 19:32:34.028072 kubelet[1408]: I1002 19:32:34.028004 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.16" Oct 2 19:32:34.029445 kubelet[1408]: E1002 19:32:34.029408 1408 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.16" Oct 2 19:32:34.029640 kubelet[1408]: E1002 19:32:34.029491 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39b073", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.16 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743884403, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 34, 27954226, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39b073" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:34.030623 kubelet[1408]: E1002 19:32:34.030539 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39cc51", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.16 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743891537, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 34, 27965086, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39cc51" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:34.031627 kubelet[1408]: E1002 19:32:34.031518 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39d5f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.16 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743894001, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 34, 27967921, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39d5f1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:34.361268 kubelet[1408]: E1002 19:32:34.348794 1408 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.16\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Oct 2 19:32:34.450625 kubelet[1408]: I1002 19:32:34.449675 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.16" Oct 2 19:32:34.460738 kubelet[1408]: E1002 19:32:34.460318 1408 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.16" Oct 2 19:32:34.460738 kubelet[1408]: E1002 19:32:34.460383 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39b073", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.16 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743884403, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 34, 449621362, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39b073" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:34.472848 kubelet[1408]: E1002 19:32:34.472425 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39cc51", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.16 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743891537, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 34, 449629037, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39cc51" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:34.484644 kubelet[1408]: E1002 19:32:34.484429 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16.178a6143dc39d5f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.16", UID:"10.0.0.16", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.16 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.16"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 32, 33, 743894001, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 32, 34, 449633124, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.16"}': 'events "10.0.0.16.178a6143dc39d5f1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:32:34.637789 kubelet[1408]: W1002 19:32:34.637625 1408 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.16" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:32:34.637789 kubelet[1408]: E1002 19:32:34.637683 1408 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.16" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:32:34.709682 kubelet[1408]: I1002 19:32:34.709199 1408 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:32:34.721089 kubelet[1408]: E1002 19:32:34.720351 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:35.185475 kubelet[1408]: E1002 19:32:35.185359 1408 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.16\" not found" node="10.0.0.16" Oct 2 19:32:35.267476 kubelet[1408]: I1002 19:32:35.267439 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.16" Oct 2 19:32:35.293150 kubelet[1408]: E1002 19:32:35.292672 1408 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.16" not found Oct 2 19:32:35.293150 kubelet[1408]: I1002 19:32:35.292791 1408 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.16" Oct 2 19:32:35.365467 kubelet[1408]: E1002 19:32:35.363507 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:35.472135 kubelet[1408]: E1002 19:32:35.467178 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:35.567439 kubelet[1408]: E1002 19:32:35.567360 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:35.633063 sudo[1227]: pam_unix(sudo:session): session closed for user root Oct 2 19:32:35.631000 audit[1227]: USER_END pid=1227 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:35.631000 audit[1227]: CRED_DISP pid=1227 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:32:35.639780 sshd[1224]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:35.641000 audit[1224]: USER_END pid=1224 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:35.641000 audit[1224]: CRED_DISP pid=1224 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:32:35.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.16:22-10.0.0.1:47038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:35.644826 systemd[1]: sshd@6-10.0.0.16:22-10.0.0.1:47038.service: Deactivated successfully. Oct 2 19:32:35.645701 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:32:35.651132 systemd-logind[1085]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:32:35.653924 systemd-logind[1085]: Removed session 7. Oct 2 19:32:35.667664 kubelet[1408]: E1002 19:32:35.667577 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:35.721043 kubelet[1408]: E1002 19:32:35.720879 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:35.768293 kubelet[1408]: E1002 19:32:35.768108 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:35.870202 kubelet[1408]: E1002 19:32:35.870103 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:35.971199 kubelet[1408]: E1002 19:32:35.971109 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.072824 kubelet[1408]: E1002 19:32:36.072096 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.173443 kubelet[1408]: E1002 19:32:36.173343 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.275029 kubelet[1408]: E1002 19:32:36.274192 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.375208 kubelet[1408]: E1002 19:32:36.374663 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.475634 kubelet[1408]: E1002 19:32:36.475541 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.575972 kubelet[1408]: E1002 19:32:36.575818 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.686335 kubelet[1408]: E1002 19:32:36.679114 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.724241 kubelet[1408]: E1002 19:32:36.724136 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:36.786599 kubelet[1408]: E1002 19:32:36.786492 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.890056 kubelet[1408]: E1002 19:32:36.887124 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:36.996384 kubelet[1408]: E1002 19:32:36.990114 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:37.097157 kubelet[1408]: E1002 19:32:37.097089 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:37.197880 kubelet[1408]: E1002 19:32:37.197795 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:37.298414 kubelet[1408]: E1002 19:32:37.298193 1408 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.16\" not found" Oct 2 19:32:37.399854 kubelet[1408]: I1002 19:32:37.399817 1408 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:32:37.400155 env[1100]: time="2023-10-02T19:32:37.400116864Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:32:37.400470 kubelet[1408]: I1002 19:32:37.400287 1408 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:32:37.724614 kubelet[1408]: I1002 19:32:37.724534 1408 apiserver.go:52] "Watching apiserver" Oct 2 19:32:37.724614 kubelet[1408]: E1002 19:32:37.724575 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:37.728190 kubelet[1408]: I1002 19:32:37.728151 1408 topology_manager.go:215] "Topology Admit Handler" podUID="b4215812-8bbf-4944-ae80-be9751b5c14f" podNamespace="calico-system" podName="calico-node-qnp27" Oct 2 19:32:37.728290 kubelet[1408]: I1002 19:32:37.728238 1408 topology_manager.go:215] "Topology Admit Handler" podUID="c808ec5b-295b-45de-894f-b9ab28845a43" podNamespace="kube-system" podName="kube-proxy-qpzz2" Oct 2 19:32:37.736548 systemd[1]: Created slice kubepods-besteffort-podc808ec5b_295b_45de_894f_b9ab28845a43.slice. Oct 2 19:32:37.752467 systemd[1]: Created slice kubepods-besteffort-podb4215812_8bbf_4944_ae80_be9751b5c14f.slice. Oct 2 19:32:37.825534 kubelet[1408]: I1002 19:32:37.825496 1408 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:32:37.877670 kubelet[1408]: I1002 19:32:37.877620 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-lib-modules\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.877670 kubelet[1408]: I1002 19:32:37.877678 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b4215812-8bbf-4944-ae80-be9751b5c14f-node-certs\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.877670 kubelet[1408]: I1002 19:32:37.877709 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-cni-log-dir\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878096 kubelet[1408]: I1002 19:32:37.877758 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-flexvol-driver-host\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878096 kubelet[1408]: I1002 19:32:37.877827 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-xtables-lock\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878096 kubelet[1408]: I1002 19:32:37.877867 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-cni-net-dir\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878096 kubelet[1408]: I1002 19:32:37.877912 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qfvvv\" (UniqueName: \"kubernetes.io/projected/b4215812-8bbf-4944-ae80-be9751b5c14f-kube-api-access-qfvvv\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878096 kubelet[1408]: I1002 19:32:37.878046 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c808ec5b-295b-45de-894f-b9ab28845a43-lib-modules\") pod \"kube-proxy-qpzz2\" (UID: \"c808ec5b-295b-45de-894f-b9ab28845a43\") " pod="kube-system/kube-proxy-qpzz2" Oct 2 19:32:37.878571 kubelet[1408]: I1002 19:32:37.878101 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b4215812-8bbf-4944-ae80-be9751b5c14f-tigera-ca-bundle\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878571 kubelet[1408]: I1002 19:32:37.878130 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-var-run-calico\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878571 kubelet[1408]: I1002 19:32:37.878161 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-cni-bin-dir\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878571 kubelet[1408]: I1002 19:32:37.878218 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-var-lib-calico\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.878571 kubelet[1408]: I1002 19:32:37.878244 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c808ec5b-295b-45de-894f-b9ab28845a43-kube-proxy\") pod \"kube-proxy-qpzz2\" (UID: \"c808ec5b-295b-45de-894f-b9ab28845a43\") " pod="kube-system/kube-proxy-qpzz2" Oct 2 19:32:37.878965 kubelet[1408]: I1002 19:32:37.878282 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c808ec5b-295b-45de-894f-b9ab28845a43-xtables-lock\") pod \"kube-proxy-qpzz2\" (UID: \"c808ec5b-295b-45de-894f-b9ab28845a43\") " pod="kube-system/kube-proxy-qpzz2" Oct 2 19:32:37.878965 kubelet[1408]: I1002 19:32:37.878306 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bk78c\" (UniqueName: \"kubernetes.io/projected/c808ec5b-295b-45de-894f-b9ab28845a43-kube-api-access-bk78c\") pod \"kube-proxy-qpzz2\" (UID: \"c808ec5b-295b-45de-894f-b9ab28845a43\") " pod="kube-system/kube-proxy-qpzz2" Oct 2 19:32:37.878965 kubelet[1408]: I1002 19:32:37.878326 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b4215812-8bbf-4944-ae80-be9751b5c14f-policysync\") pod \"calico-node-qnp27\" (UID: \"b4215812-8bbf-4944-ae80-be9751b5c14f\") " pod="calico-system/calico-node-qnp27" Oct 2 19:32:37.981416 kubelet[1408]: E1002 19:32:37.981311 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:37.981416 kubelet[1408]: W1002 19:32:37.981334 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:37.981416 kubelet[1408]: E1002 19:32:37.981356 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:37.983560 kubelet[1408]: E1002 19:32:37.983539 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:37.983709 kubelet[1408]: W1002 19:32:37.983693 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:37.983784 kubelet[1408]: E1002 19:32:37.983770 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:38.030200 kubelet[1408]: E1002 19:32:38.030057 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:38.030200 kubelet[1408]: W1002 19:32:38.030081 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:38.030200 kubelet[1408]: E1002 19:32:38.030107 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:38.031347 kubelet[1408]: E1002 19:32:38.031319 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:38.031347 kubelet[1408]: W1002 19:32:38.031334 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:38.031347 kubelet[1408]: E1002 19:32:38.031351 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:38.052653 kubelet[1408]: E1002 19:32:38.052599 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:38.053474 env[1100]: time="2023-10-02T19:32:38.053429519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qpzz2,Uid:c808ec5b-295b-45de-894f-b9ab28845a43,Namespace:kube-system,Attempt:0,}" Oct 2 19:32:38.054666 kubelet[1408]: E1002 19:32:38.054651 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:38.055013 env[1100]: time="2023-10-02T19:32:38.054978794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qnp27,Uid:b4215812-8bbf-4944-ae80-be9751b5c14f,Namespace:calico-system,Attempt:0,}" Oct 2 19:32:38.724742 kubelet[1408]: E1002 19:32:38.724700 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:39.726318 kubelet[1408]: E1002 19:32:39.726238 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:40.181650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2079510274.mount: Deactivated successfully. Oct 2 19:32:40.229225 env[1100]: time="2023-10-02T19:32:40.229122921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.231477 env[1100]: time="2023-10-02T19:32:40.231430408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.281994 env[1100]: time="2023-10-02T19:32:40.278516361Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.292949 env[1100]: time="2023-10-02T19:32:40.290970427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.292949 env[1100]: time="2023-10-02T19:32:40.291994066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.296243 env[1100]: time="2023-10-02T19:32:40.294289381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.306462 env[1100]: time="2023-10-02T19:32:40.306337696Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.316820 env[1100]: time="2023-10-02T19:32:40.316743571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:40.360450 env[1100]: time="2023-10-02T19:32:40.360353314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:32:40.360643 env[1100]: time="2023-10-02T19:32:40.360417896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:32:40.360643 env[1100]: time="2023-10-02T19:32:40.360433064Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:32:40.360643 env[1100]: time="2023-10-02T19:32:40.360598224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33001ba756a56cf21acc9ea26718e43ed890ecbc08b78d677610564f0a713125 pid=1466 runtime=io.containerd.runc.v2 Oct 2 19:32:40.383237 systemd[1]: Started cri-containerd-33001ba756a56cf21acc9ea26718e43ed890ecbc08b78d677610564f0a713125.scope. Oct 2 19:32:40.389583 env[1100]: time="2023-10-02T19:32:40.389379048Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:32:40.389583 env[1100]: time="2023-10-02T19:32:40.389432558Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:32:40.389583 env[1100]: time="2023-10-02T19:32:40.389447076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:32:40.390004 env[1100]: time="2023-10-02T19:32:40.389961230Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0 pid=1493 runtime=io.containerd.runc.v2 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.413303 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:32:40.413491 kernel: audit: type=1400 audit(1696275160.400:551): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.413520 kernel: audit: type=1400 audit(1696275160.400:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.413545 kernel: audit: type=1400 audit(1696275160.400:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.413577 kernel: audit: type=1400 audit(1696275160.400:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.422213 kernel: audit: type=1400 audit(1696275160.400:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.422405 kernel: audit: type=1400 audit(1696275160.400:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.422430 kernel: audit: type=1400 audit(1696275160.400:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.423957 kernel: audit: type=1400 audit(1696275160.400:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.426497 kernel: audit: type=1400 audit(1696275160.400:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.430284 kernel: audit: type=1400 audit(1696275160.403:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.403000 audit: BPF prog-id=64 op=LOAD Oct 2 19:32:40.403000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.403000 audit[1476]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1466 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303031626137353661353663663231616363396561323637313865 Oct 2 19:32:40.403000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.403000 audit[1476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1466 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303031626137353661353663663231616363396561323637313865 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.404000 audit: BPF prog-id=65 op=LOAD Oct 2 19:32:40.404000 audit[1476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001923e0 items=0 ppid=1466 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303031626137353661353663663231616363396561323637313865 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.407000 audit: BPF prog-id=66 op=LOAD Oct 2 19:32:40.407000 audit[1476]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000192428 items=0 ppid=1466 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303031626137353661353663663231616363396561323637313865 Oct 2 19:32:40.421000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:32:40.421000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { perfmon } for pid=1476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit[1476]: AVC avc: denied { bpf } for pid=1476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.421000 audit: BPF prog-id=67 op=LOAD Oct 2 19:32:40.421000 audit[1476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000192838 items=0 ppid=1466 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303031626137353661353663663231616363396561323637313865 Oct 2 19:32:40.432163 systemd[1]: Started cri-containerd-ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0.scope. Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.447000 audit: BPF prog-id=68 op=LOAD Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1493 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303763313935316361653665386162396539326436393937353233 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1493 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303763313935316361653665386162396539326436393937353233 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit: BPF prog-id=69 op=LOAD Oct 2 19:32:40.448000 audit[1511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000208d20 items=0 ppid=1493 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303763313935316361653665386162396539326436393937353233 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.448000 audit: BPF prog-id=70 op=LOAD Oct 2 19:32:40.448000 audit[1511]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000208d68 items=0 ppid=1493 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303763313935316361653665386162396539326436393937353233 Oct 2 19:32:40.449000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:32:40.449000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { perfmon } for pid=1511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit[1511]: AVC avc: denied { bpf } for pid=1511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:40.449000 audit: BPF prog-id=71 op=LOAD Oct 2 19:32:40.449000 audit[1511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000209178 items=0 ppid=1493 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:40.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303763313935316361653665386162396539326436393937353233 Oct 2 19:32:40.452812 env[1100]: time="2023-10-02T19:32:40.452765971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qpzz2,Uid:c808ec5b-295b-45de-894f-b9ab28845a43,Namespace:kube-system,Attempt:0,} returns sandbox id \"33001ba756a56cf21acc9ea26718e43ed890ecbc08b78d677610564f0a713125\"" Oct 2 19:32:40.456909 kubelet[1408]: E1002 19:32:40.454354 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:40.460220 env[1100]: time="2023-10-02T19:32:40.460166931Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:32:40.470835 env[1100]: time="2023-10-02T19:32:40.470744638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qnp27,Uid:b4215812-8bbf-4944-ae80-be9751b5c14f,Namespace:calico-system,Attempt:0,} returns sandbox id \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\"" Oct 2 19:32:40.471810 kubelet[1408]: E1002 19:32:40.471569 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:40.732076 kubelet[1408]: E1002 19:32:40.727316 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:41.734524 kubelet[1408]: E1002 19:32:41.734412 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:42.391025 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1768428629.mount: Deactivated successfully. Oct 2 19:32:42.738082 kubelet[1408]: E1002 19:32:42.737975 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:43.741057 kubelet[1408]: E1002 19:32:43.740958 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:43.845167 env[1100]: time="2023-10-02T19:32:43.834054825Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:43.954851 env[1100]: time="2023-10-02T19:32:43.953716633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:43.972229 env[1100]: time="2023-10-02T19:32:43.971556179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:43.997427 env[1100]: time="2023-10-02T19:32:43.997274800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:44.002887 env[1100]: time="2023-10-02T19:32:43.998219292Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:32:44.002887 env[1100]: time="2023-10-02T19:32:44.002529455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:32:44.007059 env[1100]: time="2023-10-02T19:32:44.004069523Z" level=info msg="CreateContainer within sandbox \"33001ba756a56cf21acc9ea26718e43ed890ecbc08b78d677610564f0a713125\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:32:44.205475 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1518890402.mount: Deactivated successfully. Oct 2 19:32:44.358934 env[1100]: time="2023-10-02T19:32:44.358167333Z" level=info msg="CreateContainer within sandbox \"33001ba756a56cf21acc9ea26718e43ed890ecbc08b78d677610564f0a713125\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3842688300aa8111469ad6d0ba4348501a6fc65b1f64b176320c5b85944e406f\"" Oct 2 19:32:44.362809 env[1100]: time="2023-10-02T19:32:44.359246587Z" level=info msg="StartContainer for \"3842688300aa8111469ad6d0ba4348501a6fc65b1f64b176320c5b85944e406f\"" Oct 2 19:32:44.481565 systemd[1]: Started cri-containerd-3842688300aa8111469ad6d0ba4348501a6fc65b1f64b176320c5b85944e406f.scope. Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1466 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343236383833303061613831313134363961643664306261343334 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.539000 audit: BPF prog-id=72 op=LOAD Oct 2 19:32:44.539000 audit[1547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003089d0 items=0 ppid=1466 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343236383833303061613831313134363961643664306261343334 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.541000 audit: BPF prog-id=73 op=LOAD Oct 2 19:32:44.541000 audit[1547]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000308a18 items=0 ppid=1466 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343236383833303061613831313134363961643664306261343334 Oct 2 19:32:44.542000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:32:44.542000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:44.542000 audit: BPF prog-id=74 op=LOAD Oct 2 19:32:44.542000 audit[1547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000308aa8 items=0 ppid=1466 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343236383833303061613831313134363961643664306261343334 Oct 2 19:32:44.647345 env[1100]: time="2023-10-02T19:32:44.646010932Z" level=info msg="StartContainer for \"3842688300aa8111469ad6d0ba4348501a6fc65b1f64b176320c5b85944e406f\" returns successfully" Oct 2 19:32:44.755496 kubelet[1408]: E1002 19:32:44.755116 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:44.865000 audit[1598]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1598 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:44.865000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc413978c0 a2=0 a3=7ffc413978ac items=0 ppid=1558 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:32:44.870000 audit[1599]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1599 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:44.870000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee45c8810 a2=0 a3=7ffee45c87fc items=0 ppid=1558 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:32:44.872000 audit[1600]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.872000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee55a2b10 a2=0 a3=7ffee55a2afc items=0 ppid=1558 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:32:44.874000 audit[1601]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1601 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.874000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd53bdb1d0 a2=0 a3=7ffd53bdb1bc items=0 ppid=1558 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:32:44.875000 audit[1602]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.875000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc48eeb130 a2=0 a3=7ffc48eeb11c items=0 ppid=1558 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:32:44.879000 audit[1603]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1603 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:44.879000 audit[1603]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc1e7dc70 a2=0 a3=7fffc1e7dc5c items=0 ppid=1558 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:32:44.936088 kubelet[1408]: E1002 19:32:44.935485 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:44.967000 audit[1604]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.967000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3bf4b020 a2=0 a3=7ffc3bf4b00c items=0 ppid=1558 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:32:44.973000 audit[1606]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1606 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.973000 audit[1606]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeea58cb50 a2=0 a3=7ffeea58cb3c items=0 ppid=1558 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:32:44.985000 audit[1609]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.985000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7d923190 a2=0 a3=7ffe7d92317c items=0 ppid=1558 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:32:44.987000 audit[1610]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.987000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddf194660 a2=0 a3=7ffddf19464c items=0 ppid=1558 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:32:44.987000 audit[1612]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.987000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca4411500 a2=0 a3=7ffca44114ec items=0 ppid=1558 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:32:44.994146 kubelet[1408]: I1002 19:32:44.993757 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qpzz2" podStartSLOduration=6.451091989 podCreationTimestamp="2023-10-02 19:32:35 +0000 UTC" firstStartedPulling="2023-10-02 19:32:40.459597523 +0000 UTC m=+6.931036048" lastFinishedPulling="2023-10-02 19:32:44.002179709 +0000 UTC m=+10.473618234" observedRunningTime="2023-10-02 19:32:44.993378721 +0000 UTC m=+11.464817266" watchObservedRunningTime="2023-10-02 19:32:44.993674175 +0000 UTC m=+11.465112720" Oct 2 19:32:44.996000 audit[1613]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:44.996000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc29873e20 a2=0 a3=7ffc29873e0c items=0 ppid=1558 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:44.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:32:45.005000 audit[1615]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.005000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd49064eb0 a2=0 a3=7ffd49064e9c items=0 ppid=1558 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:32:45.010580 kubelet[1408]: E1002 19:32:45.010532 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.010580 kubelet[1408]: W1002 19:32:45.010568 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.010698 kubelet[1408]: E1002 19:32:45.010604 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.010959 kubelet[1408]: E1002 19:32:45.010928 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.011012 kubelet[1408]: W1002 19:32:45.010955 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.011012 kubelet[1408]: E1002 19:32:45.010990 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.011368 kubelet[1408]: E1002 19:32:45.011334 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.011368 kubelet[1408]: W1002 19:32:45.011360 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.011454 kubelet[1408]: E1002 19:32:45.011375 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.011583 kubelet[1408]: E1002 19:32:45.011563 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.011583 kubelet[1408]: W1002 19:32:45.011575 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.011677 kubelet[1408]: E1002 19:32:45.011588 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.011779 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.011803 kubelet[1408]: W1002 19:32:45.011790 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.011802 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.011945 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.011803 kubelet[1408]: W1002 19:32:45.011953 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.011975 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.012134 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.011803 kubelet[1408]: W1002 19:32:45.012143 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.012158 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.011803 kubelet[1408]: E1002 19:32:45.012342 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.014581 kubelet[1408]: W1002 19:32:45.012351 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.014581 kubelet[1408]: E1002 19:32:45.012363 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.014581 kubelet[1408]: E1002 19:32:45.012522 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.014581 kubelet[1408]: W1002 19:32:45.012530 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.014581 kubelet[1408]: E1002 19:32:45.012542 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.014581 kubelet[1408]: E1002 19:32:45.012707 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.014581 kubelet[1408]: W1002 19:32:45.012716 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.014581 kubelet[1408]: E1002 19:32:45.012728 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.016839 kubelet[1408]: E1002 19:32:45.015046 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.016839 kubelet[1408]: W1002 19:32:45.015065 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.016839 kubelet[1408]: E1002 19:32:45.015091 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.017179 kubelet[1408]: E1002 19:32:45.017142 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.017179 kubelet[1408]: W1002 19:32:45.017176 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.017299 kubelet[1408]: E1002 19:32:45.017198 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.017467 kubelet[1408]: E1002 19:32:45.017453 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.017556 kubelet[1408]: W1002 19:32:45.017540 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.016000 audit[1638]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.016000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffb437c510 a2=0 a3=7fffb437c4fc items=0 ppid=1558 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.017636 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.017829 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021098 kubelet[1408]: W1002 19:32:45.017841 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.017858 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.018010 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021098 kubelet[1408]: W1002 19:32:45.018019 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.018034 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.018191 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021098 kubelet[1408]: W1002 19:32:45.018199 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021098 kubelet[1408]: E1002 19:32:45.018212 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018384 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021400 kubelet[1408]: W1002 19:32:45.018392 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018406 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018557 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021400 kubelet[1408]: W1002 19:32:45.018566 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018581 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018723 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021400 kubelet[1408]: W1002 19:32:45.018731 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018755 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.021400 kubelet[1408]: E1002 19:32:45.018893 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.021694 kubelet[1408]: W1002 19:32:45.018901 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.021694 kubelet[1408]: E1002 19:32:45.018912 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.022000 audit[1639]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.022000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe13c960b0 a2=0 a3=7ffe13c9609c items=0 ppid=1558 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:32:45.025000 audit[1641]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.025000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebe6c9060 a2=0 a3=7ffebe6c904c items=0 ppid=1558 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:32:45.031000 audit[1642]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.031000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe948266a0 a2=0 a3=7ffe9482668c items=0 ppid=1558 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:32:45.041000 audit[1644]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.041000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcebefaa80 a2=0 a3=7ffcebefaa6c items=0 ppid=1558 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:32:45.049000 audit[1647]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.049000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca2157e70 a2=0 a3=7ffca2157e5c items=0 ppid=1558 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:32:45.053000 audit[1650]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.053000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe27212430 a2=0 a3=7ffe2721241c items=0 ppid=1558 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:32:45.054000 audit[1651]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.054000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff80a25300 a2=0 a3=7fff80a252ec items=0 ppid=1558 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:32:45.097822 kubelet[1408]: E1002 19:32:45.097776 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.097822 kubelet[1408]: W1002 19:32:45.097803 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.097822 kubelet[1408]: E1002 19:32:45.097832 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.098085 kubelet[1408]: E1002 19:32:45.098060 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.098085 kubelet[1408]: W1002 19:32:45.098067 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.098085 kubelet[1408]: E1002 19:32:45.098079 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.098566 kubelet[1408]: E1002 19:32:45.098250 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.098566 kubelet[1408]: W1002 19:32:45.098271 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.098566 kubelet[1408]: E1002 19:32:45.098287 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.100088 kubelet[1408]: E1002 19:32:45.099804 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.100088 kubelet[1408]: W1002 19:32:45.099814 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.100088 kubelet[1408]: E1002 19:32:45.099841 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.100271 kubelet[1408]: E1002 19:32:45.100142 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.100271 kubelet[1408]: W1002 19:32:45.100153 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.100271 kubelet[1408]: E1002 19:32:45.100195 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.101968 kubelet[1408]: E1002 19:32:45.101953 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.101968 kubelet[1408]: W1002 19:32:45.101966 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.102066 kubelet[1408]: E1002 19:32:45.101987 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.102147 kubelet[1408]: E1002 19:32:45.102133 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.102147 kubelet[1408]: W1002 19:32:45.102145 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.102312 kubelet[1408]: E1002 19:32:45.102296 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.102408 kubelet[1408]: E1002 19:32:45.102313 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.102408 kubelet[1408]: W1002 19:32:45.102402 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.102497 kubelet[1408]: E1002 19:32:45.102418 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.102904 kubelet[1408]: E1002 19:32:45.102891 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.102904 kubelet[1408]: W1002 19:32:45.102902 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.103005 kubelet[1408]: E1002 19:32:45.102915 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.056000 audit[1653]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.056000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffb6b6c820 a2=0 a3=7fffb6b6c80c items=0 ppid=1558 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:32:45.103322 kubelet[1408]: E1002 19:32:45.103104 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.103322 kubelet[1408]: W1002 19:32:45.103113 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.103322 kubelet[1408]: E1002 19:32:45.103127 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.103322 kubelet[1408]: E1002 19:32:45.103320 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.103439 kubelet[1408]: W1002 19:32:45.103330 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.103439 kubelet[1408]: E1002 19:32:45.103343 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.103724 kubelet[1408]: E1002 19:32:45.103703 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:45.103724 kubelet[1408]: W1002 19:32:45.103716 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:45.103817 kubelet[1408]: E1002 19:32:45.103729 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:45.104000 audit[1670]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.104000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc70745590 a2=0 a3=7ffc7074557c items=0 ppid=1558 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:32:45.105000 audit[1671]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.105000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5c0e0160 a2=0 a3=7ffe5c0e014c items=0 ppid=1558 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:32:45.109000 audit[1673]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:32:45.109000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcec4c08a0 a2=0 a3=7ffcec4c088c items=0 ppid=1558 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:32:45.159000 audit[1679]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:32:45.159000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff5f616140 a2=0 a3=7fff5f61612c items=0 ppid=1558 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:32:45.179000 audit[1679]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:32:45.179000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff5f616140 a2=0 a3=7fff5f61612c items=0 ppid=1558 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:32:45.181000 audit[1685]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.181000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff567ff790 a2=0 a3=7fff567ff77c items=0 ppid=1558 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:32:45.183000 audit[1687]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.183000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5b98f0f0 a2=0 a3=7ffc5b98f0dc items=0 ppid=1558 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:32:45.192000 audit[1690]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.192000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe9c8efd10 a2=0 a3=7ffe9c8efcfc items=0 ppid=1558 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:32:45.193000 audit[1691]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.193000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6401fa60 a2=0 a3=7ffe6401fa4c items=0 ppid=1558 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:32:45.197000 audit[1693]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.197000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe828581c0 a2=0 a3=7ffe828581ac items=0 ppid=1558 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:32:45.198000 audit[1694]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.198000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69d48b50 a2=0 a3=7ffd69d48b3c items=0 ppid=1558 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:32:45.202000 audit[1696]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.202000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea6f38fa0 a2=0 a3=7ffea6f38f8c items=0 ppid=1558 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:32:45.208000 audit[1699]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.208000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd4b35b400 a2=0 a3=7ffd4b35b3ec items=0 ppid=1558 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:32:45.215000 audit[1700]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.215000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0707c270 a2=0 a3=7ffc0707c25c items=0 ppid=1558 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:32:45.220000 audit[1702]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.220000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2fd386e0 a2=0 a3=7ffc2fd386cc items=0 ppid=1558 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:32:45.222000 audit[1703]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.222000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3b9b8bd0 a2=0 a3=7ffc3b9b8bbc items=0 ppid=1558 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:32:45.225000 audit[1705]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.225000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1d5a98a0 a2=0 a3=7fff1d5a988c items=0 ppid=1558 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:32:45.228000 audit[1708]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.228000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4ef589e0 a2=0 a3=7ffd4ef589cc items=0 ppid=1558 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:32:45.234000 audit[1711]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.234000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec4d20430 a2=0 a3=7ffec4d2041c items=0 ppid=1558 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:32:45.235000 audit[1712]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.235000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea655c9b0 a2=0 a3=7ffea655c99c items=0 ppid=1558 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:32:45.238000 audit[1714]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.238000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcfb96ab80 a2=0 a3=7ffcfb96ab6c items=0 ppid=1558 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:32:45.243000 audit[1717]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.243000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdc48c7dc0 a2=0 a3=7ffdc48c7dac items=0 ppid=1558 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:32:45.244000 audit[1718]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.244000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd380970a0 a2=0 a3=7ffd3809708c items=0 ppid=1558 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:32:45.248000 audit[1720]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.248000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd426e9030 a2=0 a3=7ffd426e901c items=0 ppid=1558 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:32:45.250000 audit[1721]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.250000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6dff4140 a2=0 a3=7ffd6dff412c items=0 ppid=1558 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:32:45.254000 audit[1723]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.254000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe084d6840 a2=0 a3=7ffe084d682c items=0 ppid=1558 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:32:45.259000 audit[1726]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:32:45.259000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7b36b140 a2=0 a3=7ffc7b36b12c items=0 ppid=1558 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:32:45.262000 audit[1728]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:32:45.262000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff7f6a6620 a2=0 a3=7fff7f6a660c items=0 ppid=1558 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.262000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:32:45.263000 audit[1728]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:32:45.263000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff7f6a6620 a2=0 a3=7fff7f6a660c items=0 ppid=1558 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:45.263000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:32:45.755850 kubelet[1408]: E1002 19:32:45.755782 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:45.776229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2229684013.mount: Deactivated successfully. Oct 2 19:32:45.940060 kubelet[1408]: E1002 19:32:45.940018 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:46.029112 kubelet[1408]: E1002 19:32:46.028647 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029112 kubelet[1408]: W1002 19:32:46.028683 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029112 kubelet[1408]: E1002 19:32:46.028710 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.029112 kubelet[1408]: E1002 19:32:46.028948 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029112 kubelet[1408]: W1002 19:32:46.028955 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029112 kubelet[1408]: E1002 19:32:46.028965 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.029112 kubelet[1408]: E1002 19:32:46.029114 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029112 kubelet[1408]: W1002 19:32:46.029123 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029619 kubelet[1408]: E1002 19:32:46.029136 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.029619 kubelet[1408]: E1002 19:32:46.029303 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029619 kubelet[1408]: W1002 19:32:46.029311 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029619 kubelet[1408]: E1002 19:32:46.029323 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.029619 kubelet[1408]: E1002 19:32:46.029449 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029619 kubelet[1408]: W1002 19:32:46.029454 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029619 kubelet[1408]: E1002 19:32:46.029463 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.029850 kubelet[1408]: E1002 19:32:46.029670 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029850 kubelet[1408]: W1002 19:32:46.029677 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029850 kubelet[1408]: E1002 19:32:46.029687 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.029947 kubelet[1408]: E1002 19:32:46.029893 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.029947 kubelet[1408]: W1002 19:32:46.029907 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.029947 kubelet[1408]: E1002 19:32:46.029920 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.030317 kubelet[1408]: E1002 19:32:46.030106 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.030317 kubelet[1408]: W1002 19:32:46.030114 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.030317 kubelet[1408]: E1002 19:32:46.030125 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.030410 kubelet[1408]: E1002 19:32:46.030382 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.030410 kubelet[1408]: W1002 19:32:46.030389 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.030410 kubelet[1408]: E1002 19:32:46.030399 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.030637 kubelet[1408]: E1002 19:32:46.030536 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.030637 kubelet[1408]: W1002 19:32:46.030542 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.030637 kubelet[1408]: E1002 19:32:46.030551 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.030742 kubelet[1408]: E1002 19:32:46.030689 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.030742 kubelet[1408]: W1002 19:32:46.030696 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.030742 kubelet[1408]: E1002 19:32:46.030705 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.030859 kubelet[1408]: E1002 19:32:46.030842 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.030859 kubelet[1408]: W1002 19:32:46.030853 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.030859 kubelet[1408]: E1002 19:32:46.030861 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031028 kubelet[1408]: E1002 19:32:46.030994 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.031028 kubelet[1408]: W1002 19:32:46.030999 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.031028 kubelet[1408]: E1002 19:32:46.031007 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031133 kubelet[1408]: E1002 19:32:46.031104 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.031133 kubelet[1408]: W1002 19:32:46.031109 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.031133 kubelet[1408]: E1002 19:32:46.031125 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031311 kubelet[1408]: E1002 19:32:46.031245 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.031311 kubelet[1408]: W1002 19:32:46.031251 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.031311 kubelet[1408]: E1002 19:32:46.031267 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031422 kubelet[1408]: E1002 19:32:46.031367 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.031422 kubelet[1408]: W1002 19:32:46.031380 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.031422 kubelet[1408]: E1002 19:32:46.031388 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031524 kubelet[1408]: E1002 19:32:46.031482 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.031524 kubelet[1408]: W1002 19:32:46.031488 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.031524 kubelet[1408]: E1002 19:32:46.031495 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031840 kubelet[1408]: E1002 19:32:46.031628 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.031840 kubelet[1408]: W1002 19:32:46.031642 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.031840 kubelet[1408]: E1002 19:32:46.031651 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.031840 kubelet[1408]: E1002 19:32:46.031879 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.032302 kubelet[1408]: W1002 19:32:46.031903 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.032302 kubelet[1408]: E1002 19:32:46.031933 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.032302 kubelet[1408]: E1002 19:32:46.032190 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.032302 kubelet[1408]: W1002 19:32:46.032200 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.032302 kubelet[1408]: E1002 19:32:46.032230 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.107150 kubelet[1408]: E1002 19:32:46.107085 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.107150 kubelet[1408]: W1002 19:32:46.107117 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.107150 kubelet[1408]: E1002 19:32:46.107144 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.107439 kubelet[1408]: E1002 19:32:46.107413 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.107439 kubelet[1408]: W1002 19:32:46.107422 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.107439 kubelet[1408]: E1002 19:32:46.107435 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.107820 kubelet[1408]: E1002 19:32:46.107768 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.107820 kubelet[1408]: W1002 19:32:46.107798 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.107820 kubelet[1408]: E1002 19:32:46.107830 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.108052 kubelet[1408]: E1002 19:32:46.108038 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.108052 kubelet[1408]: W1002 19:32:46.108047 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.108125 kubelet[1408]: E1002 19:32:46.108059 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.108491 kubelet[1408]: E1002 19:32:46.108314 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.108491 kubelet[1408]: W1002 19:32:46.108333 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.108491 kubelet[1408]: E1002 19:32:46.108355 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.108932 kubelet[1408]: E1002 19:32:46.108639 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.108932 kubelet[1408]: W1002 19:32:46.108653 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.108932 kubelet[1408]: E1002 19:32:46.108670 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.108932 kubelet[1408]: E1002 19:32:46.108896 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.108932 kubelet[1408]: W1002 19:32:46.108907 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.108932 kubelet[1408]: E1002 19:32:46.108932 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.109140 kubelet[1408]: E1002 19:32:46.109067 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.109140 kubelet[1408]: W1002 19:32:46.109075 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.109140 kubelet[1408]: E1002 19:32:46.109087 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.109230 kubelet[1408]: E1002 19:32:46.109200 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.109230 kubelet[1408]: W1002 19:32:46.109206 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.109230 kubelet[1408]: E1002 19:32:46.109217 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.109398 kubelet[1408]: E1002 19:32:46.109360 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.109398 kubelet[1408]: W1002 19:32:46.109373 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.109398 kubelet[1408]: E1002 19:32:46.109385 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.109792 kubelet[1408]: E1002 19:32:46.109779 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.109792 kubelet[1408]: W1002 19:32:46.109790 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.109902 kubelet[1408]: E1002 19:32:46.109808 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.109993 kubelet[1408]: E1002 19:32:46.109959 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:32:46.109993 kubelet[1408]: W1002 19:32:46.109975 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:32:46.109993 kubelet[1408]: E1002 19:32:46.109987 1408 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:32:46.756422 kubelet[1408]: E1002 19:32:46.756291 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:47.756603 kubelet[1408]: E1002 19:32:47.756570 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:48.450005 env[1100]: time="2023-10-02T19:32:48.449928816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:48.538620 env[1100]: time="2023-10-02T19:32:48.538561394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:48.712166 env[1100]: time="2023-10-02T19:32:48.711970077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:48.757077 kubelet[1408]: E1002 19:32:48.757039 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:48.827771 env[1100]: time="2023-10-02T19:32:48.827712085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:48.829000 env[1100]: time="2023-10-02T19:32:48.828927975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:32:48.834791 env[1100]: time="2023-10-02T19:32:48.834726389Z" level=info msg="CreateContainer within sandbox \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:32:48.967564 env[1100]: time="2023-10-02T19:32:48.967430517Z" level=info msg="CreateContainer within sandbox \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299\"" Oct 2 19:32:48.968165 env[1100]: time="2023-10-02T19:32:48.968126201Z" level=info msg="StartContainer for \"7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299\"" Oct 2 19:32:49.002383 systemd[1]: Started cri-containerd-7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299.scope. Oct 2 19:32:49.030000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.032623 kernel: kauditd_printk_skb: 300 callbacks suppressed Oct 2 19:32:49.032706 kernel: audit: type=1400 audit(1696275169.030:644): avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.030000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1493 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:49.035272 kernel: audit: type=1300 audit(1696275169.030:644): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1493 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:49.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363862663834313363653138316539386534313839326666656234 Oct 2 19:32:49.041175 kernel: audit: type=1327 audit(1696275169.030:644): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363862663834313363653138316539386534313839326666656234 Oct 2 19:32:49.041236 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043102 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.045042 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.047029 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.049057 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.053176 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit: BPF prog-id=75 op=LOAD Oct 2 19:32:49.033000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00039e080 items=0 ppid=1493 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:49.056334 kernel: audit: type=1400 audit(1696275169.033:645): avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363862663834313363653138316539386534313839326666656234 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.039000 audit: BPF prog-id=76 op=LOAD Oct 2 19:32:49.039000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00039e0c8 items=0 ppid=1493 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:49.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363862663834313363653138316539386534313839326666656234 Oct 2 19:32:49.043000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:32:49.043000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:49.043000 audit: BPF prog-id=77 op=LOAD Oct 2 19:32:49.043000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00039e158 items=0 ppid=1493 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:49.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363862663834313363653138316539386534313839326666656234 Oct 2 19:32:49.079638 env[1100]: time="2023-10-02T19:32:49.079564899Z" level=info msg="StartContainer for \"7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299\" returns successfully" Oct 2 19:32:49.083246 systemd[1]: cri-containerd-7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299.scope: Deactivated successfully. Oct 2 19:32:49.088000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:32:49.116864 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299-rootfs.mount: Deactivated successfully. Oct 2 19:32:49.758050 kubelet[1408]: E1002 19:32:49.758009 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:49.950461 kubelet[1408]: E1002 19:32:49.950429 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:49.973959 env[1100]: time="2023-10-02T19:32:49.973902330Z" level=info msg="shim disconnected" id=7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299 Oct 2 19:32:49.973959 env[1100]: time="2023-10-02T19:32:49.973959087Z" level=warning msg="cleaning up after shim disconnected" id=7568bf8413ce181e98e41892ffeb44f12dcd6a80b4e91726b81c7d6c88932299 namespace=k8s.io Oct 2 19:32:49.974302 env[1100]: time="2023-10-02T19:32:49.973971701Z" level=info msg="cleaning up dead shim" Oct 2 19:32:49.982678 env[1100]: time="2023-10-02T19:32:49.982641920Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:32:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1812 runtime=io.containerd.runc.v2\n" Oct 2 19:32:50.758632 kubelet[1408]: E1002 19:32:50.758592 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:50.953020 kubelet[1408]: E1002 19:32:50.952992 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:32:50.953680 env[1100]: time="2023-10-02T19:32:50.953643856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:32:51.759785 kubelet[1408]: E1002 19:32:51.759727 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:52.760211 kubelet[1408]: E1002 19:32:52.760178 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:53.579746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount877196740.mount: Deactivated successfully. Oct 2 19:32:53.720515 kubelet[1408]: E1002 19:32:53.720455 1408 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:53.760832 kubelet[1408]: E1002 19:32:53.760798 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:54.761937 kubelet[1408]: E1002 19:32:54.761873 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:55.762216 kubelet[1408]: E1002 19:32:55.762164 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:56.762520 kubelet[1408]: E1002 19:32:56.762466 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:57.763275 kubelet[1408]: E1002 19:32:57.763227 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:58.764217 kubelet[1408]: E1002 19:32:58.764153 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:32:59.765365 kubelet[1408]: E1002 19:32:59.765322 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:00.766366 kubelet[1408]: E1002 19:33:00.766320 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:00.860376 env[1100]: time="2023-10-02T19:33:00.860292388Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:00.863460 env[1100]: time="2023-10-02T19:33:00.863402500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:00.956680 env[1100]: time="2023-10-02T19:33:00.956595280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:00.962740 env[1100]: time="2023-10-02T19:33:00.962700900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:00.963431 env[1100]: time="2023-10-02T19:33:00.963375846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:33:00.965406 env[1100]: time="2023-10-02T19:33:00.965369785Z" level=info msg="CreateContainer within sandbox \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:33:01.044459 env[1100]: time="2023-10-02T19:33:01.044293966Z" level=info msg="CreateContainer within sandbox \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420\"" Oct 2 19:33:01.045394 env[1100]: time="2023-10-02T19:33:01.045355368Z" level=info msg="StartContainer for \"5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420\"" Oct 2 19:33:01.097487 systemd[1]: Started cri-containerd-5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420.scope. Oct 2 19:33:01.131311 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:33:01.131456 kernel: audit: type=1400 audit(1696275181.125:651): avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.131494 kernel: audit: type=1300 audit(1696275181.125:651): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1493 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1493 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:01.132162 kernel: audit: type=1327 audit(1696275181.125:651): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343035323165333739643866363361343966636464623730316133 Oct 2 19:33:01.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343035323165333739643866363361343966636464623730316133 Oct 2 19:33:01.134737 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.136587 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.138425 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.140289 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.142190 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.146042 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.146092 kernel: audit: type=1400 audit(1696275181.125:652): avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.125000 audit: BPF prog-id=78 op=LOAD Oct 2 19:33:01.125000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ea560 items=0 ppid=1493 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:01.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343035323165333739643866363361343966636464623730316133 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.128000 audit: BPF prog-id=79 op=LOAD Oct 2 19:33:01.128000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ea5a8 items=0 ppid=1493 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:01.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343035323165333739643866363361343966636464623730316133 Oct 2 19:33:01.134000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:33:01.134000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:01.134000 audit: BPF prog-id=80 op=LOAD Oct 2 19:33:01.134000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ea638 items=0 ppid=1493 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:01.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343035323165333739643866363361343966636464623730316133 Oct 2 19:33:01.182437 env[1100]: time="2023-10-02T19:33:01.182379920Z" level=info msg="StartContainer for \"5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420\" returns successfully" Oct 2 19:33:01.767126 kubelet[1408]: E1002 19:33:01.767064 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:01.983060 kubelet[1408]: E1002 19:33:01.983032 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:02.000537 systemd[1]: run-containerd-runc-k8s.io-5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420-runc.Fp2cht.mount: Deactivated successfully. Oct 2 19:33:02.768203 kubelet[1408]: E1002 19:33:02.768138 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:02.984209 kubelet[1408]: E1002 19:33:02.984174 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:03.769134 kubelet[1408]: E1002 19:33:03.769062 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:04.769411 kubelet[1408]: E1002 19:33:04.769369 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:05.226945 env[1100]: time="2023-10-02T19:33:05.226858977Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:33:05.228835 systemd[1]: cri-containerd-5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420.scope: Deactivated successfully. Oct 2 19:33:05.240000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:33:05.273860 kubelet[1408]: I1002 19:33:05.273813 1408 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:33:05.294901 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420-rootfs.mount: Deactivated successfully. Oct 2 19:33:05.769838 kubelet[1408]: E1002 19:33:05.769762 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:06.264667 kubelet[1408]: I1002 19:33:06.264625 1408 topology_manager.go:215] "Topology Admit Handler" podUID="cab59dea-3228-4ffc-9926-523b38f4e0af" podNamespace="kube-system" podName="coredns-5dd5756b68-5vx7v" Oct 2 19:33:06.265582 kubelet[1408]: I1002 19:33:06.264994 1408 topology_manager.go:215] "Topology Admit Handler" podUID="98f1ecf0-284d-4e62-ba05-50f3f5f1f057" podNamespace="kube-system" podName="coredns-5dd5756b68-7blt8" Oct 2 19:33:06.265582 kubelet[1408]: I1002 19:33:06.265099 1408 topology_manager.go:215] "Topology Admit Handler" podUID="8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-nwfrw" Oct 2 19:33:06.265582 kubelet[1408]: I1002 19:33:06.265183 1408 topology_manager.go:215] "Topology Admit Handler" podUID="0725f68d-6961-4f75-9116-c5b4b3a93926" podNamespace="calico-system" podName="csi-node-driver-6cnst" Oct 2 19:33:06.265731 env[1100]: time="2023-10-02T19:33:06.265162233Z" level=info msg="shim disconnected" id=5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420 Oct 2 19:33:06.265731 env[1100]: time="2023-10-02T19:33:06.265217378Z" level=warning msg="cleaning up after shim disconnected" id=5640521e379d8f63a49fcddb701a3453a620c7fcd965855e582481e78b723420 namespace=k8s.io Oct 2 19:33:06.265731 env[1100]: time="2023-10-02T19:33:06.265228769Z" level=info msg="cleaning up dead shim" Oct 2 19:33:06.270046 systemd[1]: Created slice kubepods-burstable-podcab59dea_3228_4ffc_9926_523b38f4e0af.slice. Oct 2 19:33:06.273198 env[1100]: time="2023-10-02T19:33:06.273161023Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:33:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1881 runtime=io.containerd.runc.v2\n" Oct 2 19:33:06.279179 systemd[1]: Created slice kubepods-besteffort-pod8b1bd0ec_ea59_41fc_bbde_a81d88cc11ad.slice. Oct 2 19:33:06.282778 systemd[1]: Created slice kubepods-burstable-pod98f1ecf0_284d_4e62_ba05_50f3f5f1f057.slice. Oct 2 19:33:06.289580 kubelet[1408]: I1002 19:33:06.289558 1408 topology_manager.go:215] "Topology Admit Handler" podUID="7d520f8b-7c38-43b3-a799-9761e5b253ae" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-vbrzh" Oct 2 19:33:06.293152 systemd[1]: Created slice kubepods-besteffort-pod0725f68d_6961_4f75_9116_c5b4b3a93926.slice. Oct 2 19:33:06.297982 systemd[1]: Created slice kubepods-besteffort-pod7d520f8b_7c38_43b3_a799_9761e5b253ae.slice. Oct 2 19:33:06.345946 kubelet[1408]: I1002 19:33:06.345921 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dkglx\" (UniqueName: \"kubernetes.io/projected/8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad-kube-api-access-dkglx\") pod \"calico-kube-controllers-74b9887bb6-nwfrw\" (UID: \"8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad\") " pod="calico-system/calico-kube-controllers-74b9887bb6-nwfrw" Oct 2 19:33:06.346066 kubelet[1408]: I1002 19:33:06.345953 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cab59dea-3228-4ffc-9926-523b38f4e0af-config-volume\") pod \"coredns-5dd5756b68-5vx7v\" (UID: \"cab59dea-3228-4ffc-9926-523b38f4e0af\") " pod="kube-system/coredns-5dd5756b68-5vx7v" Oct 2 19:33:06.346066 kubelet[1408]: I1002 19:33:06.345969 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0725f68d-6961-4f75-9116-c5b4b3a93926-kubelet-dir\") pod \"csi-node-driver-6cnst\" (UID: \"0725f68d-6961-4f75-9116-c5b4b3a93926\") " pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:06.346066 kubelet[1408]: I1002 19:33:06.345989 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0725f68d-6961-4f75-9116-c5b4b3a93926-registration-dir\") pod \"csi-node-driver-6cnst\" (UID: \"0725f68d-6961-4f75-9116-c5b4b3a93926\") " pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:06.346066 kubelet[1408]: I1002 19:33:06.346015 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rmxz5\" (UniqueName: \"kubernetes.io/projected/0725f68d-6961-4f75-9116-c5b4b3a93926-kube-api-access-rmxz5\") pod \"csi-node-driver-6cnst\" (UID: \"0725f68d-6961-4f75-9116-c5b4b3a93926\") " pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:06.346066 kubelet[1408]: I1002 19:33:06.346052 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/0725f68d-6961-4f75-9116-c5b4b3a93926-etccalico\") pod \"csi-node-driver-6cnst\" (UID: \"0725f68d-6961-4f75-9116-c5b4b3a93926\") " pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:06.346234 kubelet[1408]: I1002 19:33:06.346093 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g76k4\" (UniqueName: \"kubernetes.io/projected/cab59dea-3228-4ffc-9926-523b38f4e0af-kube-api-access-g76k4\") pod \"coredns-5dd5756b68-5vx7v\" (UID: \"cab59dea-3228-4ffc-9926-523b38f4e0af\") " pod="kube-system/coredns-5dd5756b68-5vx7v" Oct 2 19:33:06.346234 kubelet[1408]: I1002 19:33:06.346124 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0725f68d-6961-4f75-9116-c5b4b3a93926-varrun\") pod \"csi-node-driver-6cnst\" (UID: \"0725f68d-6961-4f75-9116-c5b4b3a93926\") " pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:06.346234 kubelet[1408]: I1002 19:33:06.346152 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fkzrv\" (UniqueName: \"kubernetes.io/projected/98f1ecf0-284d-4e62-ba05-50f3f5f1f057-kube-api-access-fkzrv\") pod \"coredns-5dd5756b68-7blt8\" (UID: \"98f1ecf0-284d-4e62-ba05-50f3f5f1f057\") " pod="kube-system/coredns-5dd5756b68-7blt8" Oct 2 19:33:06.346234 kubelet[1408]: I1002 19:33:06.346170 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0725f68d-6961-4f75-9116-c5b4b3a93926-socket-dir\") pod \"csi-node-driver-6cnst\" (UID: \"0725f68d-6961-4f75-9116-c5b4b3a93926\") " pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:06.346234 kubelet[1408]: I1002 19:33:06.346211 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/98f1ecf0-284d-4e62-ba05-50f3f5f1f057-config-volume\") pod \"coredns-5dd5756b68-7blt8\" (UID: \"98f1ecf0-284d-4e62-ba05-50f3f5f1f057\") " pod="kube-system/coredns-5dd5756b68-7blt8" Oct 2 19:33:06.447517 kubelet[1408]: I1002 19:33:06.447475 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7d520f8b-7c38-43b3-a799-9761e5b253ae-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-vbrzh\" (UID: \"7d520f8b-7c38-43b3-a799-9761e5b253ae\") " pod="tigera-operator/tigera-operator-8547bd6cc6-vbrzh" Oct 2 19:33:06.447801 kubelet[1408]: I1002 19:33:06.447783 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7sm5r\" (UniqueName: \"kubernetes.io/projected/7d520f8b-7c38-43b3-a799-9761e5b253ae-kube-api-access-7sm5r\") pod \"tigera-operator-8547bd6cc6-vbrzh\" (UID: \"7d520f8b-7c38-43b3-a799-9761e5b253ae\") " pod="tigera-operator/tigera-operator-8547bd6cc6-vbrzh" Oct 2 19:33:06.579043 kubelet[1408]: E1002 19:33:06.578899 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:06.579513 env[1100]: time="2023-10-02T19:33:06.579459899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5vx7v,Uid:cab59dea-3228-4ffc-9926-523b38f4e0af,Namespace:kube-system,Attempt:0,}" Oct 2 19:33:06.581288 env[1100]: time="2023-10-02T19:33:06.581249514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-nwfrw,Uid:8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad,Namespace:calico-system,Attempt:0,}" Oct 2 19:33:06.589737 kubelet[1408]: E1002 19:33:06.589688 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:06.590101 env[1100]: time="2023-10-02T19:33:06.590076680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7blt8,Uid:98f1ecf0-284d-4e62-ba05-50f3f5f1f057,Namespace:kube-system,Attempt:0,}" Oct 2 19:33:06.596586 env[1100]: time="2023-10-02T19:33:06.596557151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6cnst,Uid:0725f68d-6961-4f75-9116-c5b4b3a93926,Namespace:calico-system,Attempt:0,}" Oct 2 19:33:06.770189 kubelet[1408]: E1002 19:33:06.770132 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:06.901211 env[1100]: time="2023-10-02T19:33:06.901091991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-vbrzh,Uid:7d520f8b-7c38-43b3-a799-9761e5b253ae,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:33:06.991650 kubelet[1408]: E1002 19:33:06.991612 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:06.992294 env[1100]: time="2023-10-02T19:33:06.992250788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:33:07.771236 kubelet[1408]: E1002 19:33:07.771186 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:07.932840 kubelet[1408]: I1002 19:33:07.932803 1408 topology_manager.go:215] "Topology Admit Handler" podUID="5efcf382-74a8-4454-bf95-2ca297910d60" podNamespace="default" podName="nginx-deployment-6d5f899847-w5jdc" Oct 2 19:33:07.937692 systemd[1]: Created slice kubepods-besteffort-pod5efcf382_74a8_4454_bf95_2ca297910d60.slice. Oct 2 19:33:08.057450 kubelet[1408]: I1002 19:33:08.057316 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p4s2f\" (UniqueName: \"kubernetes.io/projected/5efcf382-74a8-4454-bf95-2ca297910d60-kube-api-access-p4s2f\") pod \"nginx-deployment-6d5f899847-w5jdc\" (UID: \"5efcf382-74a8-4454-bf95-2ca297910d60\") " pod="default/nginx-deployment-6d5f899847-w5jdc" Oct 2 19:33:08.189517 env[1100]: time="2023-10-02T19:33:08.189438317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:33:08.190007 env[1100]: time="2023-10-02T19:33:08.189967912Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:33:08.190135 env[1100]: time="2023-10-02T19:33:08.190105164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:33:08.232057 env[1100]: time="2023-10-02T19:33:08.219822842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89f774399d139200d8ff48d037a2de2d5b2b3b7b28ad8772ccbdbe261e2de002 pid=1950 runtime=io.containerd.runc.v2 Oct 2 19:33:08.232652 systemd[1]: Started cri-containerd-89f774399d139200d8ff48d037a2de2d5b2b3b7b28ad8772ccbdbe261e2de002.scope. Oct 2 19:33:08.241752 env[1100]: time="2023-10-02T19:33:08.241690899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5jdc,Uid:5efcf382-74a8-4454-bf95-2ca297910d60,Namespace:default,Attempt:0,}" Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249844 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:33:08.249912 kernel: audit: type=1400 audit(1696275188.247:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.254400 kernel: audit: type=1400 audit(1696275188.247:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.254470 kernel: audit: type=1400 audit(1696275188.247:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.256776 kernel: audit: type=1400 audit(1696275188.247:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.261498 kernel: audit: type=1400 audit(1696275188.247:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.261543 kernel: audit: type=1400 audit(1696275188.247:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.266205 kernel: audit: type=1400 audit(1696275188.247:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.266267 kernel: audit: type=1400 audit(1696275188.247:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.277311 kernel: audit: type=1400 audit(1696275188.247:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.277491 kernel: audit: type=1400 audit(1696275188.248:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.248000 audit: BPF prog-id=81 op=LOAD Oct 2 19:33:08.248000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.248000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1950 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:08.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663737343339396431333932303064386666343864303337613264 Oct 2 19:33:08.248000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.248000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1950 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:08.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663737343339396431333932303064386666343864303337613264 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.249000 audit: BPF prog-id=82 op=LOAD Oct 2 19:33:08.249000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000306460 items=0 ppid=1950 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:08.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663737343339396431333932303064386666343864303337613264 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.253000 audit: BPF prog-id=83 op=LOAD Oct 2 19:33:08.253000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003064a8 items=0 ppid=1950 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:08.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663737343339396431333932303064386666343864303337613264 Oct 2 19:33:08.321000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:33:08.321000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:08.322000 audit: BPF prog-id=84 op=LOAD Oct 2 19:33:08.322000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003068b8 items=0 ppid=1950 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:08.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663737343339396431333932303064386666343864303337613264 Oct 2 19:33:08.337701 env[1100]: time="2023-10-02T19:33:08.337632018Z" level=error msg="Failed to destroy network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.339189 env[1100]: time="2023-10-02T19:33:08.339164418Z" level=error msg="encountered an error cleaning up failed sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.339507 env[1100]: time="2023-10-02T19:33:08.339479616Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5vx7v,Uid:cab59dea-3228-4ffc-9926-523b38f4e0af,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.339805 kubelet[1408]: E1002 19:33:08.339782 1408 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.339859 kubelet[1408]: E1002 19:33:08.339850 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-5vx7v" Oct 2 19:33:08.339893 kubelet[1408]: E1002 19:33:08.339875 1408 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-5vx7v" Oct 2 19:33:08.339947 kubelet[1408]: E1002 19:33:08.339933 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-5vx7v_kube-system(cab59dea-3228-4ffc-9926-523b38f4e0af)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-5vx7v_kube-system(cab59dea-3228-4ffc-9926-523b38f4e0af)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-5vx7v" podUID="cab59dea-3228-4ffc-9926-523b38f4e0af" Oct 2 19:33:08.384370 env[1100]: time="2023-10-02T19:33:08.352435417Z" level=error msg="Failed to destroy network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.384370 env[1100]: time="2023-10-02T19:33:08.371136638Z" level=error msg="Failed to destroy network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.384856 env[1100]: time="2023-10-02T19:33:08.384797297Z" level=error msg="encountered an error cleaning up failed sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.384924 env[1100]: time="2023-10-02T19:33:08.384884342Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6cnst,Uid:0725f68d-6961-4f75-9116-c5b4b3a93926,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.385127 kubelet[1408]: E1002 19:33:08.385102 1408 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.385182 kubelet[1408]: E1002 19:33:08.385152 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:08.385182 kubelet[1408]: E1002 19:33:08.385171 1408 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6cnst" Oct 2 19:33:08.385239 kubelet[1408]: E1002 19:33:08.385216 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6cnst_calico-system(0725f68d-6961-4f75-9116-c5b4b3a93926)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6cnst_calico-system(0725f68d-6961-4f75-9116-c5b4b3a93926)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6cnst" podUID="0725f68d-6961-4f75-9116-c5b4b3a93926" Oct 2 19:33:08.387577 env[1100]: time="2023-10-02T19:33:08.387536039Z" level=error msg="encountered an error cleaning up failed sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.387643 env[1100]: time="2023-10-02T19:33:08.387580083Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-nwfrw,Uid:8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.387765 kubelet[1408]: E1002 19:33:08.387743 1408 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.387805 kubelet[1408]: E1002 19:33:08.387789 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-nwfrw" Oct 2 19:33:08.387830 kubelet[1408]: E1002 19:33:08.387814 1408 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-nwfrw" Oct 2 19:33:08.387877 kubelet[1408]: E1002 19:33:08.387863 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-nwfrw_calico-system(8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-nwfrw_calico-system(8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-nwfrw" podUID="8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad" Oct 2 19:33:08.392665 env[1100]: time="2023-10-02T19:33:08.392628322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-vbrzh,Uid:7d520f8b-7c38-43b3-a799-9761e5b253ae,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"89f774399d139200d8ff48d037a2de2d5b2b3b7b28ad8772ccbdbe261e2de002\"" Oct 2 19:33:08.398598 env[1100]: time="2023-10-02T19:33:08.398544139Z" level=error msg="Failed to destroy network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.398893 env[1100]: time="2023-10-02T19:33:08.398865910Z" level=error msg="encountered an error cleaning up failed sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.398951 env[1100]: time="2023-10-02T19:33:08.398911427Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7blt8,Uid:98f1ecf0-284d-4e62-ba05-50f3f5f1f057,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.399134 kubelet[1408]: E1002 19:33:08.399101 1408 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.399192 kubelet[1408]: E1002 19:33:08.399149 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7blt8" Oct 2 19:33:08.399192 kubelet[1408]: E1002 19:33:08.399167 1408 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7blt8" Oct 2 19:33:08.399263 kubelet[1408]: E1002 19:33:08.399219 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-7blt8_kube-system(98f1ecf0-284d-4e62-ba05-50f3f5f1f057)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-7blt8_kube-system(98f1ecf0-284d-4e62-ba05-50f3f5f1f057)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7blt8" podUID="98f1ecf0-284d-4e62-ba05-50f3f5f1f057" Oct 2 19:33:08.410380 env[1100]: time="2023-10-02T19:33:08.410307894Z" level=error msg="Failed to destroy network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.410703 env[1100]: time="2023-10-02T19:33:08.410666535Z" level=error msg="encountered an error cleaning up failed sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.410763 env[1100]: time="2023-10-02T19:33:08.410719045Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5jdc,Uid:5efcf382-74a8-4454-bf95-2ca297910d60,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.410983 kubelet[1408]: E1002 19:33:08.410964 1408 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:08.411037 kubelet[1408]: E1002 19:33:08.411018 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-w5jdc" Oct 2 19:33:08.411037 kubelet[1408]: E1002 19:33:08.411036 1408 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-w5jdc" Oct 2 19:33:08.411099 kubelet[1408]: E1002 19:33:08.411089 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-w5jdc_default(5efcf382-74a8-4454-bf95-2ca297910d60)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-w5jdc_default(5efcf382-74a8-4454-bf95-2ca297910d60)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-w5jdc" podUID="5efcf382-74a8-4454-bf95-2ca297910d60" Oct 2 19:33:08.771948 kubelet[1408]: E1002 19:33:08.771889 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:08.995567 kubelet[1408]: I1002 19:33:08.995535 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Oct 2 19:33:08.996059 env[1100]: time="2023-10-02T19:33:08.996026984Z" level=info msg="StopPodSandbox for \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\"" Oct 2 19:33:08.997162 kubelet[1408]: I1002 19:33:08.996869 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Oct 2 19:33:08.998135 kubelet[1408]: I1002 19:33:08.998120 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Oct 2 19:33:08.999003 env[1100]: time="2023-10-02T19:33:08.998972589Z" level=info msg="StopPodSandbox for \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\"" Oct 2 19:33:09.000337 kubelet[1408]: I1002 19:33:09.000307 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Oct 2 19:33:09.001201 env[1100]: time="2023-10-02T19:33:09.001106142Z" level=info msg="StopPodSandbox for \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\"" Oct 2 19:33:09.002938 kubelet[1408]: I1002 19:33:09.002894 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Oct 2 19:33:09.003114 env[1100]: time="2023-10-02T19:33:09.003074568Z" level=info msg="StopPodSandbox for \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\"" Oct 2 19:33:09.003299 env[1100]: time="2023-10-02T19:33:09.002189468Z" level=info msg="StopPodSandbox for \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\"" Oct 2 19:33:09.025960 env[1100]: time="2023-10-02T19:33:09.025816131Z" level=error msg="StopPodSandbox for \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\" failed" error="failed to destroy network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:09.026169 kubelet[1408]: E1002 19:33:09.026139 1408 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Oct 2 19:33:09.026250 kubelet[1408]: E1002 19:33:09.026233 1408 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be"} Oct 2 19:33:09.026308 kubelet[1408]: E1002 19:33:09.026291 1408 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5efcf382-74a8-4454-bf95-2ca297910d60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:33:09.026418 kubelet[1408]: E1002 19:33:09.026343 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5efcf382-74a8-4454-bf95-2ca297910d60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-w5jdc" podUID="5efcf382-74a8-4454-bf95-2ca297910d60" Oct 2 19:33:09.034698 env[1100]: time="2023-10-02T19:33:09.034633706Z" level=error msg="StopPodSandbox for \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\" failed" error="failed to destroy network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:09.038305 kubelet[1408]: E1002 19:33:09.038274 1408 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Oct 2 19:33:09.038439 kubelet[1408]: E1002 19:33:09.038340 1408 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f"} Oct 2 19:33:09.038439 kubelet[1408]: E1002 19:33:09.038390 1408 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0725f68d-6961-4f75-9116-c5b4b3a93926\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:33:09.038439 kubelet[1408]: E1002 19:33:09.038428 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0725f68d-6961-4f75-9116-c5b4b3a93926\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6cnst" podUID="0725f68d-6961-4f75-9116-c5b4b3a93926" Oct 2 19:33:09.043336 env[1100]: time="2023-10-02T19:33:09.043245512Z" level=error msg="StopPodSandbox for \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\" failed" error="failed to destroy network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:09.043568 kubelet[1408]: E1002 19:33:09.043546 1408 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Oct 2 19:33:09.043643 kubelet[1408]: E1002 19:33:09.043596 1408 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8"} Oct 2 19:33:09.043676 kubelet[1408]: E1002 19:33:09.043641 1408 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:33:09.043745 kubelet[1408]: E1002 19:33:09.043681 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-nwfrw" podUID="8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad" Oct 2 19:33:09.054739 env[1100]: time="2023-10-02T19:33:09.054679093Z" level=error msg="StopPodSandbox for \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\" failed" error="failed to destroy network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:09.055007 kubelet[1408]: E1002 19:33:09.054975 1408 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Oct 2 19:33:09.055085 kubelet[1408]: E1002 19:33:09.055023 1408 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256"} Oct 2 19:33:09.055085 kubelet[1408]: E1002 19:33:09.055066 1408 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"98f1ecf0-284d-4e62-ba05-50f3f5f1f057\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:33:09.055188 kubelet[1408]: E1002 19:33:09.055108 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"98f1ecf0-284d-4e62-ba05-50f3f5f1f057\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7blt8" podUID="98f1ecf0-284d-4e62-ba05-50f3f5f1f057" Oct 2 19:33:09.057174 env[1100]: time="2023-10-02T19:33:09.057124273Z" level=error msg="StopPodSandbox for \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\" failed" error="failed to destroy network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:33:09.057355 kubelet[1408]: E1002 19:33:09.057338 1408 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Oct 2 19:33:09.057440 kubelet[1408]: E1002 19:33:09.057365 1408 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83"} Oct 2 19:33:09.057440 kubelet[1408]: E1002 19:33:09.057398 1408 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cab59dea-3228-4ffc-9926-523b38f4e0af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:33:09.057440 kubelet[1408]: E1002 19:33:09.057429 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cab59dea-3228-4ffc-9926-523b38f4e0af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-5vx7v" podUID="cab59dea-3228-4ffc-9926-523b38f4e0af" Oct 2 19:33:09.135797 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8-shm.mount: Deactivated successfully. Oct 2 19:33:09.135902 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83-shm.mount: Deactivated successfully. Oct 2 19:33:09.135969 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256-shm.mount: Deactivated successfully. Oct 2 19:33:09.772628 kubelet[1408]: E1002 19:33:09.772567 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:10.773390 kubelet[1408]: E1002 19:33:10.773331 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:11.773982 kubelet[1408]: E1002 19:33:11.773899 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:12.775083 kubelet[1408]: E1002 19:33:12.775030 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:13.522638 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount322238933.mount: Deactivated successfully. Oct 2 19:33:13.720655 kubelet[1408]: E1002 19:33:13.720568 1408 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:13.775196 kubelet[1408]: E1002 19:33:13.775103 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:13.840085 env[1100]: time="2023-10-02T19:33:13.840038524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:13.841760 env[1100]: time="2023-10-02T19:33:13.841736458Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:13.843018 env[1100]: time="2023-10-02T19:33:13.842994048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:13.844222 env[1100]: time="2023-10-02T19:33:13.844195402Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:13.844583 env[1100]: time="2023-10-02T19:33:13.844559150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:33:13.845070 env[1100]: time="2023-10-02T19:33:13.845046944Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:33:13.846025 env[1100]: time="2023-10-02T19:33:13.845998535Z" level=info msg="CreateContainer within sandbox \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:33:13.857063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount364560416.mount: Deactivated successfully. Oct 2 19:33:13.858289 env[1100]: time="2023-10-02T19:33:13.858223635Z" level=info msg="CreateContainer within sandbox \"ea07c1951cae6e8ab9e92d6997523ecadc473c56a6abbd1984eb1ba247d7b9c0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c2f08a04e6daea19e46784f9a265cd912b5e9dd75b2be2285f579ba35a3c7dec\"" Oct 2 19:33:13.858728 env[1100]: time="2023-10-02T19:33:13.858692864Z" level=info msg="StartContainer for \"c2f08a04e6daea19e46784f9a265cd912b5e9dd75b2be2285f579ba35a3c7dec\"" Oct 2 19:33:13.879446 systemd[1]: Started cri-containerd-c2f08a04e6daea19e46784f9a265cd912b5e9dd75b2be2285f579ba35a3c7dec.scope. Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905861 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 2 19:33:13.905971 kernel: audit: type=1400 audit(1696275193.903:676): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905995 kernel: audit: type=1300 audit(1696275193.903:676): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1493 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:13.903000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1493 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:13.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663038613034653664616561313965343637383466396132363563 Oct 2 19:33:13.911956 kernel: audit: type=1327 audit(1696275193.903:676): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663038613034653664616561313965343637383466396132363563 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.914131 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.914274 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.918188 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.923573 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.923624 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.923651 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.927704 kernel: audit: type=1400 audit(1696275193.903:677): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.903000 audit: BPF prog-id=85 op=LOAD Oct 2 19:33:13.903000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000290930 items=0 ppid=1493 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:13.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663038613034653664616561313965343637383466396132363563 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.905000 audit: BPF prog-id=86 op=LOAD Oct 2 19:33:13.905000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000290978 items=0 ppid=1493 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:13.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663038613034653664616561313965343637383466396132363563 Oct 2 19:33:13.908000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:33:13.908000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:13.908000 audit: BPF prog-id=87 op=LOAD Oct 2 19:33:13.908000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000290a08 items=0 ppid=1493 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:13.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663038613034653664616561313965343637383466396132363563 Oct 2 19:33:13.932300 env[1100]: time="2023-10-02T19:33:13.932249673Z" level=info msg="StartContainer for \"c2f08a04e6daea19e46784f9a265cd912b5e9dd75b2be2285f579ba35a3c7dec\" returns successfully" Oct 2 19:33:14.013821 kubelet[1408]: E1002 19:33:14.013794 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:14.025581 kubelet[1408]: I1002 19:33:14.025245 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-qnp27" podStartSLOduration=5.652544922 podCreationTimestamp="2023-10-02 19:32:35 +0000 UTC" firstStartedPulling="2023-10-02 19:32:40.47213231 +0000 UTC m=+6.943570835" lastFinishedPulling="2023-10-02 19:33:13.844782503 +0000 UTC m=+40.316221018" observedRunningTime="2023-10-02 19:33:14.024656156 +0000 UTC m=+40.496094671" watchObservedRunningTime="2023-10-02 19:33:14.025195105 +0000 UTC m=+40.496633620" Oct 2 19:33:14.122491 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:33:14.122631 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:33:14.640189 update_engine[1092]: I1002 19:33:14.640069 1092 update_attempter.cc:505] Updating boot flags... Oct 2 19:33:14.776036 kubelet[1408]: E1002 19:33:14.775994 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:15.014542 kubelet[1408]: E1002 19:33:15.014519 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:15.365000 audit[2430]: AVC avc: denied { write } for pid=2430 comm="tee" name="fd" dev="proc" ino=19018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.365000 audit[2430]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd40c797f a2=241 a3=1b6 items=1 ppid=2395 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.365000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:33:15.365000 audit: PATH item=0 name="/dev/fd/63" inode=19015 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.365000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.368000 audit[2418]: AVC avc: denied { write } for pid=2418 comm="tee" name="fd" dev="proc" ino=21738 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.368000 audit[2418]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1f98098f a2=241 a3=1b6 items=1 ppid=2396 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.368000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:33:15.368000 audit: PATH item=0 name="/dev/fd/63" inode=19006 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.368000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.372000 audit[2451]: AVC avc: denied { write } for pid=2451 comm="tee" name="fd" dev="proc" ino=21030 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.372000 audit[2451]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde0bf1990 a2=241 a3=1b6 items=1 ppid=2397 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.372000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:33:15.372000 audit: PATH item=0 name="/dev/fd/63" inode=21027 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.372000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.374000 audit[2441]: AVC avc: denied { write } for pid=2441 comm="tee" name="fd" dev="proc" ino=21748 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.374000 audit[2441]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc08d82980 a2=241 a3=1b6 items=1 ppid=2402 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.374000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:33:15.374000 audit: PATH item=0 name="/dev/fd/63" inode=21739 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.374000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.563000 audit[2455]: AVC avc: denied { write } for pid=2455 comm="tee" name="fd" dev="proc" ino=19045 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.563000 audit[2455]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc08e8a991 a2=241 a3=1b6 items=1 ppid=2407 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.563000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:33:15.563000 audit: PATH item=0 name="/dev/fd/63" inode=21745 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.563000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.568000 audit[2479]: AVC avc: denied { write } for pid=2479 comm="tee" name="fd" dev="proc" ino=21768 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.568000 audit[2479]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd73a4198f a2=241 a3=1b6 items=1 ppid=2410 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.568000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:33:15.568000 audit: PATH item=0 name="/dev/fd/63" inode=21765 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.568000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.580000 audit[2484]: AVC avc: denied { write } for pid=2484 comm="tee" name="fd" dev="proc" ino=21773 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:33:15.580000 audit[2484]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8b0d398f a2=241 a3=1b6 items=1 ppid=2411 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.580000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:33:15.580000 audit: PATH item=0 name="/dev/fd/63" inode=21770 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:33:15.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:33:15.675283 kernel: Initializing XFRM netlink socket Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit: BPF prog-id=88 op=LOAD Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0108fec0 a2=70 a3=7f93de59b000 items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.755000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit: BPF prog-id=89 op=LOAD Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0108fec0 a2=70 a3=6e items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.755000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0108fe70 a2=70 a3=7fff0108fec0 items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit: BPF prog-id=90 op=LOAD Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff0108fe50 a2=70 a3=7fff0108fec0 items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.755000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0108ff30 a2=70 a3=0 items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0108ff20 a2=70 a3=0 items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.755000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.755000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff0108ff60 a2=70 a3=0 items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.756000 audit: BPF prog-id=91 op=LOAD Oct 2 19:33:15.756000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff0108fe80 a2=70 a3=ffffffff items=0 ppid=2412 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:33:15.762000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.762000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdff111fd0 a2=70 a3=208 items=0 ppid=2412 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:33:15.762000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:15.762000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdff111ea0 a2=70 a3=3 items=0 ppid=2412 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:33:15.769000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:33:15.776845 kubelet[1408]: E1002 19:33:15.776801 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:15.850000 audit[2571]: NETFILTER_CFG table=mangle:65 family=2 entries=19 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:15.850000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdba3fdc90 a2=0 a3=7ffdba3fdc7c items=0 ppid=2412 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.850000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:15.853000 audit[2568]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:15.853000 audit[2568]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd5e52dd30 a2=0 a3=55ef19063000 items=0 ppid=2412 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:15.853000 audit[2569]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:15.853000 audit[2569]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe1bd4e9b0 a2=0 a3=556480c87000 items=0 ppid=2412 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:15.854000 audit[2567]: NETFILTER_CFG table=nat:68 family=2 entries=16 op=nft_register_chain pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:15.854000 audit[2567]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffeae63b0b0 a2=0 a3=559086bf1000 items=0 ppid=2412 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:15.854000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:16.777832 kubelet[1408]: E1002 19:33:16.777769 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:16.934974 env[1100]: time="2023-10-02T19:33:16.934890754Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:16.937688 env[1100]: time="2023-10-02T19:33:16.937620763Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:16.940880 systemd-networkd[1001]: vxlan.calico: Link UP Oct 2 19:33:16.940893 systemd-networkd[1001]: vxlan.calico: Gained carrier Oct 2 19:33:16.945681 env[1100]: time="2023-10-02T19:33:16.945636020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:16.948010 env[1100]: time="2023-10-02T19:33:16.947950113Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:16.953357 env[1100]: time="2023-10-02T19:33:16.952478730Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:33:16.955951 env[1100]: time="2023-10-02T19:33:16.955922869Z" level=info msg="CreateContainer within sandbox \"89f774399d139200d8ff48d037a2de2d5b2b3b7b28ad8772ccbdbe261e2de002\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:33:16.973024 env[1100]: time="2023-10-02T19:33:16.972934497Z" level=info msg="CreateContainer within sandbox \"89f774399d139200d8ff48d037a2de2d5b2b3b7b28ad8772ccbdbe261e2de002\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"69183eec83b803084cb1e52a3ff5981b26cc9c3159dbdae27dae1e30349d9795\"" Oct 2 19:33:16.973961 env[1100]: time="2023-10-02T19:33:16.973929748Z" level=info msg="StartContainer for \"69183eec83b803084cb1e52a3ff5981b26cc9c3159dbdae27dae1e30349d9795\"" Oct 2 19:33:17.008405 systemd[1]: Started cri-containerd-69183eec83b803084cb1e52a3ff5981b26cc9c3159dbdae27dae1e30349d9795.scope. Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.035000 audit: BPF prog-id=92 op=LOAD Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1950 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:17.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313833656563383362383033303834636231653532613366663539 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1950 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:17.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313833656563383362383033303834636231653532613366663539 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit: BPF prog-id=93 op=LOAD Oct 2 19:33:17.036000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bec90 items=0 ppid=1950 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:17.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313833656563383362383033303834636231653532613366663539 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit: BPF prog-id=94 op=LOAD Oct 2 19:33:17.036000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001becd8 items=0 ppid=1950 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:17.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313833656563383362383033303834636231653532613366663539 Oct 2 19:33:17.036000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:33:17.036000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:17.036000 audit: BPF prog-id=95 op=LOAD Oct 2 19:33:17.036000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bf0e8 items=0 ppid=1950 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:17.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313833656563383362383033303834636231653532613366663539 Oct 2 19:33:17.059680 env[1100]: time="2023-10-02T19:33:17.059622723Z" level=info msg="StartContainer for \"69183eec83b803084cb1e52a3ff5981b26cc9c3159dbdae27dae1e30349d9795\" returns successfully" Oct 2 19:33:17.778368 kubelet[1408]: E1002 19:33:17.778321 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:18.029486 kubelet[1408]: I1002 19:33:18.029369 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-vbrzh" podStartSLOduration=3.469245613 podCreationTimestamp="2023-10-02 19:33:06 +0000 UTC" firstStartedPulling="2023-10-02 19:33:08.393588716 +0000 UTC m=+34.865027241" lastFinishedPulling="2023-10-02 19:33:16.95366399 +0000 UTC m=+43.425102515" observedRunningTime="2023-10-02 19:33:18.028993347 +0000 UTC m=+44.500431872" watchObservedRunningTime="2023-10-02 19:33:18.029320887 +0000 UTC m=+44.500759412" Oct 2 19:33:18.080448 systemd-networkd[1001]: vxlan.calico: Gained IPv6LL Oct 2 19:33:18.778752 kubelet[1408]: E1002 19:33:18.778717 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:19.779428 kubelet[1408]: E1002 19:33:19.779378 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:19.819834 env[1100]: time="2023-10-02T19:33:19.819775363Z" level=info msg="StopPodSandbox for \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\"" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.886 [INFO][2654] k8s.go 576: Cleaning up netns ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.886 [INFO][2654] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" iface="eth0" netns="/var/run/netns/cni-72b8eb7f-ae38-0b01-2f30-ce3b3a083193" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.888 [INFO][2654] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" iface="eth0" netns="/var/run/netns/cni-72b8eb7f-ae38-0b01-2f30-ce3b3a083193" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.888 [INFO][2654] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" iface="eth0" netns="/var/run/netns/cni-72b8eb7f-ae38-0b01-2f30-ce3b3a083193" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.888 [INFO][2654] k8s.go 583: Releasing IP address(es) ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.888 [INFO][2654] utils.go 196: Calico CNI releasing IP address ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.916 [INFO][2670] ipam_plugin.go 416: Releasing address using handleID ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" HandleID="k8s-pod-network.707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Workload="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:19.926663 env[1100]: time="2023-10-02T19:33:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:19.926663 env[1100]: time="2023-10-02T19:33:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.922 [WARNING][2670] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" HandleID="k8s-pod-network.707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Workload="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.922 [INFO][2670] ipam_plugin.go 444: Releasing address using workloadID ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" HandleID="k8s-pod-network.707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Workload="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:19.926663 env[1100]: time="2023-10-02T19:33:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:19.926663 env[1100]: 2023-10-02 19:33:19.925 [INFO][2654] k8s.go 589: Teardown processing complete. ContainerID="707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256" Oct 2 19:33:19.927171 env[1100]: time="2023-10-02T19:33:19.926859544Z" level=info msg="TearDown network for sandbox \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\" successfully" Oct 2 19:33:19.927171 env[1100]: time="2023-10-02T19:33:19.926891173Z" level=info msg="StopPodSandbox for \"707410fe21be7c770be19123f2b9abd2520dbf8de0a8b3ebc1b3a6cc3b8bc256\" returns successfully" Oct 2 19:33:19.927508 kubelet[1408]: E1002 19:33:19.927485 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:19.928393 systemd[1]: run-netns-cni\x2d72b8eb7f\x2dae38\x2d0b01\x2d2f30\x2dce3b3a083193.mount: Deactivated successfully. Oct 2 19:33:19.929167 env[1100]: time="2023-10-02T19:33:19.929126072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7blt8,Uid:98f1ecf0-284d-4e62-ba05-50f3f5f1f057,Namespace:kube-system,Attempt:1,}" Oct 2 19:33:20.034772 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:33:20.034899 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9b7ea308f97: link becomes ready Oct 2 19:33:20.045232 systemd-networkd[1001]: cali9b7ea308f97: Link UP Oct 2 19:33:20.045241 systemd-networkd[1001]: cali9b7ea308f97: Gained carrier Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:19.972 [INFO][2678] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0 coredns-5dd5756b68- kube-system 98f1ecf0-284d-4e62-ba05-50f3f5f1f057 927 0 2023-10-02 19:32:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.0.0.16 coredns-5dd5756b68-7blt8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9b7ea308f97 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:19.972 [INFO][2678] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.000 [INFO][2691] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" HandleID="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Workload="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.010 [INFO][2691] ipam_plugin.go 269: Auto assigning IP ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" HandleID="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Workload="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c4b70), Attrs:map[string]string{"namespace":"kube-system", "node":"10.0.0.16", "pod":"coredns-5dd5756b68-7blt8", "timestamp":"2023-10-02 19:33:20.000562398 +0000 UTC"}, Hostname:"10.0.0.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:33:20.055654 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:20.055654 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.010 [INFO][2691] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.16' Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.011 [INFO][2691] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.015 [INFO][2691] ipam.go 372: Looking up existing affinities for host host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.019 [INFO][2691] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.020 [INFO][2691] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.022 [INFO][2691] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.022 [INFO][2691] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.023 [INFO][2691] ipam.go 1682: Creating new handle: k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98 Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.026 [INFO][2691] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.030 [INFO][2691] ipam.go 1216: Successfully claimed IPs: [192.168.113.1/26] block=192.168.113.0/26 handle="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.030 [INFO][2691] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.1/26] handle="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" host="10.0.0.16" Oct 2 19:33:20.055654 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:20.055654 env[1100]: 2023-10-02 19:33:20.030 [INFO][2691] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.1/26] IPv6=[] ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" HandleID="k8s-pod-network.c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Workload="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.056798 env[1100]: 2023-10-02 19:33:20.032 [INFO][2678] k8s.go 383: Populated endpoint ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"98f1ecf0-284d-4e62-ba05-50f3f5f1f057", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 32, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"", Pod:"coredns-5dd5756b68-7blt8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9b7ea308f97", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:20.056798 env[1100]: 2023-10-02 19:33:20.032 [INFO][2678] k8s.go 384: Calico CNI using IPs: [192.168.113.1/32] ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.056798 env[1100]: 2023-10-02 19:33:20.032 [INFO][2678] dataplane_linux.go 68: Setting the host side veth name to cali9b7ea308f97 ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.056798 env[1100]: 2023-10-02 19:33:20.034 [INFO][2678] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.056798 env[1100]: 2023-10-02 19:33:20.045 [INFO][2678] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"98f1ecf0-284d-4e62-ba05-50f3f5f1f057", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 32, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98", Pod:"coredns-5dd5756b68-7blt8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9b7ea308f97", MAC:"ae:11:41:77:fc:a0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:20.056798 env[1100]: 2023-10-02 19:33:20.052 [INFO][2678] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98" Namespace="kube-system" Pod="coredns-5dd5756b68-7blt8" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--7blt8-eth0" Oct 2 19:33:20.068290 kernel: kauditd_printk_skb: 208 callbacks suppressed Oct 2 19:33:20.068430 kernel: audit: type=1325 audit(1696275200.066:725): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:20.066000 audit[2721]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:20.066000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffefc6041a0 a2=0 a3=7ffefc60418c items=0 ppid=2412 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.072053 kernel: audit: type=1300 audit(1696275200.066:725): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffefc6041a0 a2=0 a3=7ffefc60418c items=0 ppid=2412 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.072119 kernel: audit: type=1327 audit(1696275200.066:725): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:20.066000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:20.083333 env[1100]: time="2023-10-02T19:33:20.083169403Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:33:20.083333 env[1100]: time="2023-10-02T19:33:20.083214298Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:33:20.083333 env[1100]: time="2023-10-02T19:33:20.083225158Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:33:20.083573 env[1100]: time="2023-10-02T19:33:20.083448941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98 pid=2724 runtime=io.containerd.runc.v2 Oct 2 19:33:20.097960 systemd[1]: Started cri-containerd-c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98.scope. Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120006 kernel: audit: type=1400 audit(1696275200.115:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120057 kernel: audit: type=1400 audit(1696275200.115:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120075 kernel: audit: type=1400 audit(1696275200.115:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123814 kernel: audit: type=1400 audit(1696275200.115:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123861 kernel: audit: type=1400 audit(1696275200.115:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.125779 kernel: audit: type=1400 audit(1696275200.115:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.129692 kernel: audit: type=1400 audit(1696275200.115:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.119000 audit: BPF prog-id=96 op=LOAD Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2724 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663663336337613432343532313866623665656438616235393239 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2724 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663663336337613432343532313866623665656438616235393239 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.120000 audit: BPF prog-id=97 op=LOAD Oct 2 19:33:20.120000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000300510 items=0 ppid=2724 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663663336337613432343532313866623665656438616235393239 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.121000 audit: BPF prog-id=98 op=LOAD Oct 2 19:33:20.121000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300558 items=0 ppid=2724 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663663336337613432343532313866623665656438616235393239 Oct 2 19:33:20.123000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:33:20.123000 audit: BPF prog-id=97 op=UNLOAD Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:20.123000 audit: BPF prog-id=99 op=LOAD Oct 2 19:33:20.123000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000300968 items=0 ppid=2724 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:20.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663663336337613432343532313866623665656438616235393239 Oct 2 19:33:20.129738 systemd-resolved[1047]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:33:20.155453 env[1100]: time="2023-10-02T19:33:20.155397459Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7blt8,Uid:98f1ecf0-284d-4e62-ba05-50f3f5f1f057,Namespace:kube-system,Attempt:1,} returns sandbox id \"c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98\"" Oct 2 19:33:20.156084 kubelet[1408]: E1002 19:33:20.156069 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:20.156816 env[1100]: time="2023-10-02T19:33:20.156792381Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:33:20.249695 kubelet[1408]: E1002 19:33:20.249659 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:20.780230 kubelet[1408]: E1002 19:33:20.780187 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:20.819481 env[1100]: time="2023-10-02T19:33:20.819399503Z" level=info msg="StopPodSandbox for \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\"" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.853 [INFO][2795] k8s.go 576: Cleaning up netns ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.853 [INFO][2795] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" iface="eth0" netns="/var/run/netns/cni-d6f3bb2e-13cd-2df9-2c52-cdb2d2707f45" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.853 [INFO][2795] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" iface="eth0" netns="/var/run/netns/cni-d6f3bb2e-13cd-2df9-2c52-cdb2d2707f45" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.853 [INFO][2795] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" iface="eth0" netns="/var/run/netns/cni-d6f3bb2e-13cd-2df9-2c52-cdb2d2707f45" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.853 [INFO][2795] k8s.go 583: Releasing IP address(es) ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.853 [INFO][2795] utils.go 196: Calico CNI releasing IP address ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.871 [INFO][2803] ipam_plugin.go 416: Releasing address using handleID ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" HandleID="k8s-pod-network.19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Workload="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:20.879727 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:20.879727 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.876 [WARNING][2803] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" HandleID="k8s-pod-network.19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Workload="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.876 [INFO][2803] ipam_plugin.go 444: Releasing address using workloadID ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" HandleID="k8s-pod-network.19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Workload="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:20.879727 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:20.879727 env[1100]: 2023-10-02 19:33:20.878 [INFO][2795] k8s.go 589: Teardown processing complete. ContainerID="19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f" Oct 2 19:33:20.880427 env[1100]: time="2023-10-02T19:33:20.879839483Z" level=info msg="TearDown network for sandbox \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\" successfully" Oct 2 19:33:20.880427 env[1100]: time="2023-10-02T19:33:20.879867425Z" level=info msg="StopPodSandbox for \"19eb16468992b0c88160663ab4f76b1ca8e4da2af33a1d873c3de7d613bd609f\" returns successfully" Oct 2 19:33:20.880495 env[1100]: time="2023-10-02T19:33:20.880436328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6cnst,Uid:0725f68d-6961-4f75-9116-c5b4b3a93926,Namespace:calico-system,Attempt:1,}" Oct 2 19:33:20.929020 systemd[1]: run-containerd-runc-k8s.io-c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98-runc.TIdEPG.mount: Deactivated successfully. Oct 2 19:33:20.929103 systemd[1]: run-netns-cni\x2dd6f3bb2e\x2d13cd\x2d2df9\x2d2c52\x2dcdb2d2707f45.mount: Deactivated successfully. Oct 2 19:33:20.978442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81a3bdc89a2: link becomes ready Oct 2 19:33:20.994279 systemd-networkd[1001]: cali81a3bdc89a2: Link UP Oct 2 19:33:20.994287 systemd-networkd[1001]: cali81a3bdc89a2: Gained carrier Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.918 [INFO][2810] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.16-k8s-csi--node--driver--6cnst-eth0 csi-node-driver- calico-system 0725f68d-6961-4f75-9116-c5b4b3a93926 939 0 2023-10-02 19:33:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.16 csi-node-driver-6cnst eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali81a3bdc89a2 [] []}} ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.918 [INFO][2810] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.943 [INFO][2823] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" HandleID="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Workload="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.951 [INFO][2823] ipam_plugin.go 269: Auto assigning IP ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" HandleID="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Workload="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00021c270), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.16", "pod":"csi-node-driver-6cnst", "timestamp":"2023-10-02 19:33:20.943084663 +0000 UTC"}, Hostname:"10.0.0.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:33:21.002616 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:21.002616 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.951 [INFO][2823] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.16' Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.953 [INFO][2823] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.957 [INFO][2823] ipam.go 372: Looking up existing affinities for host host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.960 [INFO][2823] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.962 [INFO][2823] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.964 [INFO][2823] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.964 [INFO][2823] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.966 [INFO][2823] ipam.go 1682: Creating new handle: k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3 Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.969 [INFO][2823] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.972 [INFO][2823] ipam.go 1216: Successfully claimed IPs: [192.168.113.2/26] block=192.168.113.0/26 handle="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.972 [INFO][2823] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.2/26] handle="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" host="10.0.0.16" Oct 2 19:33:21.002616 env[1100]: time="2023-10-02T19:33:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:21.002616 env[1100]: 2023-10-02 19:33:20.973 [INFO][2823] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.2/26] IPv6=[] ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" HandleID="k8s-pod-network.629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Workload="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.003200 env[1100]: 2023-10-02 19:33:20.975 [INFO][2810] k8s.go 383: Populated endpoint ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-csi--node--driver--6cnst-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0725f68d-6961-4f75-9116-c5b4b3a93926", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 33, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"", Pod:"csi-node-driver-6cnst", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali81a3bdc89a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:21.003200 env[1100]: 2023-10-02 19:33:20.975 [INFO][2810] k8s.go 384: Calico CNI using IPs: [192.168.113.2/32] ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.003200 env[1100]: 2023-10-02 19:33:20.975 [INFO][2810] dataplane_linux.go 68: Setting the host side veth name to cali81a3bdc89a2 ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.003200 env[1100]: 2023-10-02 19:33:20.978 [INFO][2810] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.003200 env[1100]: 2023-10-02 19:33:20.994 [INFO][2810] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-csi--node--driver--6cnst-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0725f68d-6961-4f75-9116-c5b4b3a93926", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 33, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3", Pod:"csi-node-driver-6cnst", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali81a3bdc89a2", MAC:"fa:47:88:13:d7:fe", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:21.003200 env[1100]: 2023-10-02 19:33:21.001 [INFO][2810] k8s.go 489: Wrote updated endpoint to datastore ContainerID="629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3" Namespace="calico-system" Pod="csi-node-driver-6cnst" WorkloadEndpoint="10.0.0.16-k8s-csi--node--driver--6cnst-eth0" Oct 2 19:33:21.012000 audit[2846]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:21.012000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffec7335930 a2=0 a3=7ffec733591c items=0 ppid=2412 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:21.012000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:21.059337 env[1100]: time="2023-10-02T19:33:21.059213627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:33:21.059337 env[1100]: time="2023-10-02T19:33:21.059251948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:33:21.059337 env[1100]: time="2023-10-02T19:33:21.059270964Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:33:21.060433 env[1100]: time="2023-10-02T19:33:21.059431176Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3 pid=2856 runtime=io.containerd.runc.v2 Oct 2 19:33:21.083300 systemd[1]: run-containerd-runc-k8s.io-629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3-runc.xv2qAl.mount: Deactivated successfully. Oct 2 19:33:21.084606 systemd[1]: Started cri-containerd-629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3.scope. Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.094000 audit: BPF prog-id=100 op=LOAD Oct 2 19:33:21.094000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.094000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2856 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:21.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632396164656535613363323963633334626138383562646334613631 Oct 2 19:33:21.094000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.094000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2856 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:21.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632396164656535613363323963633334626138383562646334613631 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.095000 audit: BPF prog-id=101 op=LOAD Oct 2 19:33:21.095000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3cc0 items=0 ppid=2856 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:21.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632396164656535613363323963633334626138383562646334613631 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit: BPF prog-id=102 op=LOAD Oct 2 19:33:21.096000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3d08 items=0 ppid=2856 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:21.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632396164656535613363323963633334626138383562646334613631 Oct 2 19:33:21.096000 audit: BPF prog-id=102 op=UNLOAD Oct 2 19:33:21.096000 audit: BPF prog-id=101 op=UNLOAD Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:21.096000 audit: BPF prog-id=103 op=LOAD Oct 2 19:33:21.096000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034c118 items=0 ppid=2856 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:21.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632396164656535613363323963633334626138383562646334613631 Oct 2 19:33:21.098739 systemd-resolved[1047]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:33:21.107171 env[1100]: time="2023-10-02T19:33:21.107129926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6cnst,Uid:0725f68d-6961-4f75-9116-c5b4b3a93926,Namespace:calico-system,Attempt:1,} returns sandbox id \"629adee5a3c29cc34ba885bdc4a61cf648e7adc4fb5d603500ccffe1c021c7c3\"" Oct 2 19:33:21.536474 systemd-networkd[1001]: cali9b7ea308f97: Gained IPv6LL Oct 2 19:33:21.781031 kubelet[1408]: E1002 19:33:21.780968 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:21.819856 env[1100]: time="2023-10-02T19:33:21.819505039Z" level=info msg="StopPodSandbox for \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\"" Oct 2 19:33:21.819856 env[1100]: time="2023-10-02T19:33:21.819629985Z" level=info msg="StopPodSandbox for \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\"" Oct 2 19:33:21.819856 env[1100]: time="2023-10-02T19:33:21.819640154Z" level=info msg="StopPodSandbox for \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\"" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.069703776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.072371114Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.074201825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.076078754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.076273741Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.077647250Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:33:22.086396 env[1100]: time="2023-10-02T19:33:22.079011623Z" level=info msg="CreateContainer within sandbox \"c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:33:22.129025 systemd-networkd[1001]: cali81a3bdc89a2: Gained IPv6LL Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.067 [INFO][2950] k8s.go 576: Cleaning up netns ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.068 [INFO][2950] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" iface="eth0" netns="/var/run/netns/cni-559e024e-f654-f916-06bc-ce2306d4a7a7" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.068 [INFO][2950] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" iface="eth0" netns="/var/run/netns/cni-559e024e-f654-f916-06bc-ce2306d4a7a7" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.068 [INFO][2950] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" iface="eth0" netns="/var/run/netns/cni-559e024e-f654-f916-06bc-ce2306d4a7a7" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.068 [INFO][2950] k8s.go 583: Releasing IP address(es) ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.068 [INFO][2950] utils.go 196: Calico CNI releasing IP address ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.100 [INFO][2969] ipam_plugin.go 416: Releasing address using handleID ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" HandleID="k8s-pod-network.90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Workload="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.141337 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:22.141337 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.113 [WARNING][2969] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" HandleID="k8s-pod-network.90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Workload="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.113 [INFO][2969] ipam_plugin.go 444: Releasing address using workloadID ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" HandleID="k8s-pod-network.90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Workload="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.141337 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:22.141337 env[1100]: 2023-10-02 19:33:22.126 [INFO][2950] k8s.go 589: Teardown processing complete. ContainerID="90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83" Oct 2 19:33:22.143099 systemd[1]: run-netns-cni\x2d559e024e\x2df654\x2df916\x2d06bc\x2dce2306d4a7a7.mount: Deactivated successfully. Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.063 [INFO][2949] k8s.go 576: Cleaning up netns ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.064 [INFO][2949] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" iface="eth0" netns="/var/run/netns/cni-c4cee940-33ac-3301-55a1-5d1febef09cb" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.064 [INFO][2949] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" iface="eth0" netns="/var/run/netns/cni-c4cee940-33ac-3301-55a1-5d1febef09cb" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.075 [INFO][2949] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" iface="eth0" netns="/var/run/netns/cni-c4cee940-33ac-3301-55a1-5d1febef09cb" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.075 [INFO][2949] k8s.go 583: Releasing IP address(es) ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.075 [INFO][2949] utils.go 196: Calico CNI releasing IP address ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.110 [INFO][2970] ipam_plugin.go 416: Releasing address using handleID ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" HandleID="k8s-pod-network.33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Workload="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.170442 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:22.170442 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.128 [WARNING][2970] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" HandleID="k8s-pod-network.33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Workload="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.128 [INFO][2970] ipam_plugin.go 444: Releasing address using workloadID ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" HandleID="k8s-pod-network.33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Workload="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.170442 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:22.170442 env[1100]: 2023-10-02 19:33:22.169 [INFO][2949] k8s.go 589: Teardown processing complete. ContainerID="33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be" Oct 2 19:33:22.173212 env[1100]: time="2023-10-02T19:33:22.172731256Z" level=info msg="TearDown network for sandbox \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\" successfully" Oct 2 19:33:22.173212 env[1100]: time="2023-10-02T19:33:22.172768877Z" level=info msg="StopPodSandbox for \"90657f072c1a0f23b17287f7418b3d258241d011da6d6a05e09004851c845c83\" returns successfully" Oct 2 19:33:22.173307 kubelet[1408]: E1002 19:33:22.173231 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:22.174541 systemd[1]: run-netns-cni\x2dc4cee940\x2d33ac\x2d3301\x2d55a1\x2d5d1febef09cb.mount: Deactivated successfully. Oct 2 19:33:22.175227 env[1100]: time="2023-10-02T19:33:22.175195682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5vx7v,Uid:cab59dea-3228-4ffc-9926-523b38f4e0af,Namespace:kube-system,Attempt:1,}" Oct 2 19:33:22.175492 env[1100]: time="2023-10-02T19:33:22.175207455Z" level=info msg="TearDown network for sandbox \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\" successfully" Oct 2 19:33:22.175588 env[1100]: time="2023-10-02T19:33:22.175569326Z" level=info msg="StopPodSandbox for \"33757965b2a42abbbc5c7fcdb0a77275624c34b39f6b640395cbdf8c601b77be\" returns successfully" Oct 2 19:33:22.176807 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3137742263.mount: Deactivated successfully. Oct 2 19:33:22.178449 env[1100]: time="2023-10-02T19:33:22.178396226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5jdc,Uid:5efcf382-74a8-4454-bf95-2ca297910d60,Namespace:default,Attempt:1,}" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.064 [INFO][2909] k8s.go 576: Cleaning up netns ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.064 [INFO][2909] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" iface="eth0" netns="/var/run/netns/cni-f4b17502-32ff-381f-18b8-efe34f21a023" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.064 [INFO][2909] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" iface="eth0" netns="/var/run/netns/cni-f4b17502-32ff-381f-18b8-efe34f21a023" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.064 [INFO][2909] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" iface="eth0" netns="/var/run/netns/cni-f4b17502-32ff-381f-18b8-efe34f21a023" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.064 [INFO][2909] k8s.go 583: Releasing IP address(es) ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.064 [INFO][2909] utils.go 196: Calico CNI releasing IP address ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.190 [INFO][2968] ipam_plugin.go 416: Releasing address using handleID ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" HandleID="k8s-pod-network.65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Workload="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.313026 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:22.313026 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.237 [WARNING][2968] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" HandleID="k8s-pod-network.65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Workload="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.237 [INFO][2968] ipam_plugin.go 444: Releasing address using workloadID ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" HandleID="k8s-pod-network.65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Workload="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.313026 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:22.313026 env[1100]: 2023-10-02 19:33:22.312 [INFO][2909] k8s.go 589: Teardown processing complete. ContainerID="65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8" Oct 2 19:33:22.313506 env[1100]: time="2023-10-02T19:33:22.313170602Z" level=info msg="TearDown network for sandbox \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\" successfully" Oct 2 19:33:22.313506 env[1100]: time="2023-10-02T19:33:22.313237489Z" level=info msg="StopPodSandbox for \"65f2dbf87f42ae341020dfb9ea44c682c30d19c949cc20a68070432ec93464c8\" returns successfully" Oct 2 19:33:22.313855 env[1100]: time="2023-10-02T19:33:22.313833843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-nwfrw,Uid:8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad,Namespace:calico-system,Attempt:1,}" Oct 2 19:33:22.363651 env[1100]: time="2023-10-02T19:33:22.363507274Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:33:22.464778 env[1100]: time="2023-10-02T19:33:22.464690526Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:33:22.465031 kubelet[1408]: E1002 19:33:22.465000 1408 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:33:22.465095 kubelet[1408]: E1002 19:33:22.465046 1408 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:33:22.465195 kubelet[1408]: E1002 19:33:22.465166 1408 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-rmxz5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-6cnst_calico-system(0725f68d-6961-4f75-9116-c5b4b3a93926): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:33:22.465953 env[1100]: time="2023-10-02T19:33:22.465920295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:33:22.471858 env[1100]: time="2023-10-02T19:33:22.471720018Z" level=info msg="CreateContainer within sandbox \"c2f6c3c7a4245218fb6eed8ab5929f14fadb5b3536e1dfd4e9ab2eec26899b98\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e6db4f5b44dc503779cc8ab636af6b745f66c4c6556a5c7abf4d94e89352297f\"" Oct 2 19:33:22.473210 env[1100]: time="2023-10-02T19:33:22.472275254Z" level=info msg="StartContainer for \"e6db4f5b44dc503779cc8ab636af6b745f66c4c6556a5c7abf4d94e89352297f\"" Oct 2 19:33:22.488273 systemd[1]: Started cri-containerd-e6db4f5b44dc503779cc8ab636af6b745f66c4c6556a5c7abf4d94e89352297f.scope. Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit: BPF prog-id=104 op=LOAD Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2724 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536646234663562343464633530333737396363386162363336616636 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2724 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536646234663562343464633530333737396363386162363336616636 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.499000 audit: BPF prog-id=105 op=LOAD Oct 2 19:33:22.499000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000391100 items=0 ppid=2724 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536646234663562343464633530333737396363386162363336616636 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit: BPF prog-id=106 op=LOAD Oct 2 19:33:22.500000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000391148 items=0 ppid=2724 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536646234663562343464633530333737396363386162363336616636 Oct 2 19:33:22.500000 audit: BPF prog-id=106 op=UNLOAD Oct 2 19:33:22.500000 audit: BPF prog-id=105 op=UNLOAD Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.500000 audit: BPF prog-id=107 op=LOAD Oct 2 19:33:22.500000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000391558 items=0 ppid=2724 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536646234663562343464633530333737396363386162363336616636 Oct 2 19:33:22.544909 env[1100]: time="2023-10-02T19:33:22.544849877Z" level=info msg="StartContainer for \"e6db4f5b44dc503779cc8ab636af6b745f66c4c6556a5c7abf4d94e89352297f\" returns successfully" Oct 2 19:33:22.606304 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:33:22.606468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8e7641b533: link becomes ready Oct 2 19:33:22.618321 systemd-networkd[1001]: calia8e7641b533: Link UP Oct 2 19:33:22.618327 systemd-networkd[1001]: calia8e7641b533: Gained carrier Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.544 [INFO][3040] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0 nginx-deployment-6d5f899847- default 5efcf382-74a8-4454-bf95-2ca297910d60 949 0 2023-10-02 19:33:07 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.16 nginx-deployment-6d5f899847-w5jdc eth0 default [] [] [kns.default ksa.default.default] calia8e7641b533 [] []}} ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.545 [INFO][3040] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.576 [INFO][3082] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" HandleID="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Workload="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.584 [INFO][3082] ipam_plugin.go 269: Auto assigning IP ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" HandleID="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Workload="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00018f1b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.16", "pod":"nginx-deployment-6d5f899847-w5jdc", "timestamp":"2023-10-02 19:33:22.576039714 +0000 UTC"}, Hostname:"10.0.0.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:33:22.625848 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:22.625848 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.584 [INFO][3082] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.16' Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.587 [INFO][3082] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.589 [INFO][3082] ipam.go 372: Looking up existing affinities for host host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.592 [INFO][3082] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.593 [INFO][3082] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.595 [INFO][3082] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.595 [INFO][3082] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.596 [INFO][3082] ipam.go 1682: Creating new handle: k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054 Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.599 [INFO][3082] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.602 [INFO][3082] ipam.go 1216: Successfully claimed IPs: [192.168.113.3/26] block=192.168.113.0/26 handle="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.602 [INFO][3082] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.3/26] handle="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" host="10.0.0.16" Oct 2 19:33:22.625848 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:22.625848 env[1100]: 2023-10-02 19:33:22.602 [INFO][3082] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.3/26] IPv6=[] ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" HandleID="k8s-pod-network.5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Workload="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.626484 env[1100]: 2023-10-02 19:33:22.604 [INFO][3040] k8s.go 383: Populated endpoint ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5efcf382-74a8-4454-bf95-2ca297910d60", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 33, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"", Pod:"nginx-deployment-6d5f899847-w5jdc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia8e7641b533", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:22.626484 env[1100]: 2023-10-02 19:33:22.604 [INFO][3040] k8s.go 384: Calico CNI using IPs: [192.168.113.3/32] ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.626484 env[1100]: 2023-10-02 19:33:22.604 [INFO][3040] dataplane_linux.go 68: Setting the host side veth name to calia8e7641b533 ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.626484 env[1100]: 2023-10-02 19:33:22.607 [INFO][3040] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.626484 env[1100]: 2023-10-02 19:33:22.618 [INFO][3040] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5efcf382-74a8-4454-bf95-2ca297910d60", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 33, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054", Pod:"nginx-deployment-6d5f899847-w5jdc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia8e7641b533", MAC:"4a:d2:76:0d:27:6a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:22.626484 env[1100]: 2023-10-02 19:33:22.622 [INFO][3040] k8s.go 489: Wrote updated endpoint to datastore ContainerID="5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054" Namespace="default" Pod="nginx-deployment-6d5f899847-w5jdc" WorkloadEndpoint="10.0.0.16-k8s-nginx--deployment--6d5f899847--w5jdc-eth0" Oct 2 19:33:22.635279 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie1d68615046: link becomes ready Oct 2 19:33:22.640000 audit[3126]: NETFILTER_CFG table=filter:71 family=2 entries=44 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:22.640000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=22252 a0=3 a1=7ffefe1f2890 a2=0 a3=7ffefe1f287c items=0 ppid=2412 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:22.643925 env[1100]: time="2023-10-02T19:33:22.643856607Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:33:22.644002 env[1100]: time="2023-10-02T19:33:22.643954572Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:33:22.644033 env[1100]: time="2023-10-02T19:33:22.643985080Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:33:22.644246 env[1100]: time="2023-10-02T19:33:22.644203332Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054 pid=3130 runtime=io.containerd.runc.v2 Oct 2 19:33:22.645502 systemd-networkd[1001]: calie1d68615046: Link UP Oct 2 19:33:22.645513 systemd-networkd[1001]: calie1d68615046: Gained carrier Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.549 [INFO][3019] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0 coredns-5dd5756b68- kube-system cab59dea-3228-4ffc-9926-523b38f4e0af 951 0 2023-10-02 19:32:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.0.0.16 coredns-5dd5756b68-5vx7v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie1d68615046 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.549 [INFO][3019] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.587 [INFO][3089] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" HandleID="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Workload="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.595 [INFO][3089] ipam_plugin.go 269: Auto assigning IP ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" HandleID="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Workload="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c7f60), Attrs:map[string]string{"namespace":"kube-system", "node":"10.0.0.16", "pod":"coredns-5dd5756b68-5vx7v", "timestamp":"2023-10-02 19:33:22.587582493 +0000 UTC"}, Hostname:"10.0.0.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:33:22.649434 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:22.649434 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.603 [INFO][3089] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.16' Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.607 [INFO][3089] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.611 [INFO][3089] ipam.go 372: Looking up existing affinities for host host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.614 [INFO][3089] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.616 [INFO][3089] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.618 [INFO][3089] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.618 [INFO][3089] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.620 [INFO][3089] ipam.go 1682: Creating new handle: k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65 Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.625 [INFO][3089] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.630 [INFO][3089] ipam.go 1216: Successfully claimed IPs: [192.168.113.4/26] block=192.168.113.0/26 handle="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.630 [INFO][3089] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.4/26] handle="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" host="10.0.0.16" Oct 2 19:33:22.649434 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:22.649434 env[1100]: 2023-10-02 19:33:22.630 [INFO][3089] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.4/26] IPv6=[] ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" HandleID="k8s-pod-network.7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Workload="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.650291 env[1100]: 2023-10-02 19:33:22.632 [INFO][3019] k8s.go 383: Populated endpoint ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cab59dea-3228-4ffc-9926-523b38f4e0af", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 32, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"", Pod:"coredns-5dd5756b68-5vx7v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d68615046", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:22.650291 env[1100]: 2023-10-02 19:33:22.632 [INFO][3019] k8s.go 384: Calico CNI using IPs: [192.168.113.4/32] ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.650291 env[1100]: 2023-10-02 19:33:22.632 [INFO][3019] dataplane_linux.go 68: Setting the host side veth name to calie1d68615046 ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.650291 env[1100]: 2023-10-02 19:33:22.634 [INFO][3019] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.650291 env[1100]: 2023-10-02 19:33:22.642 [INFO][3019] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cab59dea-3228-4ffc-9926-523b38f4e0af", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 32, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65", Pod:"coredns-5dd5756b68-5vx7v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d68615046", MAC:"8e:a9:c4:e2:44:15", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:22.650291 env[1100]: 2023-10-02 19:33:22.648 [INFO][3019] k8s.go 489: Wrote updated endpoint to datastore ContainerID="7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65" Namespace="kube-system" Pod="coredns-5dd5756b68-5vx7v" WorkloadEndpoint="10.0.0.16-k8s-coredns--5dd5756b68--5vx7v-eth0" Oct 2 19:33:22.658055 systemd[1]: Started cri-containerd-5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054.scope. Oct 2 19:33:22.663280 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali50b0bc72499: link becomes ready Oct 2 19:33:22.665000 audit[3163]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:22.665000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7fff6dcb4960 a2=0 a3=7fff6dcb494c items=0 ppid=2412 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.665000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:22.670030 systemd-networkd[1001]: cali50b0bc72499: Link UP Oct 2 19:33:22.670037 systemd-networkd[1001]: cali50b0bc72499: Gained carrier Oct 2 19:33:22.670683 env[1100]: time="2023-10-02T19:33:22.670576719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:33:22.670683 env[1100]: time="2023-10-02T19:33:22.670613828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:33:22.670683 env[1100]: time="2023-10-02T19:33:22.670627133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:33:22.670818 env[1100]: time="2023-10-02T19:33:22.670726771Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65 pid=3177 runtime=io.containerd.runc.v2 Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.555 [INFO][3029] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0 calico-kube-controllers-74b9887bb6- calico-system 8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad 950 0 2023-10-02 19:32:29 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.0.0.16 calico-kube-controllers-74b9887bb6-nwfrw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali50b0bc72499 [] []}} ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.555 [INFO][3029] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.584 [INFO][3094] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" HandleID="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Workload="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.601 [INFO][3094] ipam_plugin.go 269: Auto assigning IP ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" HandleID="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Workload="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c0a90), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.16", "pod":"calico-kube-controllers-74b9887bb6-nwfrw", "timestamp":"2023-10-02 19:33:22.584496356 +0000 UTC"}, Hostname:"10.0.0.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:33:22.677157 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:33:22.677157 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.630 [INFO][3094] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.16' Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.634 [INFO][3094] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.637 [INFO][3094] ipam.go 372: Looking up existing affinities for host host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.643 [INFO][3094] ipam.go 489: Trying affinity for 192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.644 [INFO][3094] ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.646 [INFO][3094] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.646 [INFO][3094] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.647 [INFO][3094] ipam.go 1682: Creating new handle: k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6 Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.651 [INFO][3094] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.657 [INFO][3094] ipam.go 1216: Successfully claimed IPs: [192.168.113.5/26] block=192.168.113.0/26 handle="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.657 [INFO][3094] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.5/26] handle="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" host="10.0.0.16" Oct 2 19:33:22.677157 env[1100]: time="2023-10-02T19:33:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:33:22.677157 env[1100]: 2023-10-02 19:33:22.657 [INFO][3094] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.113.5/26] IPv6=[] ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" HandleID="k8s-pod-network.5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Workload="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.677813 env[1100]: 2023-10-02 19:33:22.661 [INFO][3029] k8s.go 383: Populated endpoint ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 32, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-nwfrw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50b0bc72499", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:22.677813 env[1100]: 2023-10-02 19:33:22.661 [INFO][3029] k8s.go 384: Calico CNI using IPs: [192.168.113.5/32] ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.677813 env[1100]: 2023-10-02 19:33:22.661 [INFO][3029] dataplane_linux.go 68: Setting the host side veth name to cali50b0bc72499 ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.677813 env[1100]: 2023-10-02 19:33:22.663 [INFO][3029] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.677813 env[1100]: 2023-10-02 19:33:22.671 [INFO][3029] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 32, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.16", ContainerID:"5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6", Pod:"calico-kube-controllers-74b9887bb6-nwfrw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50b0bc72499", MAC:"2e:19:c2:bd:70:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:33:22.677813 env[1100]: 2023-10-02 19:33:22.676 [INFO][3029] k8s.go 489: Wrote updated endpoint to datastore ContainerID="5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-nwfrw" WorkloadEndpoint="10.0.0.16-k8s-calico--kube--controllers--74b9887bb6--nwfrw-eth0" Oct 2 19:33:22.681543 systemd[1]: Started cri-containerd-7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65.scope. Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.683000 audit: BPF prog-id=108 op=LOAD Oct 2 19:33:22.683000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.683000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=3130 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376266383734336336306431623334366338346134653266343834 Oct 2 19:33:22.683000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.683000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=3130 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376266383734336336306431623334366338346134653266343834 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.684000 audit: BPF prog-id=109 op=LOAD Oct 2 19:33:22.684000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c00040c340 items=0 ppid=3130 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376266383734336336306431623334366338346134653266343834 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.685000 audit: BPF prog-id=110 op=LOAD Oct 2 19:33:22.685000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c00040c388 items=0 ppid=3130 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376266383734336336306431623334366338346134653266343834 Oct 2 19:33:22.686000 audit: BPF prog-id=110 op=UNLOAD Oct 2 19:33:22.686000 audit: BPF prog-id=109 op=UNLOAD Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.686000 audit: BPF prog-id=111 op=LOAD Oct 2 19:33:22.686000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c00040c798 items=0 ppid=3130 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376266383734336336306431623334366338346134653266343834 Oct 2 19:33:22.687860 systemd-resolved[1047]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.693000 audit: BPF prog-id=112 op=LOAD Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3177 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343539333131373864316234306234333239306564353530343431 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3177 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343539333131373864316234306234333239306564353530343431 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit: BPF prog-id=113 op=LOAD Oct 2 19:33:22.694000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000216340 items=0 ppid=3177 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343539333131373864316234306234333239306564353530343431 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit: BPF prog-id=114 op=LOAD Oct 2 19:33:22.694000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000216388 items=0 ppid=3177 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343539333131373864316234306234333239306564353530343431 Oct 2 19:33:22.694000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:33:22.694000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.694000 audit: BPF prog-id=115 op=LOAD Oct 2 19:33:22.694000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000216798 items=0 ppid=3177 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343539333131373864316234306234333239306564353530343431 Oct 2 19:33:22.696755 systemd-resolved[1047]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:33:22.697158 env[1100]: time="2023-10-02T19:33:22.697072576Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:33:22.697306 env[1100]: time="2023-10-02T19:33:22.697105599Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:33:22.697306 env[1100]: time="2023-10-02T19:33:22.697169289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:33:22.697485 env[1100]: time="2023-10-02T19:33:22.697436894Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6 pid=3226 runtime=io.containerd.runc.v2 Oct 2 19:33:22.697000 audit[3227]: NETFILTER_CFG table=filter:73 family=2 entries=46 op=nft_register_chain pid=3227 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:33:22.697000 audit[3227]: SYSCALL arch=c000003e syscall=46 success=yes exit=21884 a0=3 a1=7ffcf4bc21d0 a2=0 a3=7ffcf4bc21bc items=0 ppid=2412 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.697000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:33:22.707190 systemd[1]: Started cri-containerd-5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6.scope. Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.722000 audit: BPF prog-id=116 op=LOAD Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3226 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323461646531316566643565353634393164653738633064363365 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3226 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323461646531316566643565353634393164653738633064363365 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit: BPF prog-id=117 op=LOAD Oct 2 19:33:22.723000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc6f0 items=0 ppid=3226 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323461646531316566643565353634393164653738633064363365 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit: BPF prog-id=118 op=LOAD Oct 2 19:33:22.723000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dc738 items=0 ppid=3226 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323461646531316566643565353634393164653738633064363365 Oct 2 19:33:22.723000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:33:22.723000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.723000 audit: BPF prog-id=119 op=LOAD Oct 2 19:33:22.723000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dcb48 items=0 ppid=3226 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323461646531316566643565353634393164653738633064363365 Oct 2 19:33:22.725103 env[1100]: time="2023-10-02T19:33:22.724533795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5vx7v,Uid:cab59dea-3228-4ffc-9926-523b38f4e0af,Namespace:kube-system,Attempt:1,} returns sandbox id \"7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65\"" Oct 2 19:33:22.727105 kubelet[1408]: E1002 19:33:22.726722 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:22.727382 env[1100]: time="2023-10-02T19:33:22.727344153Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:33:22.727490 systemd-resolved[1047]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:33:22.728855 env[1100]: time="2023-10-02T19:33:22.728831777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5jdc,Uid:5efcf382-74a8-4454-bf95-2ca297910d60,Namespace:default,Attempt:1,} returns sandbox id \"5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054\"" Oct 2 19:33:22.729135 env[1100]: time="2023-10-02T19:33:22.728918951Z" level=info msg="CreateContainer within sandbox \"7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:33:22.730211 env[1100]: time="2023-10-02T19:33:22.730182864Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:33:22.730792 kubelet[1408]: E1002 19:33:22.730596 1408 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:33:22.730792 kubelet[1408]: E1002 19:33:22.730619 1408 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:33:22.730792 kubelet[1408]: E1002 19:33:22.730713 1408 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rmxz5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-6cnst_calico-system(0725f68d-6961-4f75-9116-c5b4b3a93926): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:33:22.730792 kubelet[1408]: E1002 19:33:22.730751 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-6cnst" podUID="0725f68d-6961-4f75-9116-c5b4b3a93926" Oct 2 19:33:22.731134 env[1100]: time="2023-10-02T19:33:22.731104372Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:33:22.744109 env[1100]: time="2023-10-02T19:33:22.743295784Z" level=info msg="CreateContainer within sandbox \"7745931178d1b40b43290ed5504414e65632ded4e8bdfb5c4c4ad31121c2ae65\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"895740a2ca7b40c75035eaded2eeb7b1b54cce59553e5c0872674b130ab2d281\"" Oct 2 19:33:22.744404 env[1100]: time="2023-10-02T19:33:22.744380339Z" level=info msg="StartContainer for \"895740a2ca7b40c75035eaded2eeb7b1b54cce59553e5c0872674b130ab2d281\"" Oct 2 19:33:22.753590 env[1100]: time="2023-10-02T19:33:22.753549332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-nwfrw,Uid:8b1bd0ec-ea59-41fc-bbde-a81d88cc11ad,Namespace:calico-system,Attempt:1,} returns sandbox id \"5624ade11efd5e56491de78c0d63eba5193fd4ec047144ec30bb8a2c079e81f6\"" Oct 2 19:33:22.758352 systemd[1]: Started cri-containerd-895740a2ca7b40c75035eaded2eeb7b1b54cce59553e5c0872674b130ab2d281.scope. Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.767000 audit: BPF prog-id=120 op=LOAD Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3177 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839353734306132636137623430633735303335656164656432656562 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3177 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839353734306132636137623430633735303335656164656432656562 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit: BPF prog-id=121 op=LOAD Oct 2 19:33:22.768000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000242e50 items=0 ppid=3177 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839353734306132636137623430633735303335656164656432656562 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit: BPF prog-id=122 op=LOAD Oct 2 19:33:22.768000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000242e98 items=0 ppid=3177 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839353734306132636137623430633735303335656164656432656562 Oct 2 19:33:22.768000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:33:22.768000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:22.768000 audit: BPF prog-id=123 op=LOAD Oct 2 19:33:22.768000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002432a8 items=0 ppid=3177 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:22.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839353734306132636137623430633735303335656164656432656562 Oct 2 19:33:22.781408 kubelet[1408]: E1002 19:33:22.781367 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:22.781633 env[1100]: time="2023-10-02T19:33:22.781386670Z" level=info msg="StartContainer for \"895740a2ca7b40c75035eaded2eeb7b1b54cce59553e5c0872674b130ab2d281\" returns successfully" Oct 2 19:33:23.039958 kubelet[1408]: E1002 19:33:23.039928 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:23.042331 kubelet[1408]: E1002 19:33:23.042297 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:23.042738 kubelet[1408]: E1002 19:33:23.042722 1408 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-6cnst" podUID="0725f68d-6961-4f75-9116-c5b4b3a93926" Oct 2 19:33:23.133438 systemd[1]: run-netns-cni\x2df4b17502\x2d32ff\x2d381f\x2d18b8\x2defe34f21a023.mount: Deactivated successfully. Oct 2 19:33:23.246549 kubelet[1408]: I1002 19:33:23.246510 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-5vx7v" podStartSLOduration=61.246462999 podCreationTimestamp="2023-10-02 19:32:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:33:23.246170427 +0000 UTC m=+49.717608952" watchObservedRunningTime="2023-10-02 19:33:23.246462999 +0000 UTC m=+49.717901524" Oct 2 19:33:23.633000 audit[3315]: NETFILTER_CFG table=filter:74 family=2 entries=14 op=nft_register_rule pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:33:23.633000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd2e745a90 a2=0 a3=7ffd2e745a7c items=0 ppid=1558 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:23.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:33:23.633000 audit[3315]: NETFILTER_CFG table=nat:75 family=2 entries=14 op=nft_register_rule pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:33:23.633000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd2e745a90 a2=0 a3=31030 items=0 ppid=1558 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:23.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:33:23.643000 audit[3317]: NETFILTER_CFG table=filter:76 family=2 entries=11 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:33:23.643000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcb44e3390 a2=0 a3=7ffcb44e337c items=0 ppid=1558 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:23.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:33:23.645000 audit[3317]: NETFILTER_CFG table=nat:77 family=2 entries=35 op=nft_register_chain pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:33:23.645000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcb44e3390 a2=0 a3=7ffcb44e337c items=0 ppid=1558 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:23.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:33:23.653665 kubelet[1408]: I1002 19:33:23.653633 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-7blt8" podStartSLOduration=59.733010197 podCreationTimestamp="2023-10-02 19:32:22 +0000 UTC" firstStartedPulling="2023-10-02 19:33:20.156524576 +0000 UTC m=+46.627963101" lastFinishedPulling="2023-10-02 19:33:22.077111991 +0000 UTC m=+48.548550516" observedRunningTime="2023-10-02 19:33:23.644047925 +0000 UTC m=+50.115486450" watchObservedRunningTime="2023-10-02 19:33:23.653597612 +0000 UTC m=+50.125036137" Oct 2 19:33:23.781897 kubelet[1408]: E1002 19:33:23.781863 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:23.904503 systemd-networkd[1001]: calia8e7641b533: Gained IPv6LL Oct 2 19:33:23.905402 systemd-networkd[1001]: calie1d68615046: Gained IPv6LL Oct 2 19:33:24.044505 kubelet[1408]: E1002 19:33:24.044475 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:24.044677 kubelet[1408]: E1002 19:33:24.044534 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:24.352454 systemd-networkd[1001]: cali50b0bc72499: Gained IPv6LL Oct 2 19:33:24.666000 audit[3329]: NETFILTER_CFG table=filter:78 family=2 entries=8 op=nft_register_rule pid=3329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:33:24.666000 audit[3329]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcb68aec90 a2=0 a3=7ffcb68aec7c items=0 ppid=1558 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:24.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:33:24.670000 audit[3329]: NETFILTER_CFG table=nat:79 family=2 entries=56 op=nft_register_chain pid=3329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:33:24.670000 audit[3329]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcb68aec90 a2=0 a3=7ffcb68aec7c items=0 ppid=1558 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:24.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:33:24.782405 kubelet[1408]: E1002 19:33:24.782369 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:25.046315 kubelet[1408]: E1002 19:33:25.046193 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:25.046315 kubelet[1408]: E1002 19:33:25.046240 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:25.782541 kubelet[1408]: E1002 19:33:25.782492 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:26.048202 kubelet[1408]: E1002 19:33:26.048092 1408 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:33:26.262899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3591125427.mount: Deactivated successfully. Oct 2 19:33:26.783035 kubelet[1408]: E1002 19:33:26.782995 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:27.421024 env[1100]: time="2023-10-02T19:33:27.420963150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:27.422790 env[1100]: time="2023-10-02T19:33:27.422743121Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:27.424546 env[1100]: time="2023-10-02T19:33:27.424499026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:27.426124 env[1100]: time="2023-10-02T19:33:27.426084822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:33:27.426698 env[1100]: time="2023-10-02T19:33:27.426667729Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:33:27.427376 env[1100]: time="2023-10-02T19:33:27.427157891Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:33:27.428071 env[1100]: time="2023-10-02T19:33:27.428040733Z" level=info msg="CreateContainer within sandbox \"5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:33:27.438752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount645178220.mount: Deactivated successfully. Oct 2 19:33:27.440126 env[1100]: time="2023-10-02T19:33:27.440041603Z" level=info msg="CreateContainer within sandbox \"5d7bf8743c60d1b346c84a4e2f484a345050fab262d0ef53906cf1fdfbe33054\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b1c45fd1b47044feb77e1eef1d2d057f077d44f87a88d56b0d2b11ab56d91bcf\"" Oct 2 19:33:27.440645 env[1100]: time="2023-10-02T19:33:27.440613601Z" level=info msg="StartContainer for \"b1c45fd1b47044feb77e1eef1d2d057f077d44f87a88d56b0d2b11ab56d91bcf\"" Oct 2 19:33:27.457397 systemd[1]: Started cri-containerd-b1c45fd1b47044feb77e1eef1d2d057f077d44f87a88d56b0d2b11ab56d91bcf.scope. Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.467983 kernel: kauditd_printk_skb: 422 callbacks suppressed Oct 2 19:33:27.468050 kernel: audit: type=1400 audit(1696275207.465:862): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468095 kernel: audit: type=1400 audit(1696275207.465:863): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469914 kernel: audit: type=1400 audit(1696275207.465:864): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471755 kernel: audit: type=1400 audit(1696275207.465:865): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.473755 kernel: audit: type=1400 audit(1696275207.465:866): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.477712 kernel: audit: type=1400 audit(1696275207.465:867): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.479970 kernel: audit: type=1400 audit(1696275207.465:868): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.482384 kernel: audit: type=1400 audit(1696275207.465:869): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.482447 kernel: audit: type=1400 audit(1696275207.465:870): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.486634 kernel: audit: type=1400 audit(1696275207.467:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.467000 audit: BPF prog-id=124 op=LOAD Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3130 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:27.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633435666431623437303434666562373765316565663164326430 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3130 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:27.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633435666431623437303434666562373765316565663164326430 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.468000 audit: BPF prog-id=125 op=LOAD Oct 2 19:33:27.468000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003be3a0 items=0 ppid=3130 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:27.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633435666431623437303434666562373765316565663164326430 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.469000 audit: BPF prog-id=126 op=LOAD Oct 2 19:33:27.469000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003be3e8 items=0 ppid=3130 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:27.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633435666431623437303434666562373765316565663164326430 Oct 2 19:33:27.471000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:33:27.471000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:33:27.471000 audit: BPF prog-id=127 op=LOAD Oct 2 19:33:27.471000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003be7f8 items=0 ppid=3130 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:27.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231633435666431623437303434666562373765316565663164326430 Oct 2 19:33:27.491868 env[1100]: time="2023-10-02T19:33:27.491825634Z" level=info msg="StartContainer for \"b1c45fd1b47044feb77e1eef1d2d057f077d44f87a88d56b0d2b11ab56d91bcf\" returns successfully" Oct 2 19:33:27.783837 kubelet[1408]: E1002 19:33:27.783754 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:28.059569 kubelet[1408]: I1002 19:33:28.059449 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-w5jdc" podStartSLOduration=16.362593239 podCreationTimestamp="2023-10-02 19:33:07 +0000 UTC" firstStartedPulling="2023-10-02 19:33:22.730134352 +0000 UTC m=+49.201572868" lastFinishedPulling="2023-10-02 19:33:27.426951854 +0000 UTC m=+53.898390379" observedRunningTime="2023-10-02 19:33:28.059278752 +0000 UTC m=+54.530717277" watchObservedRunningTime="2023-10-02 19:33:28.05941075 +0000 UTC m=+54.530849275" Oct 2 19:33:28.784429 kubelet[1408]: E1002 19:33:28.784393 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:33:29.785430 kubelet[1408]: E1002 19:33:29.785363 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"